Doubling down: How Universal 2nd Factor (U2F) boosts online security

While poor choices like ‘password’ or ‘123456’ featured among the top five stolen passwords identified in the Specops Breached Password Report 2025, we also found that almost a quarter of the stolen passwords analysed (230 million) had actually met standard complexity requirements. The device is inserted into a USB port and the system then cryptographically ‘challenges’ its key, ensuring they correspond before granting access.  The concept is backed by some of the biggest names in global tech: it’s overseen by the FIDO Alliance, an open industry association whose members include Google, Microsoft, Amazon, and many other industry giants. With Specops Password Policy, users are prevented from creating weak passwords, while the technology also scans your Active Directory for breached or compromised instances, currently blocking a growing database of over 4 billion unique breached passwords. It’s clear that two-factor and multi-factor authentication (MFA) will be central to complementing password security in the coming years, with the long-term impact of technologies like U2F enhancing online safety well into the future. Passwords have long been the bedrock of online security, but the vulnerabilities are obvious, ranging from human error to phishing attacks. However, to gain access they must then pass through a second security step, typically through a U2F device which has been registered online to create a new ‘key pair’. So how can U2F help? As the name suggests, the concept relies on two factors to bolster security – typically a password and a physical device, similar to a key fob. Indeed, a survey from LastPass found that 59% of respondents used passwords across multiple accounts, even though the vast majority (91%) understood the risks involved. For as long as people use passwords, companies will need to protect their active directories, ensuring they are clear of compromised or weak passwords. It will always be vital to ensure your passwords are up to scratch – no matter how other technology evolves. Quite simply, you could lose the key: it might fall off your key chain, for instance, or become lost if it’s still left in your USB drive and you misplace your laptop or other device.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 07 May 2025 14:10:11 +0000


Cyber News related to Doubling down: How Universal 2nd Factor (U2F) boosts online security

Doubling down: How Universal 2nd Factor (U2F) boosts online security - While poor choices like ‘password’ or ‘123456’ featured among the top five stolen passwords identified in the Specops Breached Password Report 2025, we also found that almost a quarter of the stolen passwords analysed (230 ...
2 weeks ago Bleepingcomputer.com
Teaching Digital Literacy and Online Safety - It is crucial for educators to prioritize teaching online safety to ensure that students are equipped with the necessary skills to protect themselves online. This article aims to explore the importance of teaching digital literacy and online safety, ...
1 year ago Securityzap.com
Online Learning Security Best Practices - The rapid increase in remote learning has raised security concerns surrounding online learning platforms. The security of online learning platforms involves implementing robust measures to protect against unauthorized access and data breaches. By ...
1 year ago Securityzap.com
Cybersecurity for Homeschooling Parents: A Guide - With the increased reliance on technology and online tools, homeschooling parents must also address the pressing issue of cybersecurity. Whether it's securing tech tools, teaching safe online practices, or accessing valuable resources, this guide ...
1 year ago Securityzap.com
Online Assessment Security Best Practices for Educators - In today's digital age, online assessment security has become a critical concern for educators. As online learning and remote testing continue to gain popularity, it is imperative for educators to implement best practices that uphold the integrity ...
1 year ago Securityzap.com
Role of Parents in Teaching Online Safety - In today's digital landscape, where children are increasingly exposed to the vast world of the internet, the role of parents in teaching online safety has become paramount. Parents should have regular conversations with their kids about the ...
1 year ago Securityzap.com
CVE-2021-31924 - Yubico pam-u2f before 1.1.1 has a logic issue that, depending on the pam-u2f configuration and the application used, could lead to a local PIN bypass. This issue does not allow user presence (touch) or cryptographic signature verification to be ...
2 years ago
An Age-by-Age Guide to Online Safety for Kids - Although the access to information, entertainment, and connection it offers is vital to modern life, safeguarding kids' online safety is crucial for their wellbeing, development, and future success in an increasingly digital world. In the following ...
1 year ago Cyberdefensemagazine.com
Digital Citizenship Lessons for Students - This article aims to emphasize the significance of digital citizenship lessons for students, focusing on three key aspects: the definition and scope of digital citizenship, online etiquette, and safe online behavior. By equipping students with ...
1 year ago Securityzap.com
Protecting Children Online: A Parent's Guide - It's easy to imagine a world in which our children are exposed to inappropriate content, cyberbullying, or even malicious online predators. In order to protect our children from these dangers, it is necessary to create an environment at home that ...
1 year ago Securityzap.com
Secure Online Shopping: Tips for Smart Homeowners - Secure shopping online is a prudent practice for homeowners. Researching the store and its reviews is an important step in ensuring a secure online shopping experience. Taking these steps before making an online purchase can help ensure a secure ...
1 year ago Securityzap.com Meow
Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities - As the younger generations get more involved with these online communities, they can also be targets for cyberbullies, hackers, scammers, online predators, and much worse. As the internet landscape continues to evolve, online forums and group chat ...
1 year ago Cyberdefensemagazine.com
Face Off: US Election Debate Sparks New Wave of Crypto-Doubling Scams | Netcraft - The page features Elon Musk’s Tesla logo instead of Trump’s campaign logo, demonstrating how criminals tailor their content to appeal to different audiences, i.e., politically engaged vs cryptocurrency minded. The perpetrators of these scams ...
7 months ago Netcraft.com
How to Stop Your X Account From Getting Hacked Like the SEC's - This week, the United States Securities and Exchange Commission suffered an embarrassing-and market-moving-breach in which a hacker gained access to its X social media account and published fake information about a highly anticipated SEC announcement ...
1 year ago Wired.com
Protecting Student Privacy Online - In the rapidly evolving world of online education, the protection of student privacy has emerged as a critical concern. This article delves into the privacy risks associated with online education and highlights the significance of complying with ...
1 year ago Securityzap.com
It's Time For Lawmakers to Listen to Courts: Your Law Regulating Online Speech Will Harm Internet Users' Free Speech Rights - Despite a long history of courts ruling that government efforts to regulate speech online harm all internet users and interfere with their First Amendment rights, state and federal lawmakers continue to pass laws that do just that. Three separate ...
10 months ago Eff.org
Online safety laws: What's in store for children's digital playgrounds? - As children's safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm. Tomorrow is Safer Internet Day, an annual awareness campaign that started in Europe in 2004 ...
2 years ago Welivesecurity.com
Don't Fall for the Latest Changes to the Dangerous Kids Online Safety Act - The authors of the dangerous Kids Online Safety Act unveiled an amended version this week, but it's still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like. TAKE ...
1 year ago Eff.org
CVE-2021-41129 - Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not ...
1 year ago
Safe shopping this sales season - Whether it's to avoid queuing, save time or simply to avoid the frustration from going to the shop and not finding what you were looking for, online shopping is the most popular shopping method in today's society. That's why we want to give you some ...
1 year ago Pandasecurity.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
7 months ago Helpnetsecurity.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
1 month ago Cybersecuritynews.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
Exploring The Benefits Of Multi-Factor Authentication For Security - That's why I want to talk about multi-factor authentication benefits, a security protocol that requires multiple methods of verification from independent categories of credentials. Traditional security often hinges on just one factor - something you ...
1 year ago Securityboulevard.com

Cyber Trends (last 7 days)