Your source for IT news and tech tips.
| New Tool Automates Phishing Attacks That Bypass 2FA | ZDNet | A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka — the English pronunciation of the Polish word for mantis — this new tool was created by Polish researcher Piotr Duszyński. Modlishka is what IT professionals call a reverse proxy, but modified for handling traffic meant for login pages and phishing operations. | What Does a Successful Security Program Look Like? | BetterCloud Monitor | In the era of data breaches, what makes up a successful security program? BetterCloud’s Senior Security Architect Austin Whipple shares what success and failure look like in a security program. After reading this article, you’ll come away with a few ideas you can implement right away. Here’s what he’s seen work. | Microsoft Upgrades Teams Mobile App to Woo Frontline Workers | Computerworld | With location sharing, a camera module, and audio-message sharing functions added to its team collaboration app, Microsoft hopes to draw in ‘first-line’ staffers. | Who Cracked El Chapo's Encrypted Chats and Brought Down the Mexican Drug Kingpin? Er, His IT Manager | The Register | In an extraordinary twist, it was revealed this week that the man most likely responsible for bringing drug kingpin "El Chapo" Joaquin Guzman to justice was none other than his sysadmin. Two months into the trial in New York, the FBI admitted that it had been able to access hundreds of phone calls made by Guzman and his associates via a custom encryption system because they had flipped the IT guy that set it up, systems engineer Cristian Rodriguez. |
|
|
|