top of page

How Hackers Reportedly Side-Stepped Google’s Two-Factor Authentication

  • Writer: Michael Trotter-Lawson
    Michael Trotter-Lawson
  • Nov 2, 2014
  • 1 min read

This is a great article that exposes the weaknesses associated with cell phones and their role in multi-factor authentication deployments.  This also adds credence the value of physical tokens such as those associated with the FIDO standard from Yubico.

Recent Posts

See All
bottom of page