two-factor authentication

back to index

description: authentication method in which a computer user is granted access only after successfully presenting two pieces of evidence (or factors) to an authentication mechanism

62 results

Money in the Metaverse: Digital Assets, Online Identities, Spatial Computing and Why Virtual Worlds Mean Real Business

by David G. W. Birch and Victoria Richardson  · 28 Apr 2024  · 249pp  · 74,201 words

asked her to log in via her bank account. At this point, the dating site bounced her to her bank, where she did the appropriate two-factor authentication to establish her identity to the bank’s satisfaction. The bank then returned a cryptographic token to the dating site to confirm that Alice is

Extremely Hardcore: Inside Elon Musk's Twitter

by Zoë Schiffer  · 13 Feb 2024  · 343pp  · 92,693 words

to give the company access to their location, allow it to share their data with business partners, and allow it to use “contact data from two-factor authentication (email, phone number) that we may have but not available for identity bridging, ad targeting, or prediction.” Incidentally, using contact information supplied for

two-factor authentication to target ads was the very thing the FTC had fined Twitter $150 million for in May 2022. The document suggested that Twitter users could

was eyeing contracts between the social media giant and mobile carriers in countries like Indonesia, Russia, and India. These contracts, which involved the carriers supporting two-factor authentication, a security feature that asks users for an SMS security code at sign-in, were rife with fraud. Scammers made backdoor agreements with the carriers

useless bots. “This is an absolute scam, this is absolute BS,” Musk said. In some countries, Twitter was paying more to cellular carriers to support two-factor authentication than it was making in ad revenue, making operational costs a net loss, according to two employees. On December 11, Musk tweeted a cryptic warning

more than thirty major mobile carriers, including some of the largest telecoms in those countries. At first, Twitter targeted the subset of people who used two-factor authentication. Then it dramatically escalated the situation and blocked all traffic from the carriers. “So that will block almost all of Indonesia and Russia, 64% of

after the Super Bowl, I got another scoop. Twitter was planning to unveil a new policy that only Blue subscribers would be able to use two-factor authentication, allowing them to secure their accounts by adding a phone number to the sign-in process. You didn’t have to be a security expert

Uncanny Valley: A Memoir

by Anna Wiener  · 14 Jan 2020  · 237pp  · 74,109 words

it, but he could.” I had listened patiently as he tried to teach me about cryptocurrencies and the promise of the blockchain, the shortcomings of two-factor authentication, the necessity of end-to-end encryption, the inevitability of data breaches. The romance didn’t last, but in its wake we had fallen into

Terms of Service: Social Media and the Price of Constant Connection

by Jacob Silverman  · 17 Mar 2015  · 527pp  · 147,690 words

media has played such an obvious role. Both Twitter and the AP were criticized for their lax security, and a few months later, Twitter introduced two-factor authentication, a security measure that should make such incidents less likely in the future. The financial industry didn’t escape scrutiny either, as some commentators, already

Pro Git

by Scott Chacon and Ben Straub  · 12 Nov 2014  · 549pp  · 134,988 words

of these in commit messages in any repository on the site, it will be linked to your user now. Two Factor Authentication Finally, for extra security, you should definitely set up Two-factor Authentication or “2FA”. Two-factor Authentication is an authentication mechanism that is becoming more and more popular recently to mitigate the risk of your account being

methods of authentication, so that if one of them is compromised, an attacker will not be able to access your account. You can find the Two-factor Authentication setup under the Security tab of your Account settings. Figure 6-7. 2FA in the Security Tab If you click on the “Set up

two-factor authentication” button, it will take you to a configuration page where you can choose to use a phone app to generate your secondary code (a “time

and password. However, this isn’t possible with the HTTP protocols – every connection needs a username and password. This gets even harder for systems with two-factor authentication, where the token you use for a password is randomly generated and unpronounceable. Fortunately, Git has a credentials system that can help with this. Git

Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World

by Bruce Schneier  · 3 Sep 2018  · 448pp  · 117,325 words

them. In general, replacing passwords with one of these doesn’t improve things much. Using two of them together—that’s two-factor authentication—does improve security. Both Google and Facebook offer two-factor authentication via a text message on your smartphone. (This, of course, isn’t perfect, either. Some versions have been hacked.) Sprint, T

, for example, the destination of bank transfers. This is called a man-in-the-middle attack, and it works even if the bank has instituted two-factor authentication. To defend against such attacks, one can monitor the system looking for signs of hacked accounts, and then use differential authentication. This would be your

I was a child, no one wore one. Today, children won’t let people drive unless they’re wearing one. Similarly, I’ve adapted to two-factor authentication systems. It’s a small inconvenience for the trade-off of a more hacker-resistant account. Authentication is central to the Internet+. Pretty much every

secure default operation. Devices should be secure out of the box, without requiring users to configure them. They should not have weak or default passwords. Two-factor authentication should be used whenever possible. Remote administration features should be disabled unless necessary. Fail predictably and safely. If a device loses its Internet connection, it

companies. The rules required these corporations to have a chief information security officer, conduct regular security testing, provide security awareness training to employees, and implement two-factor authentication on their systems. In 2019, these standards will also apply to their vendors and third-party contractors. In 2017, California temporarily tabled a bill requiring

. There are several competing smartphone payment apps. Your cell phone number is turning into a unique identifier that’s good enough for purposes such as two-factor authentication. However, when we build a mandatory identification system, we need to catch precisely those people who want to subvert the system. Every existing identification system

-5906-5. 47Using two of them together: J. R. Raphael (30 Nov 2017), “What is two-factor authentication (2FA)? How to enable it and why you should,” CSO, https://www.csoonline.com/article/3239144/password-security/what-is-two-factor-authentication-2fa-how-to-enable-it-and-why-you-should.html. 47This, of course, isn’t

perfect, either: Andy Greenberg (26 Jun 2016), “So hey you should stop using texts for two-factor authentication,” Wired, https://www.wired.com/2016/06/hey-stop-using

-texts-two-factor-authentication. 47Sprint, T-Mobile, Verizon, and AT&T: Steve Dent (8 Sep 2017), “U.S. carriers partner on a better

.fastcompany.com/40432975/how-to-steal-a-phone-number-and-everything-linked-to-it. 48They’ll reset bank accounts: Alex Perekalin (19 May 2017), “Why two-factor authentication is not enough,” Kaspersky Daily, https://www.kaspersky.com/blog/ss7-attack-intercepts-sms/16877. Nathaniel Popper (21 Aug 2017), “Identity thieves hijack cellphone accounts

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

by Kevin Mitnick, Mikko Hypponen and Robert Vamosi  · 14 Feb 2017  · 305pp  · 93,091 words

. Passwords and PINs are part of the security solution, but we’ve just seen that these can be guessed. Even better than complex passwords are two-factor authentication methods. In fact, in response to Jennifer Lawrence and other celebrities having their nude photos plastered over the Internet, Apple instituted

two-factor authentication, or 2FA, for its iCloud services. What is 2FA? When attempting to authenticate a user, sites or applications look for at least two of three

to find through Google. I can go to the reset page for your e-mail service and request a password reset, which, because you enabled two-factor authentication, will result in an SMS code being sent to your phone. So far, so good, right? Hang on. A recent attack on a phone used

cellular service and then receive your SMS messages—for example, the SMS code from Google to reset Mckesson’s Gmail account that was protected with two-factor authentication. This is much more likely than fooling someone into reading off his or her SMS message with a new password. Although that is still possible

bank—forget it. Remember, you should enable 2FA on every site you access so an attacker armed with your username and password cannot impersonate you. Two-factor authentication will greatly mitigate the chances of your account being hacked if someone does gain knowledge of your username and password. The number of people who

—if you don’t want the company or the NSA to read it—encrypt the data before you send it.22 There the similarities end. Two-factor authentication is important, but I can still bypass this by hijacking unused accounts. For example, I recently did a pen test where the client added Google

authentication when you turn on your PC. A perpetual license sells for around $200. There is also WinMagic, one of the few options that requires two-factor authentication instead of just a password. WinMagic also doesn’t rely on a master password. Rather, encrypted files are grouped, and each group has a password

