STE WILLIAMS

Syrian Electronic Army Members Indicted for Conspiracy

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army.

A federal grand jury has returned an 11-count indictment against two Syrian men, who have been charged with multiple counts of aggravated identity theft and their involvement in a conspiracy to commit computer hacking as members of the Syrian Electronic Army (SEA).

The indictment alleges that Ahmad ‘Umar Agha, who goes by the online alias “The Pro,” and Firas Dardar (“The Shadow”) conducted spearphishing attacks on the US government, military, international organizations, and several private-sector entities including the US Marine Corps, Executive Office of the President, NASA, The New York Times, USA Today, Time, Human Rights Watch, National Public Radio, and several other organizations and individuals.

When their operations were successful, Agha and Dardar allegedly used stolen credentials to deface websites, steal email, hijack social media accounts, and redirect domains to sites their conspiracy controlled or utilized.

The alleged offenses of conspiracy, and conspiracy to commit wire fraud, have maximum prison terms of five and 20 years, respectively. Charges for aggravated identity theft have a collective mandatory term of two years in prison, with a maximum of 18 years.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/syrian-electronic-army-members-indicted-for-conspiracy/d/d-id/1331842?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

New Mexico Man Sentenced on DDoS, Gun Charges

Using DDoS for hire services and possessing firearms as a felon combine to land a New Mexico man 15 years in federal prison.

Using DDoS for hire is a losing strategy…especially if you get caught. That’s the lesson a New Mexico man is learning at the hands of a federal judge in Minnesota. John Kelsey Gammell was sentenced to serve 180 months in prison by US District Judge Wilhelmina M. Wright after he pleaded guilty on Jan. 17 to one count of conspiracy to cause intentional damage to a protected computer and two counts of being a felon-in-possession of a firearm.

According to statements made as part of his guilty plea, Gammell conducted DDoS attacks on dozens of websites, including websites operated by companies he used to work for, companies that declined to hire him, competitors of his business, and websites for law enforcement agencies and courts.

Gammell used both his own computers and DDoS for hire services, including VDoS, CStress, Inboot, Booter.xyz, and IPStresser to launch the attacks. He then tried to hide his involvement with a variety of tactics, from spoofing IP addresses and using cryptocurrency to pay for the services to encrypting and scrubbing hard disks on his personal computers.

A hearing on restitution to the victims will be held at a later date.

For more, read here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/new-mexico-man-sentenced-on-ddos-gun-charges/d/d-id/1331843?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

How to find lost USB drives (even if you don’t want to) [PODCAST]

Here’s Episode 4 of the Naked Security podcast.

Charlotte Williams talks to Sophos experts Matt Boddy and Paul Ducklin about the EFAIL in email, a gift-horse bug in Red Hat Linux, and what happens when sniffer dogs join your cybersecurity team.

If you enjoy the podcast, please share it with other people interested in security and privacy and give us a vote on iTunes and other podcasting directories.

Further reading

Listen and rate via iTunes...
Sophos podcasts on Soundcloud...
RSS feed of Sophos podcasts...

Intro music: http://www.purple-planet.com

Closing music: https://codices.bandcamp.com

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/noTkMCr9e9M/

Don’t invest! The ICO scam that doesn’t want your money

HoweyCoins: What an incredible opportunity to get into cryptocurrency! No risk, an a-MAZ-ing average registered coin return of 72% over a two-month period in 2017, and some very impressive celebrity endorsements.

If @boxingchamp1934, @realdrummerstar, and @mcwhortle are endorsing it, “you know it’s serious business,” as Crypto Economist put it. #nextbigthing, for sure!

…Or then again, #nextbrilliantSECparody of come-ons for what many call sh*tcoins. If “HoweyCoins” sounds too good to be true, that’s because it is. It’s pure fertilizer.

The US Security and Exchange Commission (SEC) is behind the spoof site. On Wednesday, it said that HoweyCoins are an opportunity you won’t want to miss: Act now! …after which it explained that it’s actually behind HoweyCoins.com, which mimics a bogus coin before offering to educate investors about what to look for before they invest in a scam initial coin offering.

