Cybersecurity professionals and researchers worldwide (including myself) keep promoting using FIDO keys as the authentication method having the highest security level. While I agree with this, there i [...]
Published on Mar 19, 2023
Cybersecurity professionals and researchers worldwide (including myself) keep promoting using FIDO keys as the authentication method having the highest security level. While I agree with this, there i [...]
Published on Feb 5, 2021
I have recently stumbled upon several articles with rather clickbait titles stating that some models of FIDO keys were compromised. If you are not aware, this was a successful attempt by Ninj [...]
Published on Dec 1, 2020
A small note on the Ribbon SBC – SWe Lite configuration. Ribbon Communications Session Border Controller Software Edition Lite (SBC SWe Lite) is marketed as the easiest way to connect and [...]
Published on Jun 2, 2020
Multi-factor authentication is currently one of the de-facto standards for systems requiring strong security. In most of the cases, multi-factor authentication is rather complex and not very user-frie [...]
Published on Nov 3, 2019
I have contributed to CRC Press' "Online Terrorist Propaganda, Recruitment, and Radicalization". This chapter describes a number of different techniques that modern attackers use to enh [...]
Published on Nov 3, 2019
Although many users nowadays prefer to use mobile applications for TOTP, there are still use cases for separate/isolated standalone hardware TOTP devices. For various technical restrictions, such as t [...]
Published on Aug 20, 2018
While hosted MFA server (Azure MFA Server) supports any TOTP tokens, however, cloud Azure MFA is currently not supported. Microsoft has announced that this feature is currently in development, but the [...]
Published on Jan 11, 2018
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans, as they walk in cities, pass by differe [...]