Beautiful security

by Andy Oram and John Viega  · 15 Dec 2009  · 302pp  · 82,233 words

because the client was going to roll out a hardware, token-based solution and thus supplement its traditional username and password combination to create a two-factor authentication system. Since the project had management support from the beginning, we were able to easily pull together the necessary personnel to draft the policy. To

Rebooting India: Realizing a Billion Aspirations

by Nandan Nilekani  · 4 Feb 2016  · 332pp  · 100,601 words

was soon marred by regulatory troubles. First, the Reserve Bank of India objected to Uber’s payment model, which violated the RBI mandate of a two-factor authentication for all credit card payments—designed to increase transaction security and reduce fraud. Uber initially managed to avoid this requirement by routing payments through a

API Marketplace Engineering: Design, Build, and Run a Platform for External Developers

by Rennay Dorasamy  · 2 Dec 2021  · 328pp  · 77,877 words

. Client login credentials could be easily socially engineered by simply calling an end user posing to be an employee of the financial institution. Mechanisms like two-factor authentication (2FA) are prevalent today – however, these were not readily available when the channel was first established. With the experience gained from establishing other channels, organizations

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

by David E. Sanger  · 18 Jun 2018  · 394pp  · 117,982 words

Digital Accounting: The Effects of the Internet and Erp on Accounting

by Ashutosh Deshmukh  · 13 Dec 2005

Cyber War: The Next Threat to National Security and What to Do About It

by Richard A. Clarke and Robert Knake  · 15 Dec 2010  · 282pp  · 92,998 words

Building Microservices

by Sam Newman  · 25 Dec 2014  · 540pp  · 103,101 words

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski and Adam Stubblefield  · 29 Mar 2020  · 1,380pp  · 190,710 words

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

by Richard A. Clarke and Robert K. Knake  · 15 Jul 2019  · 409pp  · 112,055 words

Mastering Blockchain, Second Edition

by Imran Bashir  · 28 Mar 2018

Docker: Up & Running: Shipping Reliable Containers in Production

by Sean Kane and Karl Matthias  · 14 May 2023  · 433pp  · 130,334 words

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

by Scott J. Shapiro  · 523pp  · 154,042 words

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

by Nicole Perlroth  · 9 Feb 2021  · 651pp  · 186,130 words

Learning Ansible 2 - Second Edition

by Fabio Alessandro Locati  · 21 Nov 2016

Before Babylon, Beyond Bitcoin: From Money That We Understand to Money That Understands Us (Perspectives)

by David Birch  · 14 Jun 2017  · 275pp  · 84,980 words

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

by Marc Goodman  · 24 Feb 2015  · 677pp  · 206,548 words

Confessions of a Crypto Millionaire: My Unlikely Escape From Corporate America

by Dan Conway  · 8 Sep 2019  · 218pp  · 68,648 words

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat

by John P. Carlin and Garrett M. Graff  · 15 Oct 2018  · 568pp  · 164,014 words

The Wires of War: Technology and the Global Struggle for Power

by Jacob Helberg  · 11 Oct 2021  · 521pp  · 118,183 words

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World

by Joseph Menn  · 3 Jun 2019  · 302pp  · 85,877 words

Velocity Weapon

by Megan E. O'Keefe  · 10 Jun 2019  · 602pp  · 164,940 words

The Future of the Internet: And How to Stop It

by Jonathan Zittrain  · 27 May 2009  · 629pp  · 142,393 words

Nobody's Fool: Why We Get Taken in and What We Can Do About It

by Daniel Simons and Christopher Chabris  · 10 Jul 2023  · 338pp  · 104,815 words

Mastering Blockchain: Unlocking the Power of Cryptocurrencies and Smart Contracts

by Lorne Lantz and Daniel Cawrey  · 8 Dec 2020  · 434pp  · 77,974 words

Engineering Security

by Peter Gutmann

Travel While You Work: The Ultimate Guide to Running a Business From Anywhere

by Mish Slade  · 13 Aug 2015  · 288pp  · 66,996 words

Bitcoin for the Befuddled

by Conrad Barski  · 13 Nov 2014  · 273pp  · 72,024 words

The Practice of Cloud System Administration: DevOps and SRE Practices for Web Services, Volume 2

by Thomas A. Limoncelli, Strata R. Chalup and Christina J. Hogan  · 27 Aug 2014  · 757pp  · 193,541 words

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

by Julia Angwin  · 25 Feb 2014  · 422pp  · 104,457 words

Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

by Andy Greenberg  · 15 Nov 2022  · 494pp  · 121,217 words

Gray Day: My Undercover Mission to Expose America's First Cyber Spy

by Eric O'Neill  · 1 Mar 2019  · 299pp  · 88,375 words

Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet

by Joseph Menn  · 26 Jan 2010  · 362pp  · 86,195 words

Zucked: Waking Up to the Facebook Catastrophe

by Roger McNamee  · 1 Jan 2019  · 382pp  · 105,819 words

Going Dark: The Secret Social Lives of Extremists

by Julia Ebner  · 20 Feb 2020  · 309pp  · 79,414 words

Kings of Crypto: One Startup's Quest to Take Cryptocurrency Out of Silicon Valley and Onto Wall Street

by Jeff John Roberts  · 15 Dec 2020  · 226pp  · 65,516 words

Seeking SRE: Conversations About Running Production Systems at Scale

by David N. Blank-Edelman  · 16 Sep 2018

The Cryptopians: Idealism, Greed, Lies, and the Making of the First Big Cryptocurrency Craze

by Laura Shin  · 22 Feb 2022  · 506pp  · 151,753 words

Battle for the Bird: Jack Dorsey, Elon Musk, and the $44 Billion Fight for Twitter's Soul

by Kurt Wagner  · 20 Feb 2024  · 332pp  · 127,754 words

The Bitcoin Guidebook: How to Obtain, Invest, and Spend the World's First Decentralized Cryptocurrency

by Ian Demartino  · 2 Feb 2016  · 296pp  · 86,610 words

Spam Nation: The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door

by Brian Krebs  · 18 Nov 2014  · 252pp  · 75,349 words

The Best Business Writing 2013

by Dean Starkman  · 1 Jan 2013  · 514pp  · 152,903 words

Reset

by Ronald J. Deibert  · 14 Aug 2020

Whistleblower: My Journey to Silicon Valley and Fight for Justice at Uber

by Susan Fowler  · 18 Feb 2020  · 205pp  · 71,872 words

Enshittification: Why Everything Suddenly Got Worse and What to Do About It

by Cory Doctorow  · 6 Oct 2025  · 313pp  · 94,415 words

The Industries of the Future

by Alec Ross  · 2 Feb 2016  · 364pp  · 99,897 words

Remote: Office Not Required

by Jason Fried and David Heinemeier Hansson  · 29 Oct 2013  · 98pp  · 30,109 words

The New Digital Age: Transforming Nations, Businesses, and Our Lives

by Eric Schmidt and Jared Cohen  · 22 Apr 2013  · 525pp  · 116,295 words

Easy Money: Cryptocurrency, Casino Capitalism, and the Golden Age of Fraud

by Ben McKenzie and Jacob Silverman  · 17 Jul 2023  · 329pp  · 99,504 words

Amazon: How the World’s Most Relentless Retailer Will Continue to Revolutionize Commerce

by Natalie Berg and Miya Knights  · 28 Jan 2019  · 404pp  · 95,163 words

Work Rules!: Insights From Inside Google That Will Transform How You Live and Lead

by Laszlo Bock  · 31 Mar 2015  · 387pp  · 119,409 words

Practical Doomsday: A User's Guide to the End of the World

by Michal Zalewski  · 11 Jan 2022  · 337pp  · 96,666 words

Freedom Without Borders

by Hoyt L. Barber  · 23 Feb 2012  · 192pp  · 72,822 words

The Autonomous Revolution: Reclaiming the Future We’ve Sold to Machines

by William Davidow and Michael Malone  · 18 Feb 2020  · 304pp  · 80,143 words

How to DeFi

by Coingecko, Darren Lau, Sze Jin Teh, Kristian Kho, Erina Azmi, Tm Lee and Bobby Ong  · 22 Mar 2020  · 135pp  · 26,407 words

Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond: The Innovative Investor's Guide to Bitcoin and Beyond

by Chris Burniske and Jack Tatar  · 19 Oct 2017  · 416pp  · 106,532 words