article thumbnail

The Story of the 2011 RSA Hack

Schneier on Security

They were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come. Really good long article about the Chinese hacking of RSA, Inc.

Hacking 320
article thumbnail

Vodafone discovered backdoors in Huawei equipment. But it was 2011.

Security Affairs

Bloomberg obtained Vodafone’s security briefing documents from 2009 and 2011 and spoke with people involved in the situation. Bloomberg revealed that once discovered the backdoors in home routers in 2011, Vodafone asked Huawei to address them. But it was 2011. ” reported the AFP. ” continues bloomberg.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011

Security Affairs

Qualys experts discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least since September 2011. Security experts from Qualys discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least since September 2011. openssh-7.8p1/gss-genr.c

article thumbnail

Palo Alto Networks addresses tens of serious issues in PAN-OS

Security Affairs

One of the most severe vulnerabilities, tracked as CVE-2020-2018 , is an authentication bypass vulnerability in the Panorama context switching feature. This vulnerability does not impact Panorama configured with custom certificates authentication for communication between Panorama and managed devices. The issue received a CVSSv3.1

Firewall 136
article thumbnail

Is the demise of OTP authentication imminent?

Thales Cloud Protection & Licensing

Is the demise of OTP authentication imminent? Reducing the risk from credential compromise is forcing regulators and industry leaders to mandate multifactor authentication (MFA) and re-assess the efficacy of OTP. Historical perspective of strengthening authentication. Which authentication method is suitable or do you need many?

article thumbnail

The bleak picture of two-factor authentication adoption in the wild

Elie

This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption. How prevalent is 2FA authentication? in 2011 almost 10 years ago. Methodology. Aude, Brad.

article thumbnail

Twitter Fined $150 Million for Misuse of 2FA User Data

SecureWorld News

This action violated a 2011 FTC order that prohibited the social media site from misrepresenting its privacy and security practices. This information would be used to help reset passwords or unlock accounts, as well as enabling two-factor authentication (2FA). Along with violating the 2011 FTC order, Twitter also violated the EU-U.S.