Disabling Two-Factor SMS Codes to Avoid Interception
Find out how you can disable your 2FA SMS passcodes to avoid interception by Android trojans and attackers - and use a more secure two-factor authentication method, like Duo Push.
Find out how you can disable your 2FA SMS passcodes to avoid interception by Android trojans and attackers - and use a more secure two-factor authentication method, like Duo Push.
Downloading unsigned and unverified applications onto your mobile, laptop and other devices can expose users to potentially malicious code that can steal your private information, like your SSN or bank account information.
Recently, the Duo Labs team analyzed the current state of security of Android devices. Our large sample includes users' personal devices used to access their employers systems and data, authenticating with Duo's two-factor authentication.
X-Ray is an app anyone can download that safely scans for vulnerabilities on your Android phone or tablet, allowing you to assess your current mobile security risk.
Adobe Flash Player is used to create and play animations, video games, advertisements and mobile apps - it’s considered a software necessity by many users and is used daily. But to criminal and malicious hackers, it’s also easy to exploit, due to many known vulnerabilities in old Flash versions.
Here’s a few basic information security practices you can use to reduce an organization’s risk of a data breach.
The convenience of online shopping is now even more secure, with the addition of two-factor authentication for Amazon customer accounts. Read on to see how to quickly enable the security tool with Duo’s free authenticator app, Duo Mobile, in a few easy steps.
The Duo Labs research paper examines the limitations of Microsoft's Enhanced Mitigation Experience Toolkit (EMET) when applied to processes running under WoW64.
According to the Cloud Security Report 2015 from Alert Logic, cloud environments are mostly affected by significantly increased numbers of app attacks, suspicious activity and brute force.
The total cost of ownership (TCO) of a solution includes all direct and indirect costs of owning a product – for a two-factor solution, that may include hidden costs, such as upfront, capital, licensing, support, maintenance, operating and many other unforeseen expenses over time. Check out our comparison of modern two-factor authentication solutions vs. older, traditional solutions (ones built for a client-server computing model).