2fa

cybersecurity

How Hackers Bypass Gmail 2FA at Scale

A new Amnesty International report goes into some of the technical details around how hackers can automatically phish two-factor authentication tokens sent to phones.
Joseph Cox
12.19.18
china

Experts Call for Transparency Around Google’s Chinese-Made Security Keys

Google's Titan Security Keys, used to lock down accounts, are produced in China. Several experts want more answers on that supply chain process, for fears of tampering or security issues.
Joseph Cox
8.31.18
LOCK DOWN

Instagram Working on Stronger 2FA That Won't Use Your Phone Number

Some Instagram users are at particular risk of sim hijacking, where a hacker takes control of their phone number and uses that to break into accounts. Now, Instagram is pushing towards app-based authentication, which should make the hackers' job harder.
Joseph Cox
7.18.18
LOCK DOWN

Here’s How to Make Your Twitter Account Super Secure with a YubiKey

When a site offers different methods of authentication, your account is only as secure as the weakest option. Here, Motherboard shows you how to use the most robust method for locking down your Twitter account.
Joseph Cox
6.27.18
Motherboard Guide to Not Getting Hacked

What Is a Two-Factor Authentication Recovery Code?

Two-factor authentication is essential for good security on the internet. But if you don’t store your recovery codes, your security system may do more harm than good.
Daniel Oberhaus
5.17.18
Motherboard's Security Tuneup

You Should Be Using Two-Factor Authentication on Everything

Day three of our personal security tuneup: turn on that 2FA!
Kaleigh Rogers
Lorenzo Franceschi-Bicchierai
5.16.18
Internet Insecurity

The Motherboard Guide to Using Facebook Safely

You might not be able to afford the privilege of deleting Facebook, or you just kinda want to be able to keep tabs on your friends. If that’s the case, here’s how to use Facebook in the safest way possible.
Lorenzo Franceschi-Bicchierai
3.21.18
123456

Too Many People Are Still Using ‘Password’ as a Password

'Starwars' was another popular and bad choice for passwords this year.
Yael Grauer
12.19.17
good ideas

An Etsy Engineer Made Earrings To Hold Your Two-Factor Security Keys

Finally, a useful infosec accessory for a femme audience.
Louise Matsakis
12.5.17
How Hacking Works

What Is Two-Factor Authentication and Why You Should Use It

Two-factor authentication can help make your online accounts practically impossible to hack.
Lorenzo Franceschi-Bicchierai
11.23.17
def con

Hackers Show Proofs of Concept to Beat Hardware-Based 2FA

DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented.
Joseph Cox
7.29.17
Internet Insecurity

The Rising Price of Bitcoin and Ethereum Is Leading to More Hacking Attempts

If you own bitcoin or ether, two-factor authentication (and not with SMS) is your friend.
Lorenzo Franceschi-Bicchierai
6.6.17
Newer0102Older