Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"A car is just a big purse on wheels." -- Johanna Reynolds


computers / comp.dcom.telecom / MFA bypass: how bad actors can circumvent strong security [telecom]

SubjectAuthor
o MFA bypass: how bad actors can circumvent strong security [telecom]Bill Horne

1
MFA bypass: how bad actors can circumvent strong security [telecom]

<20230302122953.GA1656473@telecomdigest.us>

 copy mid

https://www.novabbs.com/computers/article-flat.php?id=4094&group=comp.dcom.telecom#4094

 copy link   Newsgroups: comp.dcom.telecom
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!news.iecc.com!.POSTED.news.iecc.com!post.local
From: malQRMas...@gmail.com (Bill Horne)
Newsgroups: comp.dcom.telecom
Subject: MFA bypass: how bad actors can circumvent strong security [telecom]
Date: Thu, 2 Mar 2023 07:29:53 -0500
Organization: The Telecom Digest
Sender: alias@iecc.com
Approved: telecom-moderator@telecom.csail.mit.edu
Message-ID: <20230302122953.GA1656473@telecomdigest.us>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Injection-Info: gal.iecc.com; posting-host="news.iecc.com:2001:470:1f07:1126:0:676f:7373:6970";
logging-data="31429"; mail-complaints-to="abuse@iecc.com"
Authentication-Results: iecc.com; spf=pass spf.mailfrom=moder8@telecomdigest.us spf.helo=telecomdigest.us smtp.remote-ip="71.19.144.55"; dmarc=none header.from=gmail.com polrec.p=none polrec.pct=100
Content-Disposition: inline
 by: Bill Horne - Thu, 2 Mar 2023 12:29 UTC

Multifactor authentication, or MFA, is widely used to help prevent
malicious actors from gaining access to your accounts. Multifactor
authentication also goes by names like 2-Step Verification or
two-factor authentication. UNC-Chapel Hill uses two 2-Step services,
Microsoft and Duo Security, to protect accounts and data at the
University.

MFA means that more than one authentication method, or factor, is
required to allow you access to an account. An example would be
requiring both a password as your first factor and a code you receive
via text as your second factor.

https://its.unc.edu/2022/10/20/mfa-bypass/

--
(Please remove QRM for direct replies)

1
server_pubkey.txt

rocksolid light 0.9.7
clearnet tor