Skip to main content

The WiKID Blog

Viewing posts tagged Two Factor Authentication

An Analysis of the Inevitable Analyses of the Gawker Password Breach

Here we go again.  Another attack results in a password file being posted on the Internet.  Queue the analysis of the password file.  State how users always choose the simplest passwords and cannot be trusted with their own security choices.  Of course, this is a great time for WiKID to note that two-factor authentication solves this problem. 

HTML5 software token tutorial & some comments

We've published a short-tutorial on how to install the WiKID HTML5 software token over on Howtoforge!  

Cloud Security and Two-factor authentication

We've recently partnered with VM Racks, Inc a secure virtual hosting specialist for their HIPAA-compliant ESX VMware Hosting service.   There are three take-aways from this news:

Traditional two-factor authentication is dead.

At Bsides Atlanta last week, Eric Smith (@infosecmafia) and Dave Kennedy (@dave_rel1k) demonstrated a real-time attack against a Juniper SSL-VPN that by-passes the authentication method used including time-bound one-time passcodes.  (Dave's post on "Traditional Penetration Testing is DEAD" on their BSidesAtlanta talk inspired my title. ;)

This type of attack against SSL and DNS has been predicted for some time, taking advantage of user's willingness to accept any SSL certificate.  Kudos to Eric and Dave for showing how this type of attack combined with a strategically aimed penetration test can really wreak havoc on an enterprise.

A world without static passwords

I wanted to quickly clarify my brief twitter rant about SMS authentication.  This was all started by Chris Wysopal's tweet about Zeus's new mobile MiTM attacks and that "phones are not secure enough for 2 factor".  Zeus is now targeting the text messages that banks are using for authenticating transactions.

Recent Posts

Archive

2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom