Tag Archives: two-factor authentication

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel

reader comments 118 The YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard, contains a cryptographic flaw that makes the finger-size device vulnerable to cloning when an attacker gains temporary physical access to it, researchers said Tuesday. The cryptographic flaw, known as a side channel, resides in a… Read More »

Twitter’s two-factor authentication change “doesn’t make sense”

reader comments 232 with Share this story Twitter announced Friday that as of March 20, it will only allow its users to secure their accounts with SMS-based two-factor authentication if they pay for a Twitter Blue subscription. Two-factor authentication, or 2FA, requires users to log in with a username and password and then an additional… Read More »

This week’s Reddit breach shows company’s security is (still) woefully inadequate

Getty Images reader comments 21 with 0 posters participating Share this story Popular discussion website Reddit proved this week that its security still isn’t up to snuff when it disclosed yet another security breach that was the result of an attack that successfully phished an employee’s login credentials. In a post published Thursday, Reddit Chief… Read More »

I’m a security reporter and got fooled by a blatant phish

Enlarge / This is definitely not a Razer mouse—but you get the idea. (credit: calvio via Getty Images) There has been a recent flurry of phishing attacks so surgically precise and well-executed that they’ve managed to fool some of the most aware people working in the cybersecurity industry. On Monday, Tuesday, and Wednesday, two-factor authentication… Read More »

Ongoing phishing campaign can hack you even when you’re protected with MFA

Enlarge (credit: Getty Images) On Tuesday, Microsoft detailed an ongoing large-scale phishing campaign that can hijack user accounts when they’re protected with multi-factor authentication measures designed to prevent such takeovers. The threat actors behind the operation, who have targeted 10,000 organizations since September, have used their covert access to victim email accounts to trick employees… Read More »

Lapsus$ and Solar Winds hackers both use the same old trick to bypass MFA

Getty Images reader comments 0 with 0 posters participating Share this story Multi-factor authentication (MFA) is a core defense that is among the most effective at preventing account takeovers. In addition to requiring that users provide a username and password, MFA ensures they must also use an additional factor—be it a fingerprint, physical security key,… Read More »

Authorities bust SIM-swap ring they say took millions from the rich and famous

Enlarge / Close-up photograph of a SIM card, a SIM-card replacement, and a smartphone. reader comments 86 with 60 posters participating, including story author Share this story Ten people have been arrested in connection with a series of SIM-swapping attacks that reaped more than $100 million by taking over the mobile phone accounts of high-profile… Read More »

Hackers can clone Google Titan 2FA keys using a side channel in NXP chips

reader comments 45 with 37 posters participating Share this story There’s wide consensus among security experts that physical two-factor authentication keys provide the most effective protection against account takeovers. Research published today doesn’t change that, but it does show how malicious attackers with physical possession of a Google Titan key can clone it. There are… Read More »