Facebook’s Phone Number Policy Could Push Users to Not Trust Two-Factor Authentication
Users are angry that Facebook is letting others, including advertisers, look up users via the phone numbers they provided to enable two-factor authentication.
How Hackers Bypass Gmail 2FA at Scale
A new Amnesty International report goes into some of the technical details around how hackers can automatically phish two-factor authentication tokens sent to phones.
Experts Call for Transparency Around Google’s Chinese-Made Security Keys
Google's Titan Security Keys, used to lock down accounts, are produced in China. Several experts want more answers on that supply chain process, for fears of tampering or security issues.
Instagram Working on Stronger 2FA That Won't Use Your Phone Number
Some Instagram users are at particular risk of sim hijacking, where a hacker takes control of their phone number and uses that to break into accounts. Now, Instagram is pushing towards app-based authentication, which should make the hackers' job harder.
Here’s How to Make Your Twitter Account Super Secure with a YubiKey
When a site offers different methods of authentication, your account is only as secure as the weakest option. Here, Motherboard shows you how to use the most robust method for locking down your Twitter account.
Motherboard Guide to Not Getting Hacked
What Is a Two-Factor Authentication Recovery Code?
Two-factor authentication is essential for good security on the internet. But if you don’t store your recovery codes, your security system may do more harm than good.
Motherboard's Security Tuneup
You Should Be Using Two-Factor Authentication on Everything
Day three of our personal security tuneup: turn on that 2FA!
The Motherboard Guide to Using Facebook Safely
You might not be able to afford the privilege of deleting Facebook, or you just kinda want to be able to keep tabs on your friends. If that’s the case, here’s how to use Facebook in the safest way possible.
Too Many People Are Still Using ‘Password’ as a Password
'Starwars' was another popular and bad choice for passwords this year.
An Etsy Engineer Made Earrings To Hold Your Two-Factor Security Keys
Finally, a useful infosec accessory for a femme audience.
How Hacking Works
What Is Two-Factor Authentication and Why You Should Use It
Two-factor authentication can help make your online accounts practically impossible to hack.
Hackers Show Proofs of Concept to Beat Hardware-Based 2FA
DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented.