The Security box, podcast 246: Multi-factor Authentication is being abused by criminals

Please find our RSS feed using this link.

We have plenty of material coming in this podcast, lasting a little over 4 hours including a few tracks. Here are the full show notes.

They’re too long for RSS, but I tried to put in the highlights in RSS.


Welcome to the security box, program number 246. We hope that you will enjoy the program as much as we are putting it together. On this program, Trend Micro and their podcast series on YouTube will talk about zero days and patches. Michael in Arkansas, formerly Indiana, will come along with commentary about the McDonalds debacle with the third party provider and one of the stupidest passwords we’ve found, Jared will be along with a portion of the diatribe about the same McDonalds story and our topic will talk about multi-factor and the criminals trying to break it.

Oh yes, we’ve also got our trivia, the news, the notes and the landscape.

We hope you enjoy the program as much as we are bringing it together for you. Enjoy!


Trivia

Here’s the trivia question for this week. It goes back to an article we blogged on the blog.

According to the article titled Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider by Bleeping Computer’s Bill Toulas, we know that we experienced a 7.3TBPS attack to a provider. We’ll include the opening paragraphs as part of the answer.

One paragraph says that it had a massive volume in just 45 seconds. What is this number?

A: 5TB
B: 15TB
C: 25.8TB
D: 37.4TB
E: 100TBPS
F: 250TBPS
G: none of these
H: Less than 5TB


Top 50 things not to do with a computer

Found something by one of my followers that I thought would be fun, although it isn’t security related. We’ll read this and we’ll see if anyone has thought about doing any of these. Its recommended you do not do any of the things we’ll talk about in this section.


What is the McDonalds debacle?

If you’re not familiar with the McDonalds debacle, you’ll want to check this out. Apparently, their hiring site had one of the worst passwords for its database, and this may be part of security 101. I wrote up a blog post on this, and that’s what will be played in part and commentary by Michael as mentioned above. Want to read the blog post yourself? A weak username and password is all it takes to get data? is my blog post which will link to the article. Oh boy.


Criminals breaking MFA

This was actually posted to the list and maybe the title of this isn’t quite appropriate. The Ars Technica article is titled Why MFA is getting easier to bypass and what to do about it which is a short article. Talks about a protocol I’m not too familiar with. We’ll see how this goes.


Supporting the podcast

If you’d like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can’t do this alone.


Discover more from The Technology blog and podcast

Subscribe to get the latest posts sent to your email.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.