Following hack, Evernote speeds move to two-factor authentication
The company is one of many trying to shore up its systems in the face of aggressive hackers
IDG News Service - Evernote is speeding up its plans to offer two-factor authentication to users following a recent data breach that exposed user names, email addresses and encrypted passwords.
The company, which makes note-taking software, disclosed on its blog on Saturday that an attacker accessed its internal network, which forced it to reset 50 million user passwords. Payment information was not accessed, Evernote said.
The company had planned to roll out two-factor authentication to users eventually but is now accelerating those plans, according to an Evernote spokeswoman.
Two-factor authentication usually requires a user to enter a time-sensitive code in addition to their user name and password. The code can be sent by SMS, or a standalone application such as Google Authenticator can generate a code.
Two-factor authentication poses a somewhat higher barrier for hackers, who not only need to capture a person's static login details but also the code.
It is not impossible to get the code, however, and several malicious software programs for mobile devices have been able to snatch it. If that interception is successful, the hacker can then quickly enter the details and log in to a person's account.
Other security features are also in the works. Evernote said it will offer "significant upgrades to the optional client-side encryption features later this year, including updated algorithms to take advantage of the additional flexibility allowed under changes to the US export control laws, as well as other user-selectable features."
Evernote is just one of many companies, including Apple, Facebook and Microsoft, that have disclosed hacking incidents in recent weeks,.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Cybercrime and Hacking White Papers | Webcasts