[go: up one dir, main page]

Russell, 2023 - Google Patents

Bypassing multi-factor authentication

Russell, 2023

Document ID
1207337838817589049
Author
Russell S
Publication year
Publication venue
ITNow

External Links

Snippet

Increased adoption of multi–factor authentication (MFA) is helping companies and individuals to secure their data more effectively; however, threat actors have been quick to adapt in the constantly evolving security arms race. Steve Russell MBCS CITP CISSP …
Continue reading at academic.oup.com (other versions)

Similar Documents

Publication Publication Date Title
KR101721032B1 (en) Security challenge assisted password proxy
US9021254B2 (en) Multi-platform user device malicious website protection system
US10223524B1 (en) Compromised authentication information clearing house
US9838384B1 (en) Password-based fraud detection
Mirian et al. Hack for hire: Exploring the emerging market for account hijacking
US9491155B1 (en) Account generation based on external credentials
US8984649B2 (en) Method and system for authenticating user access to a restricted resource across a computer network
US8572701B2 (en) Authenticating via mobile device
US10038690B2 (en) Multifactor authentication processing using two or more devices
US10230736B2 (en) Invisible password reset protocol
US10176318B1 (en) Authentication information update based on fraud detection
US11070556B2 (en) Context-based possession-less access of secure information
US20160212113A1 (en) Techniques for facilitating secure, credential-free user access to resources
US20150052005A1 (en) Internet site authentication with payments authorization data
Jubur et al. Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications
US9972013B2 (en) Internet site authentication with payments authorization data
Bucko Security of smart banking applications in Slovakia
Hassan et al. Digital privacy and security using Windows: A practical guide
Russell Bypassing multi-factor authentication
James Engineering the human mind: Social engineering attack using Kali Linux
Varshney et al. Push notification based login using BLE devices
Tolbert et al. Exploring phone-based authentication vulnerabilities in single sign-on systems
Terneva et al. Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester
Rahman et al. Two step verification system of highly secure social media: Possible to breach the security
Mooney et al. Your Guide to Authenticating Mobile Devices