Authenticating to remote services with only a password is a thing of the past. Modern attack techniques make theft and reuse of passwords simple, yet we continue to use them to secure pretty much everything. In this post, we will review the various risks associated with password authentication and discuss what can be done to improve our security posture.
Month: July 2017
Recently, the Internet has been overrun with ransomware – software designed to take advantage of users by encrypting their data and holding the keys for ransom. In this post, we will use the concepts of access and authorization to assess this malware and better understand why it was so successful.