InvestorsHub Logo
Followers 5
Posts 2591
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Monday, 04/22/2019 5:00:10 PM

Monday, April 22, 2019 5:00:10 PM

Post# of 248837
More Dangerous Phishing

Office 365 Custom Rules to Block Azure Blob Storage Phishing Attacks

https://www.bleepingcomputer.com/news/security/office-365-custom-rules-to-block-azure-blob-storage-phishing-attacks/
==================================================================
The hacker deploying this dangerous phishing (if unblocked) needs to obtain the second factor authentication (TPM - computer) in order to have these phished credentials work for him/her!! This is one of the reasons why Wave VSC 2.0 is such a great product/solution! Phishing that continues to get more dangerous and creative (for example - this article) has a really difficult time against Wave VSC 2.0! Please see links below for more information on the great Wave VSC 2.0!
==================================================================
https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Key Features:

Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies

Low TCO
• Reduce operating expenses by eliminating password reset and shortening deployment times
• Minimize capital expenses by using hardware you already have
• Integrate with Microsoft Active Directory for IT familiarity

Superior User Experience
• No more tokens or smart cards to achieve two-factor authentication
• Eliminate VPN/WiFi/website passwords for faster access to resources
• No add-on software means improved OS performance

Flexibility
• Compatible with Windows 8.1, 8, 7 and Vista operating systems – manage mixed environments from one console
• Create custom management policies to suit your organization’s needs
• User and device authentication from a common console

Seamless Device Authentication
• Access control over wireless (i.e. 802.1x)
• Single sign-on
• VPN authentication (i.e. Microsoft DirectAccess)

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.