In: Computer Science
Find a 2018 or 2019 newspaper website article (no academic research articles) on a recent software vulnerability that led to a security breach. You need to find article that talks about how a specific software vulnerability was involved, so not just any security story will do! Write a 300 word summary (no graphics or tables) of the incident in your own words, describing what software was involved, what the vulnerability was, and what the consequences were. Be as specific as you.
Hackers used single sign on In phishing pages used to steal the credentials:-
What is Single Sign-On?
Single Sign-On (SSO ) allows users to use a set of credentials to log into multiple applications.
Consequences-
The availability of SSO is steadily increasing across applications, which has lead to many hackers attempting to misuse it.
They use your data for their personal use and even blackmailing you for your data and might cause harm to others with your personal data
Precautions to be taken -
Probably the best way to protect yourself from SSO phishing attacks is to enable two-factor authentication.
This is because having a secondary authentication makes it difficult for hackers to access your account. It is also recommended not to use SMS as the secondary authentication, because it is not as secure as other methods.