Russell, 2023 - Google Patents
Bypassing multi-factor authenticationRussell, 2023
- Document ID
- 1207337838817589049
- Author
- Russell S
- Publication year
- Publication venue
- ITNow
External Links
Snippet
Increased adoption of multi–factor authentication (MFA) is helping companies and individuals to secure their data more effectively; however, threat actors have been quick to adapt in the constantly evolving security arms race. Steve Russell MBCS CITP CISSP …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101721032B1 (en) | Security challenge assisted password proxy | |
| US9021254B2 (en) | Multi-platform user device malicious website protection system | |
| US10223524B1 (en) | Compromised authentication information clearing house | |
| US9838384B1 (en) | Password-based fraud detection | |
| Mirian et al. | Hack for hire: Exploring the emerging market for account hijacking | |
| US9491155B1 (en) | Account generation based on external credentials | |
| US8984649B2 (en) | Method and system for authenticating user access to a restricted resource across a computer network | |
| US8572701B2 (en) | Authenticating via mobile device | |
| US10038690B2 (en) | Multifactor authentication processing using two or more devices | |
| US10230736B2 (en) | Invisible password reset protocol | |
| US10176318B1 (en) | Authentication information update based on fraud detection | |
| US11070556B2 (en) | Context-based possession-less access of secure information | |
| US20160212113A1 (en) | Techniques for facilitating secure, credential-free user access to resources | |
| US20150052005A1 (en) | Internet site authentication with payments authorization data | |
| Jubur et al. | Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications | |
| US9972013B2 (en) | Internet site authentication with payments authorization data | |
| Bucko | Security of smart banking applications in Slovakia | |
| Hassan et al. | Digital privacy and security using Windows: A practical guide | |
| Russell | Bypassing multi-factor authentication | |
| James | Engineering the human mind: Social engineering attack using Kali Linux | |
| Varshney et al. | Push notification based login using BLE devices | |
| Tolbert et al. | Exploring phone-based authentication vulnerabilities in single sign-on systems | |
| Terneva et al. | Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester | |
| Rahman et al. | Two step verification system of highly secure social media: Possible to breach the security | |
| Mooney et al. | Your Guide to Authenticating Mobile Devices |