Security Bits – 5 October 2018 Followups 🇺🇸 The CA IoT security law discussed previously has been signed into law — www.theverge.com/… Google have announced plans to further limit what browser plugins can do in an attempt to crack down on the explosion in plugin-based malware we talked about last time — arstechnica.com/… & nakedsecurity.sophos.com/…
Continue readingMore TagTag: 2fa
NC #646 Clarify, NIST on Two-Factor Authentication, Duplicating DVDs, iPhone X vs 8 Plus Screensizes
This week we’ll talk about some sad news from the makers of my beloved Clarify, then I’ll do a crazy deep dive into the National Institute of Standards and Technology about two-factor authentication. I do this to help you understand what your bank needs to know about using SMS or email or a phone call […]
Continue readingMore TagNIST Rules on Two-Factor Authentication & Influencing Banks
One of the best things about being retired is having the time to talk to companies on the phone. When I was working, I would simply let things go that were irritating me because there just wasn’t the time. This week my mission became talking to every bank I deal with about their security model. […]
Continue readingMore TagTwo-Factor Authorization Not as Bad as I Thought
After a couple of weeks with Apple and Google two-factor authentication running, I thought I should give you an update. After the initial huge pain from Google, and the very mild pain from adding two-factor authentication from Apple, they both settled down and I haven’t been challenged for an authorization code in the last couple […]
Continue readingMore TagGoogle Two-Factor Authentication – Not as Painless as I’d Hoped
Last week on Chit Chat Across the Pond, Bart worked me over yet again that I should do two-factor authentication on my email accounts. I whined a lot as I’m sure you heard. Some of you were thinking, “Oh Allison, quit your whining. It’s not THAT hard and it’s totally worth it because you’re protecting […]
Continue readingMore TagNC #567 Two-Factor Authentication Clarified, Diagnosing a Failing 2.4GHz Network, Podfeet Redirects, Security Bits
We’ll start with a clarification from Bart on how this two-factor authorization works. Then we’ll have fun with redirects as I explain that there’s a podfeet url for whatever you want. I’ll tell you about our amazing adventure trying to figure out what was killing just our 2.4GHz wifi network. In Security Bits, Bart will […]
Continue readingMore Tag