Anyone who clicks on “Buy Coins Now” will be led instead to investor education tools and tips from the SEC and other financial regulators.

Many people fall for these initial coin offering (ICO) scams. ICOs are unregulated fundraising techniques with a very dodgy reputation. They involve using cryptocurrencies like Bitcoin and Ethereum to buy “tokens” from a startup: if the company takes off, they’ll theoretically be worth something.

Or, alternatively, you’ll be stuck with an empty wallet as exit-scammers make off with the loot – possibly leaving nothing but the word “penis” on their website.

It’s not like the internet biggies haven’t tried to scrub their sites of ads for these cons. Twitter banned ICO ads in March after doppelgangers impersonated the verified IDs of well-known figures such as John McAfee, Elon Musk and Ethereum co-founder Vitalik Buterin, soliciting cryptocurrency investment and promising eye-popping return rates.

For its part, Facebook implemented a ban on cryptocurrency ads in January, and Google announced a new restricted financial products policy that will come into force in a few weeks.

Reddit, a lively forum for cryptocurrency discussion, also quietly banned cryptocurrency ads as early as 2016.

Head over to HoweyCoins’ pre-ICO sale, and you’ll be greeted with a ticking countdown clock for the supposed token sale.

Featuring photos of luxury pools, champagne by the beach, and sailboats bobbing in sparkling waters, the parody site offers visitors the:

EXCLUSIVE OPPORTUNITY TO PARTICIPATE IN
HOWEYCOINS TRAVEL NETWORK NOW!

HoweyCoins are purportedly all about combining blockchain technology and travel: the SEC set up the bogus site to explain them as “the newest and only coin offering that captures the magic of coin trading profits AND the excitement and guaranteed returns of the travel industry.”

Instead of earning loyalty points in airfare, hotel stays, car rentals and more, you can instead earn coins to trade for profit, the site promises.

“Massive potential upside benefits,” the site claims, with HoweyCoins being “officially registered with the US government.” Better still, the supposed coins “will trade on an SEC-compliant exchange where you can buy and sell them for profit.”

Boil it all down, and you come up with a piping hot cup of bogus.

SEC Chairman Jay Clayton said the commission isn’t against new technologies. It just wants investors to “see what fraud looks like.”

The rapid growth of the ‘ICO’ market, and its widespread promotion as a new investment opportunity, has provided fertile ground for bad actors to take advantage of our Main Street investors.

We embrace new technologies, but we also want investors to see what fraud looks like, so we built this educational site with many of the classic warning signs of fraud.

The SEC did a brilliant job with the site. The commission even included a downloadable white paper that tries to lure investors with a pledge of holiday discounts and cost savings of 30% to 40% based on “projected” HoweyCoin future values, plus a warning that these savings will likely decrease after the ICO event.

And then there are those celebrity endorsements: if you look up their Twitter handles, you’ll see blank accounts that have never tweeted.

The @mcwhortle account is the best of all: fans of SEC humor will recognize that it’s a reference to another slick SEC parody. In 2002, in order to call attention to online investment scams, the commission created McWhortle Enterprises Inc., a phony purveyor of a handheld biohazard detector guaranteed to beep and flash in the presence of anthrax or other deadly germs, including the flu. The fake device was supposed to fit in a coat pocket: the perfect investment opportunity in a post-9/11 world.

Company president “Thomas McWhortle III” would be so proud to once again make an appearance on an SEC fake scam site!


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/Ve8kVxArOII/

ZipperDown catches 170,000 iOS apps with their pants down

These days, there seem to be two types of security vulnerabilities – those with alarming names and eye-catching logos, and those that make do with mere CVE numbers.

The latest example of the naming trend is ZipperDown, uncovered by Chinese jailbreakers Pangu Lab, affecting iOS apps and possibly some Android ones too.

The company offers only minimal detail on the flaw beyond, describing it as:

A common programming error, which leads to severe consequences such as data overwritten and even code execution in the context of affected apps.

