Remove explaining-mobile-app-security-in-simple-terms
article thumbnail

A Scammer Tried to Scare Me into Buying Their Security Services - Here's How It Went Down

Troy Hunt

Shofiur R" found troyhunt.com on a "free online malware scanner" and tried to scare me into believing my site had security vulnerabilities then shake me down for a penetration test. I *must* see these professional skills in action and reach 100% secure! There were never any of the proclaimed vulnerabilities on my blog.

Scams 198
article thumbnail

How to decrypt WhatsApp end-to-end media files

Errata Security

In this blog post, I show how to decrypt it. The phrase "encrypted downloader" is not a technical term but something the investigators invented. It sounds like a term we use in malware/viruses, where a first stage downloads later stages using encryption. These details are explained below.

Media 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beyond Passwords: 2FA, U2F and Google Advanced Protection

Troy Hunt

Let's start with defining some terms because they tend to be used a little interchangeably. Before I do that, a caveat: every single time I see discussion on what these terms mean, it descends into arguments about the true meaning and mechanics of each. This week, I wanted to focus on going beyond passwords and talk about 2FA.

Passwords 261
article thumbnail

9 Key Takeaways from Ask Us Anything: Passwordless Tips & Tricks

Duo's Security Blog

It’s simple to try. It’s seamless and secure. As you transition toward passwordless, we don’t want you to strip away your other secure forms of authentication. We make it easy for you to move from one stage to another, whether securely falling back to MFA or increasing passwordless logins over time.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

Many people will land on this page after learning that their email address has appeared in a data breach I've called "Collection #1". Most of them won't have a tech background or be familiar with the concept of credential stuffing so I'm going to write this post for the masses and link out to more detailed material for those who want to go deeper.

article thumbnail

Authentication and the Have I Been Pwned API

Troy Hunt

My thinking at the time was that it would make the data more easily accessible to more people to go and do awesome things; build mobile clients, integrate into security tools and surface more information to more people to enable them to do positive and constructive things with the data. The next top ASN is Biznet Networks in Indonesia.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

Not to mention the various spyware apps often installed on kids' phones to track them which then subsequently leak their data all over the internet. The Gator3 watch turned out to have even more serious security flaws, storing parents and kids’ voice messages on an openly available webserver. mSpy leaked data. SpyFone leaked data.

Spyware 279