Anatomy of Account Takeover - Understanding Threats and Defenses

Anatomy of Account Takeover - Understanding Threats and Defenses

USENIX Enigma Conference via YouTube Direct link

Geocloaking

11 of 19

11 of 19

Geocloaking

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Anatomy of Account Takeover - Understanding Threats and Defenses

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Online accounts are valuable targets
  3. 3 The three avenues of password theft
  4. 4 Commoditization of abuse
  5. 5 The wares on sale
  6. 6 Users reuse passwords
  7. 7 Hijacking likelihood* Compared to a general active account, how much more likely it is that you will be a victim of hacking if we know
  8. 8 Adoption of additional security is low
  9. 9 Sign-in risk detection
  10. 10 Dimensionality of risk
  11. 11 Geocloaking
  12. 12 Dynamic 2FA: Ask for additional verification
  13. 13 Choose the challenge that minimizes damage
  14. 14 Secondary e-mail verification
  15. 15 SMS code
  16. 16 Google Prompt
  17. 17 Hijacking monetization
  18. 18 Bringing the user into the loop
  19. 19 Finding the hijacker in-session

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.