Two-Factor vs. Multi-Factor Authentication: A Stark Difference

If there’s one thing you should remember from geometry class in 7th grade, it’s the fact that every square is a rectangle, but not every rectangle is a square. The criteria defining one object doesn’t encompass the criteria for the second object in all situations. This is the same problem we face when talking about two-factor and multi-factor authentication. Because both sound similar, it’s a common fallacy for security providers to advertise that their products have “multi-factor authentication.”

Continue reading “Two-Factor vs. Multi-Factor Authentication: A Stark Difference”

Methods People Use To Grab Your Data And Steal Your Identity – Part II

In part one, we’ve discussed some common methods that hackers use to get your credentials or otherwise steal your data. Unfortunately, there’s no way to cover absolutely everything, but we still can discuss other common methods. Today, we’re going to cover some more attack methods and how to prevent them, if at all possible. We’ll continue the previous discussion, adding more newer methods of cracking credentials and stealing identities.

Continue reading “Methods People Use To Grab Your Data And Steal Your Identity – Part II”