Security News

A pairing problem makes an account compromise possible, although improbable Google is offering free replacements of its Titan Security Keys, used for two-factor authentication, after learning the...

G Suite administrators can now prevent enterprise users from using SMS and voice codes as their second authentication/verification factor for accessing their accounts. The ability to disable those...

'This isn’t a mistake now, this is clearly an intentional product choice' says ex-CSO Stamos Another week, another Facebook privacy storm.…

Are you an Apple developer? Care about security? Using 2FA? You will be soon...

Time is money, baby: Jay Brodsky claims that Apple's 2FA "intermeddling" takes minutes out of his day, causing "economic loss."

The CookieMiner malware attempts to extract credentials for cryptocurrency wallets and exchanges, as well as stored password and credit card information.
![Ep. 015 – USB anti-hacking, bypassing 2FA and government insecurity [PODCAST]](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
Here's the latest Naked Security podcast - enjoy!

Our reader poll showed overwhelming support for 2FA even in the wake of a bypass tool being released -- although lingering concerns remain.

Take our short poll to weigh in on the state of two-factor authentication.

A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.