Authentication

Google Adds New Anti-Phishing Feature to G Suite
Authentication

Google Adds New Anti-Phishing Feature to G Suite

Google is rolling out a new security feature for enterprises customers of its G Suite hosted apps that allows administrators to choose exactly which apps have access to user data. The feature is designed as a barrier against phishing attacks, many of which try to fool or confuse users into […]

Free Wildcard Certificates Coming From Let’s Encrypt
Authentication, Privacy

Free Wildcard Certificates Coming From Let’s Encrypt

Let’s Encrypt, the certificate authority that provides free digital certificates for site owners, plans to expand its service soon by offering wildcard certificates, as well, beginning in January. The move is designed to enable site owners to secure their main domain, along with as many subdomains as they own, with just one […]

Europol Dismantles International Fraud Ring
Authentication, Hacking

Europol Dismantles International Fraud Ring

Police have dismantled a payment-card fraud network that stretched across Europe and had the capability to clone payment cards, install skimmers on ATMs, and is responsible for hundreds of thousands of dollars in losses. The fraud ring was operating not just in Europe, but also in the United States, the Dominican […]

Phishing Attacks Using SSL Spike
Authentication, Hacking

Phishing Attacks Using SSL Spike

Phishing crews increasingly are using sites with valid SSL certificates in order to make their attacks appear more legitimate, a new report shows. In the last couple of years it has become much easier and faster for site owners to obtain SSL certificates for their sites, thanks to the emergence […]

RoughTed Malvertising Campaign Bypasses Ad Blockers
Authentication, Hacking

RoughTed Malvertising Campaign Bypasses Ad Blockers

A long-running, multi-faceted, malvertising campaign has been found using a technique that enables the sites involved to bypass the protections of ad blockers. Malvertising campaigns can take a lot of different forms and they often involve multiple layers of compromised or malicious sites and lots of redirections. Some campaigns are […]