Remove Authentication Remove Government Remove Malware Remove Nonprofit
article thumbnail

The anatomy of a Facebook account heist

Vox

He now works as a threat hunter at the National Cyber Security Center (NCSC) in Vietnam, in addition to serving as the co-founder of Chống Lừa Đảo, an anti-scam nonprofit. From there, the hackers can change passwords and add security keys or two-factor authentication, and usually, they proceed to commit a crime.

Groups 141
article thumbnail

Should You Have a Business Email Compromise Incident Response Plan?

SecureWorld News

Weaponization - While most BEC attacks don't involve malware, it isn't completely unheard of. But for the most part, the BEC "weaponization" process is more aligned to compiling the reconnaissance to develop authentic-appearing email accounts and messages. Should you have a BEC Incident Response Plan?

article thumbnail

GeekWire Awards 2020 revealed: Big winners, celebrities and surprises power virtual event

GeekWire

based startup that helps developers build identity authentication capabilities into their applications, reached that status last year with a massive $103 million round. Its platform includes services including single sign-on, two-factor authentication, password-free login capabilities and the ability to detect password breaches.