The many ways to hack 2FA

Author:

Grimes Roger1

Affiliation:

1. KnowBe4

Abstract

As the days of pervasive password authentication are starting to wane, administrators and end users are increasingly turning to stronger types of authentication such as two-factor authentication (2FA) and multi-factor authentication (MFA). All other considerations considered equal, MFA solutions (which include 2FA) are usually stronger than single-factor authentication (1FA) solutions such as the ubiquitous duo of username and password. This is generally agreed upon by all computer security professionals. People are increasingly turning to stronger types of authentication such as two-factor authentication (2FA) and multi-factor authentication (MFA). But somewhere along the way, many people have come to associate MFA solutions with being far less hackable or even unhackable. Nothing could be further from the truth. In fact, it's possible to use nothing more than a simple phishing email to easily bypass many beloved MFA solutions, says Roger Grimes of KnowBe4.

Publisher

Mark Allen Group

Subject

Information Systems and Management,Computer Networks and Communications,Safety, Risk, Reliability and Quality

Reference6 articles.

1. Ryan Erenhouse ‘Dispelling the myths: the reality about contactless security’; 17 Jan 2018: Mastercard> https://newsroom.mastercard.com/2018/01/17/dispelling-the-myths-the-reality-about-contactless-security-2/ accessed August 2019

2. Roger Grimes ‘Smartcard subject hijack hack’; 8 Feb 2019: YouTube> www.youtube.com/watch?v=OLQ3lAMuokI&feature=youtu.be accessed August 2019

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Improving OTP Authentication with PQC Algorithms;2024 Global Information Infrastructure and Networking Symposium (GIIS);2024-02-19

2. The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review;Open Journal of Business and Management;2024

3. A New Approach To Pseudonym Certificate Management in V2X Communication;2023 IEEE Vehicular Networking Conference (VNC);2023-04-26

4. The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number Recycling;Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems;2021-05-06

5. Analyzing the Security of OTP 2FA in the Face of Malicious Terminals;Information and Communications Security;2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3