3
top 1 comments
sorted by: hot top controversial new old
[-] Zachariah@lemmy.world 2 points 3 days ago

Legacy MFA methods often fail to prevent determined attackers. enable bad actors to manipulate individuals into sharing not just usernames and passwords but also the secondary verification codes or push approvals needed to access accounts. This gap in security necessitates a move toward phishing-resistant MFA solutions.

this post was submitted on 24 Nov 2024
3 points (100.0% liked)

Infosec News

247 readers
30 users here now

A community posting Cybersecurity related articles.

founded 1 month ago
MODERATORS