This sounds like trouble but this time the eye-catching bit is the number of apps the company believes might suffer from it – 15,978 (9.5%) of 168,951 iOS Apps in the App Store, a collection of computer programs that have been downloaded about 100 million times.

They admit this is a guesstimate due to the impossibility of checking such a large number of apps individually.

As for other platforms:

We have confirmed that many popular Android apps have similar issues. We will release more results for Android apps in future.

The company manually verified that a number of Chinese apps are affected including Weibo, MOMO, NetEase Music, QQ Music and Kwai, while Instagram, Pandora, Dropbox, Amazon and a Google app or two are on the long list.

Working out which apps are affected will require developers to carry out manual checks, app-by-app.

On the face of it while ZipperDown sounds like a big issue, as flaws-with-their-own-names go this one is probably a bit second division.

As Pangu Lab alludes to in its advisory, exploiting it appears to require control of a Wi-Fi network, for example using a compromised public hotspot. That’s not hard to imagine happening but still limits the chances of compromise for most users.

The company also admits:

The sandbox on both iOS and Android can effectively limit ZipperDown’s consequence.

An unsettling aspect of the alert is that while the company has kept the guts of the flaw to itself (to give app developers time to check for the problem and fix it), further details seem to be known elsewhere, with some claiming the problem is a path traversal issue in a utility called ZipArchive.

If that’s true, exploits might not be far off. App makers need to check their software for the issue and correct it as soon as possible.

Whatever else it is, ZipperDown is an unusual flaw. With so many apps apparently affected, and so many app developers needing to be informed, responsible disclosure becomes a huge communications issue. As much as we might dislike the trend for PR-first vulnerability naming, perhaps giving this flaw a fancy name and its own badge was the right attention-grabbing tactic in this case.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/7-M40eXNbxU/

Senate votes to restore net neutrality… but don’t get your hopes up

Six months ago, the Federal Communications Commission (FCC) repealed net neutrality.

On Wednesday, the US Senate pulled a rabbit out of its hat and (attempted to) defy the FCC, voting to keep net neutrality.

On Thursday morning, pro-net neutrality politicians rejoiced. Then, we woke up to smell the coffee, and a whole lot of wishful thinking went down the drain. It’s highly unlikely that the Republican-controlled House of Representatives will approve of rolling back the FCC’s repeal, and the White House has already said it’s all for scrapping net neutrality.

Even in the Senate, the keep-net neutrality vote passed by a whisker, with the help of three Republicans who broke party ranks. As Reuters reports, the 52 to 47 vote in the Senate was larger than expected, as Republicans John Kennedy, Lisa Murkowski and Susan Collins voted with 47 Democrats and two independents to reverse the Trump administration’s action.

It’s not even clear if the House will get to vote on the issue. Representative Mike Doyle, a Democrat, said on Wednesday that he plans to launch a discharge petition to try to force a companion vote in the House.

This is what Doyle said at a press conference after the Senate passed its bill:

It’s about protecting small businesses, students, innovators, entrepreneurs and competition. These are the policies that every American benefits from, and it enables our modern economy.

That’s why I have introduced companion [a resolution under the Congressional Review Act, or CRA] in the House and I’m going to continue to work with the leadership in the House to bring this to the floor.

The CRA is a 1996 law that allows Congress to effectively erase certain regulatory actions by a federal agency within 60 congressional days of their enactment. CRA resolutions only require a simple majority to pass the House and Senate, meaning they can’t be filibustered, but they still need the president’s signature.

In the driest of terms, net neutrality prevented service providers such as ATT, Comcast and Verizon from interfering with internet traffic, favoring their own sites and apps, jacking up rates for decent speed, and elbowing everybody else off to putter in the internet slow lane.

Critics of net neutrality, including the net neutrality ringleader, Republican FCC Chairman Ajit Pai, along with President Trump, claim that over-regulation has been stifling innovation.

Some of our readers have put it in much juicier terms.

