Completed
Dynamic 2FA: Ask for additional verification
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Anatomy of Account Takeover - Understanding Threats and Defenses
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Online accounts are valuable targets
- 3 The three avenues of password theft
- 4 Commoditization of abuse
- 5 The wares on sale
- 6 Users reuse passwords
- 7 Hijacking likelihood* Compared to a general active account, how much more likely it is that you will be a victim of hacking if we know
- 8 Adoption of additional security is low
- 9 Sign-in risk detection
- 10 Dimensionality of risk
- 11 Geocloaking
- 12 Dynamic 2FA: Ask for additional verification
- 13 Choose the challenge that minimizes damage
- 14 Secondary e-mail verification
- 15 SMS code
- 16 Google Prompt
- 17 Hijacking monetization
- 18 Bringing the user into the loop
- 19 Finding the hijacker in-session