No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Two-Factor Authentication Can Fail You, but You Can Make It More Secure

May 10, 2025
in Protection
0



Two-factor authentication (2FA) is a great way to boost the security of your accounts. But even with that added layer of security, malicious actors are finding ways to break in. So-called adversary-in-the-middle attacks take advantage of weaker authentication methods to access accounts. Your two-factor and multi-factor authentication (MFA) may be weak, but, luckily, there’s something you can do about it.

How multi-factor authentication works

MFA uses two or more checkpoints to confirm a user’s identity for accessing an account or system. This is more secure than relying on just a username and password combination, especially given how easy many passwords are to crack, and how many have found their way onto the dark web. Passwords are often basic and repeated, so once a password has been compromised, it can be used to get into many accounts. That’s why it’s so important to use strong and unique passwords for each one of your accounts.

With MFA, a password isn’t enough. From here, the user has to validate their login using at least one additional piece of evidence, ideally that only they have access to. This can be a knowledge factor (a PIN), a possession factor (a code from an authenticator app), or an identity factor (a fingerprint).

Note that while 2FA and MFA are often used interchangeably, they aren’t necessarily the same thing. 2FA uses two factors to verify a user’s login, such as a password plus a security question or SMS code. With 2FA, both factors can something the user knows, like their password and a PIN.

MFA requires at least two factors, and they must be independent: a combination of a knowledge factor like a password, plus a biometric ID or a secure authenticator like a security key or one-time password. Generally, the more authentication factors needed, the greater the account security. But if all factors can be found on the same device, security is at risk if that device is hacked, lost, or stolen.

MFA can still be compromised

While having MFA enabled on your accounts can make you feel secure, some MFA methods can be compromised almost as easily as your usernames and passwords.

As Ars Technica reports, certain knowledge and possession factors are themselves susceptible to phishing. Attacks known as adversary-in-the-middle target authentication codes, such as those sent via SMS and email, as well as time-based one-time passwords from authenticator apps, allowing hackers to access your accounts through factors you’ve unknowingly handed them.


What do you think so far?

The attack works as follows: Bad actors send you a message saying that one of your accounts—Google, for example—has been compromised, with a link to log in and lock it down. The link looks real, as does the page you land on, but it is actually a phishing link connected to a proxy server. The server forwards the credentials you enter to the real Google site, which triggers a legitimate MFA request (and if you’ve set up MFA on your account, there’s no reason to believe this is suspicious). But when you enter the authentication code on the phishing site or approve the push notification, you’ve inadvertently given the hacker access to your account.

Adversary-in-the-middle is even easier to carry out thanks to phishing-as-a-service toolkits available in online forums.

How to maximize MFA security

To get the most out of MFA, consider switching from factors like SMS codes and push notifications to an authentication method that is more resistant to phishing. The best option is MFA based on WebAuthn credentials (biometrics or passkeys) that are stored on your device hardware or a physical security key like Yubikey. Authentication works only on the real URL and on or in proximity to the device, so adversary-in-the-middle attacks are nearly impossible.

In addition to switching up your MFA method, you should also be wary of the usual phishing red flags. Like many phishing schemes, MFA attacks prey on the user’s emotions or anxiety about their account being compromised and the sense of urgency to resolve the problem. Never click links in messages from unknown senders, and don’t react to supposed security issues without checking their legitimacy first.



Editorial Team

Editorial Team

Related Posts

You Can Equip a Complete Home Gym for $1,300 During the Amazon Spring Sale
Protection

You Can Equip a Complete Home Gym for $1,300 During the Amazon Spring Sale

March 30, 2026
The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching 'Heated Rivalry'
Protection

The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘Heated Rivalry’

March 30, 2026
10 Shows Like 'Your Friends and Neighbors' You Should Watch Next
Protection

10 Shows Like ‘Your Friends and Neighbors’ You Should Watch Next

March 30, 2026
This Eufy Robot Vacuum and Mop Combo Is $300 Off During Amazon’s Big Spring Sale
Protection

This Eufy Robot Vacuum and Mop Combo Is $300 Off During Amazon’s Big Spring Sale

March 30, 2026
The Best Fitness Deals Under $100 During Amazon's Big Spring Sale
Protection

The Best Fitness Deals Under $100 During Amazon’s Big Spring Sale

March 30, 2026
How to Play Retro Games on Your Modern Phone or TV
Protection

How to Play Retro Games on Your Modern Phone or TV

March 30, 2026
Load More
Next Post
India and Pakistan announce ceasefire

India and Pakistan announce ceasefire

Popular News

  • Sam Altman World Foundation Crypto Offloads 239M WLD Tokens for $65M Near All-Time Lows

    Sam Altman World Foundation Crypto Offloads 239M WLD Tokens for $65M Near All-Time Lows

    0 shares
    Share 0 Tweet 0
  • Defaults on leveraged loans soar to highest in 4 years

    0 shares
    Share 0 Tweet 0
  • Exclusive-Prior to Iran attacks, CIA assessed Khamenei would be replaced by IRCG elements if killed, sources say

    0 shares
    Share 0 Tweet 0
  • US senator probes Binance over alleged Iran and Russia sanctions violations

    0 shares
    Share 0 Tweet 0
  • Hacks Every Homeowner Should Know

    0 shares
    Share 0 Tweet 0

Latest News

Condé Nast Traveler

My Dad Can’t Travel Like He Used to, but Slowing Down Doesn’t Mean Stopping

March 30, 2026
0

When we tried our hands at wax-resist batik with heritage preservation organization Jelajah Pusaka, Indah noticed her grandfather growing frustrated...

Meta tests Instagram Plus subscription with stealth story viewing and paid features for users

Meta tests Instagram Plus subscription with stealth story viewing and paid features for users

March 30, 2026
0

Meta Platforms has begun testing a new premium subscription called Instagram Plus, offering everyday users access to exclusive features as...

‘I was shoveling sidewalks at 8 years old’: I’m a 73-year-old boomer dad with two kids. Here’s what I teach them about finance

‘I was shoveling sidewalks at 8 years old’: I’m a 73-year-old boomer dad with two kids. Here’s what I teach them about finance

March 30, 2026
0

“My parents knew nothing about finance and investing, so my buddies and I had to figure it out on our...

Advisor - HigherEdJobs

Advisor – HigherEdJobs

March 30, 2026
0

Salary: $48,707.00 - $51,142.35 AnnuallyLocation: Spring Hill Campus (Spring Hill, FL)Job Type: Full-TimeJob Number: 202600060Department: Academic AdvisingClosing...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.