![]() ![]() When this password is breached, an outsider can take over machines that are under remote control. On the other hand, users with strong, unique passwords were also compromised. There was no real proof (presented) whether or not TeamViewer itself was hacked, but 642 million user-accounts are now considered to be out in the open. The reports of compromised user however show it was an attack targeted on TeamViewer users (the remote control side). At the time of writing, the investigation is not yet closed. Whitelist TeamViewerID : All previously approved incoming connections need to be confirmed once again to allow the remote-control.As such, TeamViewer itself has released two new features and forced a reset of the login password: Instead of trying to point the finger at who is at blame, it might be a better idea to first secure yourself and start solving the issue. Password Reset : TeamViewer has marked ALL user accounts to renew their password.Data Integrity : This feature will track the ‘normal’ behaviour and alerts whenever control is done from a non-standard location.So if the IT-admin, helpdesk-employee, or yourself, are logging in to remote machines, the user behind the keyboard needs to approve this connection. This means that every TeamViewer User account needs to enter a new password. If the credentials were stolen, they are now rendered useless. There is another feature in TeamViewer that can be enabled. This is called 2FA, or two-factor-authentication. When 2FA is enabled it makes any account that little bit safer on the login-side and works by using one one ‘static’ password and one variable one that changes with each login and is sent to either your phone or any device of your choosing. There are a few steps to learn if your machine has been compromised including: How do I know I’m compromised and what can I do? #Teamviewer hacked dump password#
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |