description: authentication method in which a computer user is granted access only after successfully presenting two pieces of evidence (or factors) to an authentication mechanism
62 results
by David G. W. Birch and Victoria Richardson · 28 Apr 2024 · 249pp · 74,201 words
asked her to log in via her bank account. At this point, the dating site bounced her to her bank, where she did the appropriate two-factor authentication to establish her identity to the bank’s satisfaction. The bank then returned a cryptographic token to the dating site to confirm that Alice is
by Zoë Schiffer · 13 Feb 2024 · 343pp · 92,693 words
to give the company access to their location, allow it to share their data with business partners, and allow it to use “contact data from two-factor authentication (email, phone number) that we may have but not available for identity bridging, ad targeting, or prediction.” Incidentally, using contact information supplied for
…
two-factor authentication to target ads was the very thing the FTC had fined Twitter $150 million for in May 2022. The document suggested that Twitter users could
…
was eyeing contracts between the social media giant and mobile carriers in countries like Indonesia, Russia, and India. These contracts, which involved the carriers supporting two-factor authentication, a security feature that asks users for an SMS security code at sign-in, were rife with fraud. Scammers made backdoor agreements with the carriers
…
useless bots. “This is an absolute scam, this is absolute BS,” Musk said. In some countries, Twitter was paying more to cellular carriers to support two-factor authentication than it was making in ad revenue, making operational costs a net loss, according to two employees. On December 11, Musk tweeted a cryptic warning
…
more than thirty major mobile carriers, including some of the largest telecoms in those countries. At first, Twitter targeted the subset of people who used two-factor authentication. Then it dramatically escalated the situation and blocked all traffic from the carriers. “So that will block almost all of Indonesia and Russia, 64% of
…
after the Super Bowl, I got another scoop. Twitter was planning to unveil a new policy that only Blue subscribers would be able to use two-factor authentication, allowing them to secure their accounts by adding a phone number to the sign-in process. You didn’t have to be a security expert
by Anna Wiener · 14 Jan 2020 · 237pp · 74,109 words
it, but he could.” I had listened patiently as he tried to teach me about cryptocurrencies and the promise of the blockchain, the shortcomings of two-factor authentication, the necessity of end-to-end encryption, the inevitability of data breaches. The romance didn’t last, but in its wake we had fallen into
by Jacob Silverman · 17 Mar 2015 · 527pp · 147,690 words
media has played such an obvious role. Both Twitter and the AP were criticized for their lax security, and a few months later, Twitter introduced two-factor authentication, a security measure that should make such incidents less likely in the future. The financial industry didn’t escape scrutiny either, as some commentators, already
by Scott Chacon and Ben Straub · 12 Nov 2014 · 549pp · 134,988 words
of these in commit messages in any repository on the site, it will be linked to your user now. Two Factor Authentication Finally, for extra security, you should definitely set up Two-factor Authentication or “2FA”. Two-factor Authentication is an authentication mechanism that is becoming more and more popular recently to mitigate the risk of your account being
…
methods of authentication, so that if one of them is compromised, an attacker will not be able to access your account. You can find the Two-factor Authentication setup under the Security tab of your Account settings. Figure 6-7. 2FA in the Security Tab If you click on the “Set up
…
two-factor authentication” button, it will take you to a configuration page where you can choose to use a phone app to generate your secondary code (a “time
…
and password. However, this isn’t possible with the HTTP protocols – every connection needs a username and password. This gets even harder for systems with two-factor authentication, where the token you use for a password is randomly generated and unpronounceable. Fortunately, Git has a credentials system that can help with this. Git
by Bruce Schneier · 3 Sep 2018 · 448pp · 117,325 words
them. In general, replacing passwords with one of these doesn’t improve things much. Using two of them together—that’s two-factor authentication—does improve security. Both Google and Facebook offer two-factor authentication via a text message on your smartphone. (This, of course, isn’t perfect, either. Some versions have been hacked.) Sprint, T
…
, for example, the destination of bank transfers. This is called a man-in-the-middle attack, and it works even if the bank has instituted two-factor authentication. To defend against such attacks, one can monitor the system looking for signs of hacked accounts, and then use differential authentication. This would be your
…
I was a child, no one wore one. Today, children won’t let people drive unless they’re wearing one. Similarly, I’ve adapted to two-factor authentication systems. It’s a small inconvenience for the trade-off of a more hacker-resistant account. Authentication is central to the Internet+. Pretty much every
…
secure default operation. Devices should be secure out of the box, without requiring users to configure them. They should not have weak or default passwords. Two-factor authentication should be used whenever possible. Remote administration features should be disabled unless necessary. Fail predictably and safely. If a device loses its Internet connection, it
…
companies. The rules required these corporations to have a chief information security officer, conduct regular security testing, provide security awareness training to employees, and implement two-factor authentication on their systems. In 2019, these standards will also apply to their vendors and third-party contractors. In 2017, California temporarily tabled a bill requiring
…
. There are several competing smartphone payment apps. Your cell phone number is turning into a unique identifier that’s good enough for purposes such as two-factor authentication. However, when we build a mandatory identification system, we need to catch precisely those people who want to subvert the system. Every existing identification system
…
-5906-5. 47Using two of them together: J. R. Raphael (30 Nov 2017), “What is two-factor authentication (2FA)? How to enable it and why you should,” CSO, https://www.csoonline.com/article/3239144/password-security/what-is-two-factor-authentication-2fa-how-to-enable-it-and-why-you-should.html. 47This, of course, isn’t
…
perfect, either: Andy Greenberg (26 Jun 2016), “So hey you should stop using texts for two-factor authentication,” Wired, https://www.wired.com/2016/06/hey-stop-using
…
-texts-two-factor-authentication. 47Sprint, T-Mobile, Verizon, and AT&T: Steve Dent (8 Sep 2017), “U.S. carriers partner on a better
…
.fastcompany.com/40432975/how-to-steal-a-phone-number-and-everything-linked-to-it. 48They’ll reset bank accounts: Alex Perekalin (19 May 2017), “Why two-factor authentication is not enough,” Kaspersky Daily, https://www.kaspersky.com/blog/ss7-attack-intercepts-sms/16877. Nathaniel Popper (21 Aug 2017), “Identity thieves hijack cellphone accounts
by Kevin Mitnick, Mikko Hypponen and Robert Vamosi · 14 Feb 2017 · 305pp · 93,091 words
. Passwords and PINs are part of the security solution, but we’ve just seen that these can be guessed. Even better than complex passwords are two-factor authentication methods. In fact, in response to Jennifer Lawrence and other celebrities having their nude photos plastered over the Internet, Apple instituted
…
two-factor authentication, or 2FA, for its iCloud services. What is 2FA? When attempting to authenticate a user, sites or applications look for at least two of three
…
to find through Google. I can go to the reset page for your e-mail service and request a password reset, which, because you enabled two-factor authentication, will result in an SMS code being sent to your phone. So far, so good, right? Hang on. A recent attack on a phone used
…
cellular service and then receive your SMS messages—for example, the SMS code from Google to reset Mckesson’s Gmail account that was protected with two-factor authentication. This is much more likely than fooling someone into reading off his or her SMS message with a new password. Although that is still possible
…
bank—forget it. Remember, you should enable 2FA on every site you access so an attacker armed with your username and password cannot impersonate you. Two-factor authentication will greatly mitigate the chances of your account being hacked if someone does gain knowledge of your username and password. The number of people who
…
—if you don’t want the company or the NSA to read it—encrypt the data before you send it.22 There the similarities end. Two-factor authentication is important, but I can still bypass this by hijacking unused accounts. For example, I recently did a pen test where the client added Google
…
authentication when you turn on your PC. A perpetual license sells for around $200. There is also WinMagic, one of the few options that requires two-factor authentication instead of just a password. WinMagic also doesn’t rely on a master password. Rather, encrypted files are grouped, and each group has a password
by Andy Oram and John Viega · 15 Dec 2009 · 302pp · 82,233 words
because the client was going to roll out a hardware, token-based solution and thus supplement its traditional username and password combination to create a two-factor authentication system. Since the project had management support from the beginning, we were able to easily pull together the necessary personnel to draft the policy. To
by Nandan Nilekani · 4 Feb 2016 · 332pp · 100,601 words
was soon marred by regulatory troubles. First, the Reserve Bank of India objected to Uber’s payment model, which violated the RBI mandate of a two-factor authentication for all credit card payments—designed to increase transaction security and reduce fraud. Uber initially managed to avoid this requirement by routing payments through a
by Rennay Dorasamy · 2 Dec 2021 · 328pp · 77,877 words
. Client login credentials could be easily socially engineered by simply calling an end user posing to be an employee of the financial institution. Mechanisms like two-factor authentication (2FA) are prevalent today – however, these were not readily available when the channel was first established. With the experience gained from establishing other channels, organizations
by David E. Sanger · 18 Jun 2018 · 394pp · 117,982 words
by Ashutosh Deshmukh · 13 Dec 2005
by Richard A. Clarke and Robert Knake · 15 Dec 2010 · 282pp · 92,998 words
by Sam Newman · 25 Dec 2014 · 540pp · 103,101 words
by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield · 29 Mar 2020 · 1,380pp · 190,710 words
by Richard A. Clarke and Robert K. Knake · 15 Jul 2019 · 409pp · 112,055 words
by Imran Bashir · 28 Mar 2018
by Sean Kane and Karl Matthias · 14 May 2023 · 433pp · 130,334 words
by Scott J. Shapiro · 523pp · 154,042 words
by Nicole Perlroth · 9 Feb 2021 · 651pp · 186,130 words
by Fabio Alessandro Locati · 21 Nov 2016
by David Birch · 14 Jun 2017 · 275pp · 84,980 words
by Marc Goodman · 24 Feb 2015 · 677pp · 206,548 words
by Dan Conway · 8 Sep 2019 · 218pp · 68,648 words
by John P. Carlin and Garrett M. Graff · 15 Oct 2018 · 568pp · 164,014 words
by Jacob Helberg · 11 Oct 2021 · 521pp · 118,183 words
by Joseph Menn · 3 Jun 2019 · 302pp · 85,877 words
by Megan E. O'Keefe · 10 Jun 2019 · 602pp · 164,940 words
by Jonathan Zittrain · 27 May 2009 · 629pp · 142,393 words
by Daniel Simons and Christopher Chabris · 10 Jul 2023 · 338pp · 104,815 words
by Lorne Lantz and Daniel Cawrey · 8 Dec 2020 · 434pp · 77,974 words
by Peter Gutmann
by Mish Slade · 13 Aug 2015 · 288pp · 66,996 words
by Conrad Barski · 13 Nov 2014 · 273pp · 72,024 words
by Thomas A. Limoncelli, Strata R. Chalup and Christina J. Hogan · 27 Aug 2014 · 757pp · 193,541 words
by Julia Angwin · 25 Feb 2014 · 422pp · 104,457 words
by Andy Greenberg · 15 Nov 2022 · 494pp · 121,217 words
by Eric O'Neill · 1 Mar 2019 · 299pp · 88,375 words
by Joseph Menn · 26 Jan 2010 · 362pp · 86,195 words
by Roger McNamee · 1 Jan 2019 · 382pp · 105,819 words
by Julia Ebner · 20 Feb 2020 · 309pp · 79,414 words
by Jeff John Roberts · 15 Dec 2020 · 226pp · 65,516 words
by David N. Blank-Edelman · 16 Sep 2018
by Laura Shin · 22 Feb 2022 · 506pp · 151,753 words
by Kurt Wagner · 20 Feb 2024 · 332pp · 127,754 words
by Ian Demartino · 2 Feb 2016 · 296pp · 86,610 words
by Brian Krebs · 18 Nov 2014 · 252pp · 75,349 words
by Dean Starkman · 1 Jan 2013 · 514pp · 152,903 words
by Ronald J. Deibert · 14 Aug 2020
by Susan Fowler · 18 Feb 2020 · 205pp · 71,872 words
by Cory Doctorow · 6 Oct 2025 · 313pp · 94,415 words
by Alec Ross · 2 Feb 2016 · 364pp · 99,897 words
by Jason Fried and David Heinemeier Hansson · 29 Oct 2013 · 98pp · 30,109 words
by Eric Schmidt and Jared Cohen · 22 Apr 2013 · 525pp · 116,295 words
by Ben McKenzie and Jacob Silverman · 17 Jul 2023 · 329pp · 99,504 words
by Natalie Berg and Miya Knights · 28 Jan 2019 · 404pp · 95,163 words
by Laszlo Bock · 31 Mar 2015 · 387pp · 119,409 words
by Michal Zalewski · 11 Jan 2022 · 337pp · 96,666 words
by Hoyt L. Barber · 23 Feb 2012 · 192pp · 72,822 words
by William Davidow and Michael Malone · 18 Feb 2020 · 304pp · 80,143 words
by Coingecko, Darren Lau, Sze Jin Teh, Kristian Kho, Erina Azmi, Tm Lee and Bobby Ong · 22 Mar 2020 · 135pp · 26,407 words
by Chris Burniske and Jack Tatar · 19 Oct 2017 · 416pp · 106,532 words