Microsoft enforces number matching to fight MFA fatigue attacks

Bleeping computer reports* Microsoft has started enforcing number matching in Microsoft Authenticator push notifications to fend off multi-factor authentication (MFA) fatigue attacks. In such attacks (also known as push bombing or MFA push spam), cybercriminals flood the targets with mobile push notifications asking them to approve attempts to log into their corporate accounts using stolen … More Microsoft enforces number matching to fight MFA fatigue attacks

Gmail gets blue verification checks to protect against spoofing and phishing

According to ZDNet*, Google will give blue checkmarks to some verified senders to ensure trust and confidence with Gmail users. Google announced that these companies will also receive a blue checkmark next to their email names to increase users’ confidence. Google says this feature is essential because increased authentication stops spam emails and betters the … More Gmail gets blue verification checks to protect against spoofing and phishing

Media expresses fears hackers could take British Coronation broadcast offline

Daily Telegraph* claims International cyber-terrorists could target live broadcasts during the Coronation in order to take the ceremony off the air and score a propaganda coup. British newspaper suggests foreign hackers* are the most capable and likely of launching a cyber attack and report that broadcasters say they are taking preventative measures to protect their … More Media expresses fears hackers could take British Coronation broadcast offline

Creating strong, yet user‑friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization. When engineer Bill Burr from the U.S. National Institute of Standards and Technology (NIST) wrote in 2003 what would soon become the world’s gold standard for password security, … More Creating strong, yet user‑friendly passwords: Tips for your business password policy