Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Problem With Two-Factor Authentication
Oldest First  |  Newest First  |  Threaded View
Page 1 / 4   >   >>
User Rank: Apprentice
2/4/2014 | 6:01:03 PM
Duo Security
I think Duo Security's two-factor authentication may do things differently. However, I have yet to see an true expert write a review on this service, so I would definitely be interested in reading what the author has to say about it. https://www.duosecurity.com
User Rank: Apprentice
2/4/2014 | 6:44:17 PM
Great write up
Its a great approach... look forward for new articles on the subject from the Author.
Li Tan
Li Tan,
User Rank: Apprentice
2/4/2014 | 8:01:00 PM
Re: Duo Security
The new approach looks good. Furthermore, the core concept behind is important - the security lies mainly with architecture from design perpsective instead of single piece of authentication technology. I am willing to see more articles describing it in more detail.
User Rank: Apprentice
2/5/2014 | 2:01:48 AM
Effective Two-factor authentication
A best analysis on the two-factor authentication. However, a bidirectional approach (both from Server and Client communications) will give better solutions. VeriQR is such a solution addressing this - http://www.integritauk.com/veriQR.html
User Rank: Apprentice
2/5/2014 | 8:45:37 AM
Beyond authentication
I live by the old saying that locks are for honest people.   If someone wants in badly enough a lock is not going to stop them.  The same goes for any authentication method.  If you lock down your application well enough someone will turn to social engineering to get in.  One thing I rarely see covered when talking about securing any assets is intelligent monitoring.  The recent attacks on Target and Niemen Marcus don't seem to have been detected until after millions of records were lost.  One thing I'd like to see addressed is how do you see the leak before the flood gates are fully open?
User Rank: Apprentice
2/5/2014 | 9:41:14 AM
Re: Beyond authentication
@SaneIt In light of your comment, I wonder if we should regard locks and this kind of authentication as a positional good. Its value is derived from others not having it. It's rather like those steering wheel locks sold as anti-theft protection on cars. They won't prevent a truly capable thief form taking your car. But if your car is not particularly valuable and is among others of equal value that do not have the extra protection, the thief may just go for the easiest break-in. However, when every driver starts using these things, then they'll make no difference. 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
2/5/2014 | 1:51:45 PM
Security is more than authentication
I totally agree, Li, that the Garret raised an issue that too often overlooked in the  discussions of biometrics, tokens and passwords and other mutlficactor authentication technologies.  You can have the best authentication in the world, but if the architecture isn't designed properly you're still vulnerable. 
User Rank: Apprentice
2/5/2014 | 5:33:57 PM
Re: Security is more than authentication
And wouldn't you know it? Maxine has just the right picture for this topic: 
User Rank: Apprentice
2/5/2014 | 7:37:16 PM
Two factor is useful after the data breach
Overall, a good article. However, I take issue with two things: first, user fatigue. There are new 2FA offerings that are largely invisible (see, for example, Toopher). When users don't have to keep track of a separate single-use item and they don't have to manually approve every request, they will flock to two-factor. And that brings me to my second nitpick: two-factor is useful after the data breach--perhaps even more important after your usernames and passwords are public information. If your account details are leaked, multi-factor authentication helps reduce the damage that can be done with your hacked credentials. Ultimately, we need more high quality two factor implementations, and, as you said, securing logins will be easier when we start funnelling all logins through a single point, reducing the attack surface.
Li Tan
Li Tan,
User Rank: Apprentice
2/5/2014 | 9:52:23 PM
Re: Security is more than authentication
You got my point, Marilyn. Furthermore, I am a little bit pessimistic regarding security. You can improve security all the time by implementing new architectures and techniques but you will never caulk the gap - there is always cavity for the hackers.:-(
Page 1 / 4   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-01-26
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
PUBLISHED: 2023-01-26
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.
PUBLISHED: 2023-01-26
An access control issue in Revenue Collection System v1.0 allows unauthenticated attackers to view the contents of /admin/DBbackup/ directory.
PUBLISHED: 2023-01-26
Revenue Collection System v1.0 was discovered to contain a SQL injection vulnerability at step1.php.
PUBLISHED: 2023-01-26
Unrestricted Upload of File with Dangerous Type in GitHub repository unilogies/bumsys prior to v1.0.3-beta.