Anatomy of Account Takeover - Understanding Threats and Defenses

Anatomy of Account Takeover - Understanding Threats and Defenses

USENIX Enigma Conference via YouTube Direct link

Intro

1 of 19

1 of 19

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Anatomy of Account Takeover - Understanding Threats and Defenses

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Online accounts are valuable targets
  3. 3 The three avenues of password theft
  4. 4 Commoditization of abuse
  5. 5 The wares on sale
  6. 6 Users reuse passwords
  7. 7 Hijacking likelihood* Compared to a general active account, how much more likely it is that you will be a victim of hacking if we know
  8. 8 Adoption of additional security is low
  9. 9 Sign-in risk detection
  10. 10 Dimensionality of risk
  11. 11 Geocloaking
  12. 12 Dynamic 2FA: Ask for additional verification
  13. 13 Choose the challenge that minimizes damage
  14. 14 Secondary e-mail verification
  15. 15 SMS code
  16. 16 Google Prompt
  17. 17 Hijacking monetization
  18. 18 Bringing the user into the loop
  19. 19 Finding the hijacker in-session

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.