https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png 0 0 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2014-10-30 16:45:492016-08-22 13:54:07The Full Story on Passwords
Every day news breaks of yet another retailer or bank security breach that lets criminals get access to financial and personal customer information. Stolen credentials used to get stamped onto physical cards intended for fraudulent brick and mortar purchases, but chip-and-pin cards and online retailers have changed the game. While the stolen credit card number still has a nominal value, there is a major shift underway as thieves understand the greater value of the customer information, like username and password. …
https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png 0 0 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2014-10-28 14:10:242016-08-22 14:54:50Lessons about Logins from the JP Morgan Breach
JP Morgan is another example of a company that was able to detect and clear out its compromised system without a third party notifying them of suspicious activity. The infiltration lasted two months, from mid-June to mid-August of this year. It was their own internal investigations that lead them to the discovery of a customized piece of malware that was leeching gigabytes of data that was routed through multiple countries before ending in up a large Russian city. While JP …
https://nudatasecurity.com/wp-content/uploads/2013/11/credit-cards.jpg 1500 2100 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-11-12 09:45:082018-06-11 15:40:44How criminals can instantly buy your identity
In the middle of teaching his Journalism class at NYU, Adam Penenberg’s laptop stops but it’s not frozen. A grey screen appears and directs him to dial a number to unlock his computer. Bemused, as the lecture grinds to a halt, he reaches for his phone. It won’t accept his PIN code. He’s been hacked. You might not be aware that hijacking somebody’s life – full-scale identity theft – doesn’t require any hacking expertise. Just criminal intent and some spare …
https://nudatasecurity.com/wp-content/uploads/2013/10/2FA-Token-Key.jpg 2699 4047 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-22 17:48:402018-06-25 09:14:36Increase E-Commerce Profits using Risk Based Authentication
Most websites use the combination of usernames and passwords. Both are items that a user knows. Asking “what street did I grow up on”, is just asking more things that a user knows, firms that do this are just implementing more KBA’s. Economics of Authentication To use some basic economics, the addition of the password as opposed to not requiring validation has a huge marginal benefit to the company. Implementing a second, and third and forth has an ever decreasing …
https://nudatasecurity.com/wp-content/uploads/2013/10/yahoo_mail_security_questions.jpg 418 600 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-10 15:49:522019-11-04 10:41:024 Big Problems with Knowledge Based Authentication
Let’s look at the traditional method of Knowledge-based authentication to understand its shortfalls. Background Since the dawn of the web, online account authentication has barely changed. A user would input their username (email or screen name) and follow up with a password. This is the foundation of knowledge-based authentication (KBA) For companies that aim to appear more secure, it isn’t uncommon for them to use knowledge-based authentication questions in addition to your password. I bank with two different bank accounts; …
Still have questions?
Call: +1 (604) 800-3711
* These fields are required.