How Hackers Reportedly Side-Stepped Google’s Two-Factor Authentication
- Michael Trotter-Lawson
- Nov 2, 2014
- 1 min read
This is a great article that exposes the weaknesses associated with cell phones and their role in multi-factor authentication deployments. This also adds credence the value of physical tokens such as those associated with the FIDO standard from Yubico.