Video

Play Video

Podcast

LISTEN ON

Facebook
Twitter
LinkedIn
Email
Skype
WhatsApp
Telegram

Episode 48

Websites are requiring that you provide a text message for a false sense of security. Two methods of defeating 2nd auth are explained in this episode and a strategy for security that you should adopt.

Problems Plague Second Auth

Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. The suppression of information is a danger to all of us.  Social media attempts to shape news and information by over-amplification of disinformation. This podcast hope to give information and provide insights from 
 
 

Join our community!!
Subscribe to the Insecurity Brief podcast now on every platform we can find

Follow me on Twitter

@trip_elix

 

A New Phone Scam Bypasses Two-Factor Security Codes

ThioJoe
Know about it so you won’t get tricked!

 

Join the fight against phishing

https://phishtank.org/

Timely. Accurate. Relevant Phishing Intelligence.

https://openphish.com/

Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits

For over a decade, phishing toolkits have been helping attackers automate and streamline their phishing campaigns. Man-in-the- Middle (MITM) phishing toolkits are the latest evolution in this space, where toolkits act as malicious reverse proxy servers of online services, mirroring live content to users while extracting credentials and session cookies in transit. These tools further reduce the work required by attackers, automate the harvesting of 2FA-authenticated sessions, and substantially increase the believability of phishing web pages.

https://catching-transparent-phish.github.io/

Search

Trip's Books

Subscribe to

The Insecurity Brief
RadioPublic Podcasts
Pocket Casts Podcasts
Breaker Podcasts
Soundcloud Podcasts
IHeart Podcasts
Rss Feed
Subscribe via Email

About The Host

Trip Elix

Trip Elix is an author, podcaster and video personality Over the last 30 years, he has worked as a security analyst and privately as a consultant, investigator, forensic technician, and skip tracer. He is the author of books and gives talks on security and privacy.

You May Also Like

Copy & Paste Exploit
How To Tell If Your Device Has A Virus
Chinese Propaganda Targets Redefining Democracy Uses Bots To Spread Message