Laurence Marks, on all this supposedly stifled innovation:

In the last 20 months ATT, Google Fiber, and Celito (local firm) have each run fiber through my front lawn and are inviting me to connect for Gigabit service at prices similar to or lower than what I’m currently paying for 18 Megabit service. Sounds like innovation to me.

John C, on the anti-net neutrality “disciples” who claim that nothing will change and none of the predicted changes in internet pricing/access will come to pass:

If that’s the case, why do the ISPs care about it? Obviously they want a change to the rules so they can change their practices. Duh!

You weren’t all convinced though. CppThis chimed in with:

 If ISPs push too hard, customers will jump ship. Those with “gigabit” residential lines will get throttled and rerouted, but this already happens at the hardware level anyway…

Net neutrality rules are set to be rolled back on 11 June. It will be done in spite of a survey of registered voters that found that most people support bans on blocking, throttling and paid prioritization. Most, as in nearly all: A study funded by the broadband industry found that 98.5% of the unique comments (as in, not spam or form letters) on the FCC’s plan supported net neutrality.

That support is bipartisan.


Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/CMhe6ICLGKw/

New Research Seeks to Shorten Attack Dwell Time

It can take months for an organization to know they’ve been hacked. A new DARPA-funded project seeks to reduce that time to hours.

One of the major issues in IT security is not that attacks and exploits are successful. It’s that they’re successful and then go unnoticed for so long. A new DARPA-funded research project at Georgia Tech is applying a variety of techniques to dramatically reduce the “dwell time” of an attack from the current average of more than 6 months to as little as 24 hours.

The DARPA grant gives a team of researchers $12.8 million over four years for the “Gnomon” project. Gnomon’s approach is based on the admission that breaches are inevitable. What the project aims to do is examine the behavior of the devices and systems attached to the network to tell when something begins to exhibit suspicious behavior and allow professionals or automated systems to immediately begin remediation.

Gnomon’s operation doesn’t rely on identifying malicious files at all. “We’re not looking at the malware, because they might not use malware, they might use something like Powershell,” says co-principle investigator Manos Antonakakis, an assistant professor in Georgia Tech’s School of Electrical and Computer Engineering. Instead, the behavior-based tactics seek to mitigate one of the attackers’ primary advantages over defenders.

“One study we did last year showed that threats are live in the wild for many months before we even get a sample,” says Antonakakis. The study says, “…the PUP [potentially undesirable program]-related domains are active an average of 192 days before we get to dynamically analyze the corresponding samples.”

The sheer number of domains (and therefore malware families) profiting from a delay in analysis is huge. Again, from the research for the study, “…302,953 malware domains were active at least two weeks — in some cases many months — before the corresponding malware samples were analyzed.”

Analyzing behavior of large networks in real time requires massive compute power. In Gnomon’s case, that power is used in service to “dynamic intelligence.” Asked to define dynamic intelligence and differentiate it from machine intelligence or AI, Antonakakis says, “Dynamic intelligence is based on the dynamic modeling concept. You can build models that can characterize both short term and long term behavior.” The dynamic model that looks at object behavior over time is critical to the analysis.

Once malicious behavior has been identified, network security professionals must still figure out what to do about it, for example, whether blackhole, honeypot, system rebuild, file remediation, or some other action is warranted. Antonakakis says that his researchers gained insight into the answers when doing work on how best to take down botnets. The goal for Gnomon is straightforward if initially counter-intuitive; make malware more complicated.

“What this project will do in 3 – 4 years is that it increases the load for the adversaries; it makes them work harder,” Antonakakis says. “If they do that, they have to engage in more complicated attacks, and that increases the chance that they will make mistakes that will help us identify them earlier.”

In addition, complicated malware and malicious activity tends to stand out more vividly than does simple software. Today, Gnomon is working with two unnamed U.S. telecommunications companies to analyze networks and pass along information. “You need to study the domain knowledge you have about the threats multiple times through the day, and do that across the networks you’re protecting,” Antonakakis says. “Our goal is to be able to detect a change in behavior in under 24 hours.”

