Trouble in Paradise as Cyber Attackers Circumvent 2FA

Two-Factor Authentication (2FA) has for years been one of the very dependable security technologies that was invoked to address high-risk scenarios — whether to safeguard enterprise resources  accessed through the firewall, financial accounts, or — for high-value targets — protect each email login. Most people, to the extent that they spend time thinking about the security of 2FA, conclude — incorrectly — that 2FA offers bullet proof security for authentication.

Read full article: