LinkedIn, Evernote Add Two-Factor Authentication

Will LinkedIn and Evernote improve upon Apple and Twitter two-factor security systems, which have been widely criticized?

Mathew J. Schwartz, Contributor

June 4, 2013

5 Min Read

10 Top Password Managers

10 Top Password Managers


10 Top Password Managers (click image for slideshow)

Both LinkedIn and Evernote last week announced that effective immediately, they would begin offering two-factor authentication (2FA) for users. If enabled, the optional feature requires users to log in with their username, password and a one-time code either sent in a text message to their registered mobile phone number or generated using an app such as Google Authenticator.

The two businesses' approaches differ slightly. Evernote, for example, said it offers two-factor authentication via a six-digit code sent to the mobile phone number registered to the account. "This code is delivered to your mobile phone via text message or, if you prefer, generated by an app that runs on your smartphone, such as Google Authenticator," said Seth Hitchings, VP of platform strategy at Evernote, in an Evernote blog post. "We'll also give you a set of one-time backup codes for when you're traveling."

The security feature is currently available only for paid users. "Two-step verification is initially available to Evernote Premium and Evernote Business users only," said Hitchings, who recommended that users update all of their Evernote applications to the latest version before activating it. "Once we've optimized our processes and feel comfortable with our ability to support a wide audience, we will make it available to all users," he said.

Evernote has also implemented -- for all users -- an "access history" feature, which will list the IP address and geographic location of all account access for the past 30 days. "If you ever suspect that your account was accessed without your knowledge, you can check the history," said Hitchings.

[ Want to become a LinkedIn power user? Read LinkedIn Tips: 10 Ways To Do More. ]

LinkedIn announced Friday that it too would offer two-factor authentication, though so far only via a six-digit code sent via SMS. "Turn on two-step verification for your account now by going to Settings, selecting the Account tab and clicking Manage security settings option," Vicente Silveira, a director at LinkedIn, wrote in a blog post. He also suggested that additional behind-the-scenes access controls are already in place, noting that "all LinkedIn accounts are already protected by a series of automatic checks that are designed to thwart unauthorized sign-in attempts."

The moves by Evernote and LinkedIn to offer some form of two-factor authentication came the same month that Twitter began offering two-step verification, although early feedback on its system has been mixed. Other businesses, including Google and Facebook, have offered the security feature for some time.

In the case of Evernote and LinkedIn, the move to two-factor authentication was driven by both businesses suffering data breaches that put passwords at risk. A breach of at least 6.5 million LinkedIn passwords was discovered in June 2012, after an attacker uploaded some of the password hashes to a hacking forum, seeking advice on how to crack them.

Evernote, meanwhile, announced in March 2013 that it had suffered a database breach in which attackers obtained usernames, as well as hashed and salted versions of users' passwords. The company immediately forced all 50 million users to reset their passwords and promised to accelerate two-factor authentication implementation plans.

And if password hashes are exposed in the future? For any Evernote or LinkedIn user who'd activated two-factor authentication, attackers wouldn't be able to automatically access their account and steal data. But that's not the case with every two-factor -- aka two-step -- verification system.

Take Apple iCloud. "In its current implementation, Apple's two-factor authentication does not prevent anyone from restoring an iOS backup onto a new (not trusted) device," said Vladimir Katalov, CEO of Moscow-based Elcomsoft, in a recent blog post. "In addition, and this is much more of an issue, Apple's [two-factor] implementation does not apply to iCloud backups."

As a result, any attacker who knows a target's Apple ID and password could restore any iOS device backup onto a fresh device, then access that information without ever having to provide a one-time code. "Of course you're in trouble if your ID (any one, not just Apple's) and password is leaked," Katalov said. "But that's where 2FA should help, and that's why because most of the services are implementing it nowadays."

Attackers targeting information stored in iCloud is no trivial matter. According to court records, for example, accused LulzSec collaborator Donncha O'Cearrbhail intercepted the dial-in credentials for a transatlantic conference call between the FBI and its overseas cyber-crime counterparts, boasting to the hacktivist Sabu that he'd hacked "into the iCloud for the head of a national police cybercrime unit." O'Cearrbhail allegedly added: "I have all his contacts and can track his location 24/7."

To be fair, Apple hasn't ever suggested that its two-factor security system works for iCloud. As noted in the Apple ID two-step verification FAQ: "Turning on two-step verification reduces the possibility of someone accessing or making unauthorized changes to your account information at My Apple ID or making purchases using your account."

Until Apple extends two-factor authentication to iCloud, Katalov said iOS users who use Apple's service for backup or data storage are more vulnerable to data breaches than they should be. Then again, the same holds true for other services that are still refining their two-factor authentication systems, or not yet offering it to all users.

About the Author(s)

Mathew J. Schwartz

Contributor

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights