

Well, in my opinion, 2FA app is still much better than using just a password. The only problem is that security key devices are expensive and apps are free.

The last one, security key, is the most secure as it uses a hardware security key device, like Yubikey, which works via USB or Bluetooth to verify your sign in. This requires the hacker to have either physical access to your phone or steal your user session cookie. No OTP was ever received! It is becoming increasingly easy to spoof a SIM card and request an OTP which is then delivered to the hacker’s smartphone using a technique called SIM swap.ĢFA app is more secure as the code is generated via a mobile app which is installed on your smartphone. My credit card was once hacked and about $1000 were stolen, or rather used, within 15 seconds. I think the SMS is the weakest and here is why. For the purpose of this article, we will focus on these 3 which are accessible to all users across a number of sites and apps. Basically, when you add a second layer of verification or authentication for login, its called 2FA. There are few other types too like fingerprint or retina scan but they don’t work across apps and sites yet. This code is generated and delivered to the user in various ways: Types of 2FAĢFA stands for two-factor authentication where the user is required to enter a 6-digit code in addition to the user name and password. More recently, 2FA has emerged as the winner with more and more companies adopt FIDO standards to allow users use a second layer of sign in authentication. Response? While ethical hackers are in an eternal race against time to beat their nemesis, users are now being encouraged to use a strong password to reduce chances of their accounts getting compromised. Some of the most powerful tech giants have seen their fair share of controversy. Quite a few high profile hacks have rocked the digital world in the last 5 years alone.
