hpr3719 :: HPR News
InfoSec; the language of security.
Hosted by Some Guy On The Internet on 2022-11-03 is flagged as Clean and is released under a CC-BY-SA license.
InfoSec, Typosquatting, SFA, 2FA, MFA, Security.
1.
The show is available on the Internet Archive at: https://archive.org/details/hpr3719
Listen in ogg,
spx,
or mp3 format. Play now:
Duration: 00:09:54
general.
InfoSec; the language of security.
What is Typosquatting and How Do Scammers Use it?
- Typosquatting, as an attack, uses modified or misspelled domain names to trick users into visiting fraudulent websites; the heart of this attack is domain name registration. Typosquatting is deployed by scammers to defraud unaware users. Attackers will attempt to: mimic login pages, redirect traffic, download malware, and extort users.
- Past Known Typosquatting Attacks.
- Solutions to Typosquatting.
- DNS monitoring services.
- Link to dnstwister: https://dnstwister.report/
- Link to whois: https://www.whois.com/whois
- Password Managers.
- Link to bitwarden: https://bitwarden.com/
- Link to keepassxc: https://keepassxc.org/
Two-factor and Multifactor Authentication.
First, authentication. This is the process of verifying the validity of something; in our case, user credentials/identity. The most common way to authenticate is: USERNAME and PASSWORD. This is just a single layer (single-factor authentication) and isn’t enough to discourage attackers.
Second, 2FA (Two-factor Authentication). 2FA increases the difficulty for attackers by providing users an additional layer of security to accomplish authentication. Common 2FA methods are: TOTP/OTP (the One Time Password), Authenticator Applications (Bitwarden, KeePassXC,...), and Security Keys (Yubikey). This works similar to ATMs; to authenticate the user must provide both knowledge (account PIN) and a physical object (bank card).
Last, but not least, MFA (Multifactor Authentication). Similar to 2FA, MFA offers users security with the addition of biometrics (fingerprint scan, retina scan, facial recognition, and voice recognition). Attackers must overcome the knowledge factor, Possession factor, Inherence/Biometric factor, Time factor, and sometimes Location factor.
MORE helpful security information.
2FA/MFA Known Attacks.