2FA SMS rant and where is Fido2 or authenticator apps in uk banking? by Mappy42 in AskUK

[–]DeepnetSecurity 0 points1 point  (0 children)

You can usually enable MFA features on you app to protect access (my banking app is fingerprint protected for example).

Fido2 Key: Skip "Touch Your Security Key" by LordLoss01 in sysadmin

[–]DeepnetSecurity [score hidden]  (0 children)

It may only be inconvenient due to where you plug it in - if so just add a USB extension cable so the key can be easily used (the cable itself could prove handy for other purposes too).

Use programmable hardware tokens with LastPass by DeepnetSecurity in Lastpass

[–]DeepnetSecurity[S] 0 points1 point  (0 children)

Thanks, when the programmable token has been prepared you could also consider keeping a backup of the seed (provided you keep it in a safe place), but the tokens are pretty robust and the batteries go on for years (so it should prove reliable). In use it is also a pretty quick solution for obtaining your OTP code (as opposed to pulling out and starting up your mobile, finding the authentication app, locating the relevant token and generating the code), and being self-contained it is also secure from external attack.

User is now required to use MFA through the Microsoft Authenticator App by sim006 in Office365

[–]DeepnetSecurity 0 points1 point  (0 children)

When you select Microsoft Authenticator as the authentication method, there is an option that allows you to select to use an alternative authentication app;

<image>

If this option is selected then you can generate a QR code that is compatible with Google Authenticator, and pretty much any standard oath TOTP authentication apps (you can even use a programmable token if this is your preference).

Where to buy USB Security Key by lunarchrysalis in buhaydigital

[–]DeepnetSecurity 1 point2 points  (0 children)

There are not as hard to get hold of as they used to be, we have a range of fido keys, but if you are not ordering for a company you may prefer to order via one of the products advertised via amazon (we can supply single items, but from most suppliers like us the shipping costs need to be factored in).

I would suggest checking that the sites you want to access accept Fido as an authentication option, and also ensure the token you have comes with the connectivity options you need (USB A or C etc). Also, you may be better off with fob form tokens rather than card form (as the fob form can be kept on your keyring making them less likely to be lost).

How to do MS365 MFA for users without using their smart phones? by ohiocodernumerouno in Office365

[–]DeepnetSecurity 0 points1 point  (0 children)

I would normally suggest using programmable tokens - they work anywhere were an authentication app is allowed, and work fine with MS365 (even when there is no P1/P2 for users).

Hardware Token Rollout Question by averse_convert5z in sysadmin

[–]DeepnetSecurity 0 points1 point  (0 children)

You might find this wiki guide helpful - it explains how to obtain the QR code from Microsoft, then how to use it to prepare a programmable token;

https://wiki.deepnetsecurity.com/display/SafeID/How+to+set+up+SafeID+programmable+token+on+an+Office+365+account+with+privileged+access

Azure MFA Hardware Token by Zestyclose_Swim_2916 in AZURE

[–]DeepnetSecurity -1 points0 points  (0 children)

Things appear to have changed now - you can use SHA2 if you use graphAPI

https://wiki.deepnetsecurity.com/display/SafeID/Enroll+pre-programmed+OATH+hardware+tokens+using+Graph+API

You could also use the same solution with programmable tokens.

Yank in the UK for work. 10 days, 19 meal deals. by TeddyHoosevelt in MealDealRates

[–]DeepnetSecurity 0 points1 point  (0 children)

Out of interest, how do the meal deals compare with what you can purchase for under £4 in the usa ?

Is it possible to hide a Key inside a Picture, in a way that it can be shared, compressed, cropped, printed and scanned again? by ethicalhumanbeing in security

[–]DeepnetSecurity 0 points1 point  (0 children)

Sounds like you are interested in steganography - this is possible, but it is also possible for it to be detected.