Two-factor authentication: Difference between revisions

Content deleted Content added
Mobile phone two-factor authentication: SIM-cloning and wiretapping
removed claim that was not supported by reference
Line 39:
* Modern smart phones are used both for browsing email and for receiving SMS. Email is usually always logged in. So if the phone is lost or stolen, all accounts for which the email is the key can be hacked as the phone can receive the second factor. So smart phones combine the two factors into one factor.
* Mobile phones can be stolen, potentially allowing the thief to gain access into the user's accounts
* Malware can steal credentials from the phone <ref>[https://www.hackread.com/dyre-wolf-malware-bypasses-2-factor-authentication-security-steals-1million/ Dyre Wolf malware bypasses 2FA Security, Manages to Steal $1million]</ref>
 
=== Advances in Mobile Two-Factor Authentication ===