Get the inside scoop with LoginTC and learn about relevant security news and insights.
What is the YubiKey vulnerability?
September 10, 2024 •
The announcement of a YubiKey vulnerability is making headlines as researchers uncover a method for cloning the popular phishing-resistant security keys. But what does this vulnerability involve, and how much can it compromise your security? Continue reading to learn more about this YubiKey vulnerability. What is a YubiKey? YubiKeys are a type of security key […]
Global IT outage: What it is and how to fix it
July 19, 2024 •
Internet users around the world awoke on Friday to a global IT outage, impacting Windows devices everywhere from home offices and workplaces, to airports, banks, hotels, and more. What caused this outage and what can you do to get your systems back up and running? What is causing the Global IT outage? The outage appears […]
April 03, 2024 •
In light of the public disclosure of the compromised xz library packages (CVE-2024-3094), our security team has performed a thorough review of the xz library packages in all LoginTC appliances to determine the CVE-2024-3094 impact on our services. Does CVE-2024-3094 impact LoginTC? No, CVE-2024-3094 does not impact LoginTC Cloud services. Are the LoginTC appliances affected? […]
December 14, 2021 •
In light of the public disclosure of the Log4j vulnerability (CVE-2021-44228), our security team has performed a thorough review of the use of logging libraries in LoginTC products.
March 24, 2015 •
Phishing attacks remain pravelent and continue to increase in sophistication. In this blog, we focus on SMiShing, SMS-based phishing attacks. Learn how to protect yourself with two-factor authentication.
Go Phish! No matter what hand you’re dealt, all moves prove risky without 2FA
February 05, 2015 •
Phishing attacks remain prevalent, as they increase in sophistication. If you want protection, LoginTC two factor authentication is the solution.
More remote work, more risk: How two factor authentication can help
January 16, 2015 •
A survey by Regus anticipates more remote work in 2015. This blog explains why that means 2FA is necessary.
Heartbleed and Rethinking Session Management with Multi-Factor Authorization
May 05, 2014 •
Securing the communication link between user and the service is a good idea, but doesn’t go far enough.
Why Passwords Are No Longer Reliable
February 02, 2013 •
News of stolen passwords at the New York Times and Twitter allow fraudsters to access user accounts and emails.