According to a PayPal notice of security incident dated January 18, attackers got unauthorized access to the accounts of thousands of users between December 6 and 8, 2022. The total number of accounts that were accessed by threat actors using a credential stuffing attack is reported as being 34,942. While accepting that PayPal is seemingly doing the best it can for the customers involved in this security incident by recommending password changes, Jasson Casey, chief technology officer at Beyond Identity insists that “passwords – whether unique or complex – are fundamentally flawed.” Instead, Casey says, organizations should be moving to phishing-resistant credentials such as the FIDO Alliance standard blueprints.


More

SC Media: What should Musk do to better secure Twitter users after 2FA goes away?

In just two weeks, the ban on SMS two-factor authentication for non-subscribers on Twitter will…

Read More →

Tech Target: GitHub 2FA plan adds SMS, account lockout safeguards

GitHub reaffirmed this week that it is testing passkeys from the FIDO Alliance industry association,…

Read More →

Ghacks: How to configure two-step login via FIDO2 WebAuthn in Bitwarden

Bitwarden password manager users who want to step up the security may configure two-step login…

Read More →