Plug The Security Holes In Your Two-Factor Authentication

Published: 24/08/2017
Plug The Security Holes In Your Two-Factor Authentication
Source: LIFEHACKER.COM

On Tuesday, Techcrunch writer John Biggs had his phone number stolen by a hacker who gained control of Biggs’ T-Mobile SIM card, granting him access to Biggs’ phone number used to verify his identity. Biggs correctly employed SMS-based two-factor authentication on his accounts, but forgot to add extra security layers… Read more...

Read more
Related news
Comment