Recently I wrote about the new security device I bought. Today I want to give a hands on example of how it improves my security. Ladies and gentlemen, today I’ll perform an attack on myself (since it’s the only legal attack I can perform) and explain in better details how to use Yubikey against phishing. […]
I finally got my Yubikey!
I know that as a person, who writes about security I should be aware of the threats that phishing carries and I should protect myself just to set an example. Unfortunately until now, I was “a shoemaker going barefoot” as a Polish saying goes. Although I try to remain open about how I protect myself, […]
Second Factor Authentication – Short Comparison
Since I’ve reviewed password storing possibilities in my recent blog posts (part 1 and 2), it’s time to ask question: can we do better? What Risks Are Left? First of all the user might be using a weak, guessable password. Something like their name, strings like “123456”. Sometimes this might be backed up by meaningless […]