Google OAuth and phantom accounts
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
24 articles
Google OAuth allows to create phantom Google accounts — uncontrollable by corporate Google Workspace administrators.
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team’s back.
What’s the principle of least privilege, why’s it needed, and how does it help secure corporate information assets?
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
How malicious extensions steal cryptocurrency, hijack accounts in games and social networks, manipulate search results, and display intrusive ads.
Are Macs as safe as their owners think they are? A few recent stories about malware targeting macOS users.
How attackers use infected archives and malicious browser extensions to steal Facebook Business accounts.
Examples of password policies that will have users tearing their hair out — and why you shouldn’t employ them.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Four threats you might face when using Airbnb, and tips for avoiding them.
Proper account security not only reduces the number of cyberattacks on companies — it brings financial benefits too. What needs to be done to reap them?
Why scammers are more likely to target kids than hardcore gamers, how they do it, and what they want to steal
Our research reveals gamers’ attitudes toward computer performance — and the ethics of winning and losing.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
We analyze some typical examples of phishing bait for movie streamers.
Many services allow you to share your subscription with family. Here’s how popular sites handle sharing.
Don’t use the service? Delete your account. We explain which accounts are dangerous to leave dormant — and why.
To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.
Dave and Jeff discuss a Florida town that paid to restore data following a ransomware attack, Instagram improving account restoration, and more.