Featured

How the Coronavirus Enabled the Twitter Hack (*and others too)

The recent hack of Twitter demonstrates how the hacking community targets high-profile users on high-profile networks not only for fraud, but also for attacks on their privacy and attacks aimed at “piggybacking” off their identity and celebrity. While the identity of the hackers is still under active investigation, there are a few things we know (and more that we suspect) about how and why the hack occurred. And part of the problem is COVID-19…

Read More How the Coronavirus Enabled the Twitter Hack (*and others too)

AI Biometric Spoofing

By Mark Rasch For more than 40 years, information security professionals have argued for stronger authentication (and access control) protocols.  For most, this has meant some form of multi-factor authentication (MFA). Some combination of something you ARE (biometric), something you HAVE (token or device) and something you KNOW (password, passphrase, PIN).  Certainly, a combination of […]

Read More AI Biometric Spoofing
Featured

Zero Factor Authentication

By Mark D. Rasch and Allison Nixon In the Simpsons episode, “Bart vs. Lisa vs. the Third Grade,” the siblings are both abandoned while on a school trip despite the fact that Mrs. Crabapple, the teacher, had deployed a mechanism to ensure that all people on the bus were accounted for.  As she explains, “Ah, […]

Read More Zero Factor Authentication