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/new-research-seeks-to-shorten-attack-dwell-time/d/d-id/1331837?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

LocationDumb: phone tracker foul-up exposes world+dog to tracking

The parade of bad privacy news this week has managed to get even worse, as one of the companies associated with the selling of phone locations for cash scandal was subject to a publicly exploitable bug.

Researcher Robert Xiao says LocationSmart was running a site riddled with vulnerabilities that could allow anyone to look up the location of virtually any mobile phone in the US. Xiao says he reported the bug to the company, who has since patched it on their site.

Xiao, currently at Carnegie Mellon University (he’s set to become an assistant professor at the University of British Columbia this Fall), found that a demo feature the company offers on its site could be abused to look up the location of anyone without their knowledge.

LocationSmart was among the companies dragged into the public eye this week when it was named among the location-tracking sources used by Securus, a US telco accused of illegally giving tracking data to police. LocationSmart pitches its services for areas like opt-in marketing, company device management, and Internet of Things services.

To help sell its tracking services (for legitimate uses), LocationSmart allows users to perform a “demo” search by entering their own phone number, replying to an opt-in test, then seeing their own location.

Normally, the opt-in feature would protect user privacy by only letting a user track a phone they owned. Unfortunately, as Xiao found, simply editing one line of POST request sent to the site – and asking for the location as a .json instead of an XML snippet- bypasses the requirement for this check.

“Essentially, this requests the location data in JSON format, instead of the default XML format,” Xiao explains.

“For some reason, this also suppresses the consent (‘subscription’) check.”

Xiao also provided a proof of concept script to show how the (since patched) vulnerability could be exploited in the wild.

LocationSmart did not respond to a request for comment on the matter. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/05/18/phone_tracker_foulup/

Federal Jury Convicts Operator of Massive Counter-Antivirus Service

Scan4You helped thousands of criminals check if AV products could detect and block their malware tools.

A federal jury in Virginia has convicted Latvian resident Ruslans Bondars on charges related to his operation of Scan4You, one of the largest counter-antivirus (CAV) services in the cyber underground before it was shut down in 2016.

After a five-day trial, the jury found Bondars guilty of felony hacking, wire fraud, and other charges connected with operating the service, which offered threat actors a way to check if their malware was detectable by antivirus tools. At least 30,000 people used the illegitimate service to vet their malware before distribution during the period Scan4You was operational, between 2009 and 2016.

Among the many criminal hackers that used Scan4You to test and improve their malware was the group behind the Target breach that exposed data on more than 40 million credit cards in addition to nearly 70 million email addresses. Another threat actor used Scan4You to assist in the development of the widely distributed Citadel Trojan, which infected more than 11 million computers worldwide and resulted in some $500 million in fraud losses, the US Department of Justice said in a statement.

Russian national Jurijs Martisevs, an individual who assisted Bondars in operating Scan4You, pleaded guilty to his role in March and is awaiting sentencing. Both men were arrested last year in Latvia and extradited to the US amid protests by Russia that Martisevs’ arrest was actually a kidnapping.

“At its height, Scan4You was one of the largest services of its kind and had at least thousands of users,” the DOJ said in its statement this week. “Malware developed with the assistance of Scan4You included some of the most prolific malware known to the FBI and was used in major computer intrusions committed against American businesses.”

Security vendor Trend Micro, which played a major role in helping law enforcement take down Scan4You, has described it as the first widely available CAV service that criminals could use to test their malware against modern antivirus tools.  

The service allowed almost anyone to submit a malicious file and verify if antimalware tools would flag it as malicious. Malware authors used the service to scan millions of files, including keyloggers, remote access Trojans, crypters, and entire malware tool kits.

Unlike legitimate malware-scanning services, which share scanning results with the broader community, Scan4You provided the results of its scans only to the individual submitting the file. Bondars and Martisevs offered up to 100,000 scans per month for just $30, with acceptable forms of payment including PayPal, Bitcoin, and WebMoney. Trend Micro estimates that, at its peak, Scan4You earned its operators some $15,000 a month.

