Hardware wallet manufacturer Trezor has explained how its Twitter account was compromised - despite it having sensible security precautions in place, such as strong passwords and multi-factor authentication.
Read more in my article on the Hot for Security blog.
Category: wallet
Anyone who works in computer security knows that they should have two-factor authentication (2FA) enabled on their accounts.
2FA provides an additional layer of security. A hacker might be able to guess, steal, or brute force the password on your accounts - but they won't be able to gain access unless they also have a time-based one-time password.
So, how come Mandiant didn't have 2FA protecting its Twitter account?
Web3 security outfit CertiK has fallen foul of scammers, who managed to hijack its Twitter account to share a malicious link to a fake version of the Revoke.cash project.
Google-owned cybersecurity company Mandiant has found itself in the awkward position of having to wrestle back control of its Twitter account, after it was hijacked by scammers yesterday.
No one is too big, too clever, too security-savvy to avoid being duped - because it's only human to make a mistake and screw up.
Read my article on the Tripwire State of Security blog.
Cybercriminals have developed a new malware threat which can steal highly sensitive data from the Mac computers it infects.
A man loses $650,000 from his cryptocurrency wallet after his Apple iCloud account is hacked, video conferencing apps may not be muting your mic quite the way you imagined, and Google has unblurred military bases in Russia... or has it?
All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.
Cryptocurrency wallet maker MetaMask has warned its 21 million monthly users to be wary of Apple iCloud backing up their app's data by default, after attackers successfully stole $650,000 of funds and NFTs.
Read more in my article on the Hot for Security blog.