Two Factor Authentication Piergiorgio Venuti

Two Factor Authentication

Two Factor Authentication

Protect your Client Area with Two Factor Authentication via Google Authenticator

Now you can protect your Client Area login with Google Authenticator so you will add and extra layer of security on your Cloud Account.

 

Two Factor Authentication

How to enable Google Authenticator on Secure Online Desktop account

1 Access to your Client Area and log in with your account;

2 Go on Account -> Edit Details section;

Account_Edit_Details
 

3 Flag “Two-Factor Authentication” option;

Two-Factor Athentication
 

4 Scan the generated code with your Google Authenticator app (download it from Apple Store or Google Play) for your smartphone;

5 Save your settings;

6 Logoff from your account and login again;

Account_logout
 

7 At this point, after username and password you need to insert the OTP code generated from you Google Authenticator app.

Two Factor Authentication
 

Now that you are done your Cloud Account and all related Cloud Services are safer because and attacker need to not just username/password but also your OTP code. You can disable this feature any time in your Account Details.

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Trojan-Spy.Win32.Stealer.osh / Insecure Permissions March 2, 2021
    Posted by malvuln on Mar 02Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/d58b1c2f540268bd9dd920455568d45f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Spy.Win32.Stealer.osh Vulnerability: Insecure Permissions Description: The malware creates an insecure dir named "DESKTOP-2C3IQHO" under c:\ drive and grants change (C) permissions to the authenticated user group. Standard users...
  • Backdoor.Win32.RemoteManipulator.fdo / Insecure Permissions March 2, 2021
    Posted by malvuln on Mar 02Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/66ef21e8d1cf30dce6e084a9e306c18f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.RemoteManipulator.fdo Vulnerability: Insecure Permissions Description: The backdoor creates an insecure randomly named hidden dir with a .tmp ext E.g. 8RK86.tmp and grants change (C) permissions to the authenticated user group....
  • Multiple Vulnerabilities in jpeg-xl (CVE-2021-27804) March 2, 2021
    Posted by Marc on Mar 02Multiple Vulnerabilities in jpeg-xl =================================== CVE: CVE-2021-27804 Highest Severity Rating: High Confirmed Affected Versions: jpeg-xl v0.3.1 and earlier Vendor: Joint Photographic Experts Group (JPEG) Vendor URL: https://gitlab.com/wg1/jpeg-xl Summary and Impact ------------------ jpeg-xl is the reference implementation by the Joint Photographic Experts Group (JPEG) of the new JPEG XL standard. Multiple […]
  • SEC Consult SA-20210301-0 :: Authentication bypass vulnerability in Genua GenuGate High Resistance Firewall March 1, 2021
    Posted by SEC Consult Vulnerability Lab on Mar 01seems we had some newline issues before, sorry for the inconvenience. Here is our advisory again: SEC Consult Vulnerability Lab Security Advisory < 20210301-0 > ======================================================================= title: Authentication bypass vulnerability product: Genua GenuGate High Resistance Firewall vulnerable version: GenuGate
  • SEC Consult SA-20210301-0 :: Authentication bypass vulnerability in Genua GenuGate High Resistance Firewall March 1, 2021
    Posted by SEC Consult Vulnerability Lab on Mar 01SEC Consult Vulnerability Lab Security Advisory < 20210301-0 > =======================================================================              title: Authentication bypass vulnerability            product: Genua GenuGate High Resistance Firewall vulnerable version: GenuGate
  • Trojan-Proxy.Win32.Delf.ai / Remote SEH Buffer Overflow February 26, 2021
    Posted by malvuln on Feb 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/1dd6eb39a388f4c8a3eaf248d86aaabc.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Proxy.Win32.Delf.ai Vulnerability: Remote SEH Buffer Overflow Description: The malware listens on TCP port 1089. Attackers who can reach the infected system can send a specially crafted HTTP TRACE request to trigger […]
  • Trojan.Win32.Hotkeychick.am / Insecure Permissions February 26, 2021
    Posted by malvuln on Feb 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/5ea9840970e78188f73eb1763363eeac.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Hotkeychick.am Vulnerability: Insecure Permissions Description: The trojan creates an insecure dir named "Korektor_MPiPS-01" under c:\ drive, granting change (C) permissions to the authenticated user group. Standard users...
  • Backdoor.Win32.Azbreg.amw / Insecure Permissions February 26, 2021
    Posted by malvuln on Feb 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/5eb58198721d4ded363e41e243e685cc.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Azbreg.amw Vulnerability: Insecure Permissions Description: The backdoor creates an insecure hidden dir named "MSDCSC" granting change (C) permissions to the authenticated user group. Standard users can rename the malware...
  • Trojan-Spy.Win32.SpyEyes.elr / Insecure Permissions February 26, 2021
    Posted by malvuln on Feb 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/025d07f4610605031e501e6745d663aa.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Spy.Win32.SpyEyes.elr Vulnerability: Insecure Permissions Description: The malware creates an insecure hidden dir named "40404504504" under c:\ drive, granting change (C) permissions to the authenticated user group. Standard users...
  • Trojan-Dropper.Win32.Daws.etlm / Remote Unauthenticated System Reboot February 26, 2021
    Posted by malvuln on Feb 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/a0479e18283ed46e8908767dd0b40f8f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Dropper.Win32.Daws.etlm Vulnerability: Remote Unauthenticated System Reboot Description: Daws.etlm drops an executable named "MSWDM.EXE" under Windows dir and listens on UDP port 139. Unauthenticated third-party attackers can send...

Customers

Newsletter