Prior to Scan4You’s launch in 2009, such anonymous scanning services where only available privately within the most organized of criminal enterprises, says a security analyst at Trend Micro who did not wish to be identified.

Examples of groups that used such services privately include Rove Digital, an Estonian click-fraud gang, and the Mevade group from Israel and Ukraine. “Scan4You made such a service available to the masses — greatly increasing the effectiveness of their malware attacks,” the security analyst says.

Over the years, other CAV providers, including resellers of Scan4You services, have popped up, but they haven’t been quite as successful. The biggest remaining CAV service is VirusCheckMate, an operation that doesn’t appear to have benefited a whole lot from Scan4You’s takedown, says the Trend Micro analyst.

One reason could be the relative complexity and low payoffs from operating a CAV service. “To run a CAV service is quite technically challenging, as you need to maintain a separate virtual machine for each of the AV products that your service supports,” the analyst says.

“So, if a CAV allowed scanning with 30 AV scanners, that is 30 different virtual machines to maintain.” Each of those machines would need to be both constantly up to date with the latest malware definitions and also disabled from sending feedback to the vendors in question, the Trend Micro security analyst notes. CAV operators also need to create code for automating the malware submission process and for retrieving the results out of custom security software logs.

“Being operators of Scan4You was likely quite prestigious in cybercrime circles” for Bondars and Martisevs, which explains why they persisted with the operation for eight years, the analyst says. The pair also was involved with other malicious services and groups—most notably Eva Pharmacy, one of the oldest and largest pharmaceutical spam gangs—which likely also brought in money.

For the moment, it is unclear why cybercriminals that were using Scan4You have not yet migrated to other CAV services like VirusCheckMate. “But this is a welcome trend,” the Trend Micro analyst says.

One big hope is that the Scan4You takedown has had a deterrent effect on cybercriminals and will force them to either maintain their own private CAV service or to release their malware without testing. “All of those outcomes drive up the cost of doing business for cybercriminal operators,” the analyst says.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/federal-jury-convicts-operator-of-massive-counter-antivirus-service-/d/d-id/1331836?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cracking 2FA: How It’s Done and How to Stay Safe

Two-factor authentication is a common best security practice but not ironclad. Here’s how it can be bypassed, and how you can improve security.PreviousNext

(Image: Golubovystock via Shutterstock)

(Image: Golubovystock via Shutterstock)

Two-factor authentication is common but hackable. If you haven’t implemented 2FA, there’s a good chance you’re in the process. It’s a growing best practice, especially in the workplace where growing stores of sensitive data demand employees strengthen their login security.

But 2FA isn’t a guaranteed shield against cyberattacks. It can be bypassed, as most recently demonstrated by KnowBe4 chief hacking officer Kevin Mitnick in a hack last week. Mitnick used a phishing attack to prompt users for their LinkedIn credentials. When they were entered into the fake login page, the attacker could access their username, password, and session cookie. When Mitnick plugged the target’s session cookie into his browser, he didn’t need the second-factor code to log into the LinkedIn account.

Cracking 2FA isn’t new; hackers have presented these types of exploits as concepts at conferences like Black Hat. But Mitnick’s demo put the code into context for everyday users and showed them their second factor is hackable.

A challenge with implementing two-factor authentication is enforcing a policy that employees may consider inconvenient.

“It’s always a matter of trying to balance usability and security,” says Joe Diamond, director of security product management at Okta. Most companies err on the side of usability to stay on employees’ good sides, but they run the risk of neglecting stronger security factors.

Here, we take a closer look at cyberattacks that can bypass two-factor authentication: how they are done, when they typically happen, which methods are most and least common, and how you can protect your employees from these types of exploits.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full BioPreviousNext

Article source: https://www.darkreading.com/endpoint/cracking-2fa-how-its-done-and-how-to-stay-safe/d/d-id/1331835?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple