article thumbnail

Take the Unhackable MFA Challenge

Cisco Security

Therefore, we are challenging every Cisco employee, cyber fan, security and IT Pro and Unhackable podcast listener to take a small step and contact someone right now to tell them you’ll help them with MFA. To take this challenge, we are asking you to simply share your pledge on the social media platform(s) of your choice. Pledge Copy.

article thumbnail

Navigating the Web of Romance Scams: A Guide for Businesses and Consumers

Webroot

Understanding Romance Scams Romance scams involve fraudsters creating fake profiles on dating sites, social media platforms, or apps to establish relationships with victims, gain their trust, and eventually, scam them out of money. This transparency can be crucial in preventing security risks to the business.

Scams 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interesting Reads, August 19

Adam Shostack

If you needed more reasons to move away from using SMS-based authentication, and treating phone companies as trusted, “ AT&T employees took over $1 million in bribes to plant malware and unlock millions of smartphones: DOJ “ Abuse reporting systems are being abused. You need to threat model and play the chess game.

Media 113
article thumbnail

PCI v4 is coming. Are you ready?

Pen Test Partners

businesses gain the flexibility to define and deploy personalized security measures aligned with their specific cardholder data environment (CDE) setup. The innovative Customised Approach empowers well-established organisations to intricately specify their existing security controls to fulfil the objectives for each requirement.

article thumbnail

Chart a course to the passwordless future on World Password Day

SC Magazine

Here are some best practices to consider when giving users a more efficient and secure way to login: Beware of shared secrets. Does the organization use a shared secret to authenticate users? When adding security to the login process, it’s imperative to make sure it doesn’t inhibit user productivity. Eliminate passwords.

article thumbnail

Be Wary of Scammers in the Holiday Season

Security Through Education

In October, Cybersecurity Awareness Month taught us the importance of safe practices such as the use of multifactor authentication, strong passwords, and VPNs. One instance to be careful of is when posting on social media. Also, beware of fake in-app purchases or shared links on social media.

Scams 59
article thumbnail

NY Man Pleads Guilty in $20 Million SIM Swap Theft

Krebs on Security

Unauthorized SIM swaps often are perpetrated by fraudsters who have already stolen or phished a target’s password, as many financial institutions and online services rely on text messages to send users a one-time code for multi-factor authentication. Ellis Pinsky, in a photo uploaded to his social media profile.