Author name: Becky

What’s the Most Popular Form of Two-Factor Authentication in 2023?

A couple of weeks ago, I found myself wondering what the most popular form of two-factor authentication (2FA) is.  Is it the least secure but temptingly convenient SMS-based 2FA that sends you a code via text? Or the more secure but somewhat cumbersome authenticator app that generates codes on your phone? What about the ultra-secure …

What’s the Most Popular Form of Two-Factor Authentication in 2023? Read More »

4 Ways Attackers Can Bypass Two-Factor Authentication and How to Protect Yourself

Enabling two factor authentication (2FA) on your accounts is one of the best ways to keep them safe. But 2FA is not bulletproof. In this post we’ll look at four ways cybercriminals can bypass it and what you can do to protect yourself. How secure is 2FA? Let’s start with a reminder about how 2FA …

4 Ways Attackers Can Bypass Two-Factor Authentication and How to Protect Yourself Read More »

What You Should Do After T-Mobile’s Most Recent Data Breach

T-Mobile has yet again suffered a data breach, this time affecting 37 million customers. The company reported in a press release that criminals pilfered customer names, addresses, email addresses, dates of birth and account numbers by abusing a piece of software called an API that allows computer programs to talk to each other.  T-Mobile emphasized …

What You Should Do After T-Mobile’s Most Recent Data Breach Read More »

Twitter Data Leak

What the Twitter Data Leak Means for You

Private information from over 200 million Twitter users has been published on a popular hacking forum for anyone to download. The data includes users’ email addresses and public information, such as account names and handles. The data was likely obtained in 2021 after bad actors exploited a vulnerability in Twitter’s software. The flaw meant they …

What the Twitter Data Leak Means for You Read More »