Are You Using SMS For Two-Factor Authentication? Here’s Why You Should Stop

How-To Geek SMS Two-Factor Auth Isn't Perfec
Share It On:

April 13, 2020, Kathmandu

There’s always a negative side to something good. Using two-factor authentication, or 2FA also has a downside. You might risk getting codes over SMS or text message.

The coronavirus pandemic has given a golden opportunity for hackers and scammers to prey on people’s fears. The threat actors have tried it all – from SIM swapping to phishing campaigns and stimulus check emails. As a result, it would be a very good time to look out for any suspicious activities on your account and email.

You would be wise to use two-factor authentication (2FA) to secure your personal information. And, you’d be even wiser to use an authentication app over SMS or text to receive codes.

But why? We will explain it in this article.

The authentication apps have their own perks. It is a more secure way to receive codes than in texts. The login process is also quicker. So basically, it’s a win-win situation.

What is two-factor authentication?

That is actually a good question. Don’t you want to know what the fuss is all about?

Well, here it goes.

2FA is an extra layer of security that makes sure that people trying to gain access to an online account are who they claim to be. How it works is first, a user will enter their username and password. Then, instead of immediately logging in, they will have to verify their identity.

How? That’s where 2FA comes in!

They will be required to provide another piece of information, e.g., a code sent on their SMS.

Even this piece of information can be one of the following:

  • Something you know

This could be a PIN, a password, an answer to a security question, etc.

  • Something you have

You can gain access to your account with something in your possession, like a credit card, smartphone, or a hardware token.

  • Something you are

This is somewhat an advanced category. It requires a biometric pattern of a fingerprint, an iris scan, or voice authentication.

Why Stop Using SMS?

Let’s just say that SMS is by far the least secure way of gaining access to your account via 2FA. Hackers have been able to trick your SIM carriers into porting a phone number to a new device – SIM swap. Now, once the hacker has redirected your phone number, they no longer require your physical cell phone to gain access to your 2FA codes.

Think of it as phone cloning, except your SMS will be redirected to the hacker and you will not know anything about it.

That’s not the end of it!

In fact, if you sync text messages with your laptop or tablet, the hacker could gain access to SMS codes by walking off with such a device of yours.

Hmm, that sounds troubling…

Well, it is troubling considering the weaknesses in the mobile telecom system itself. In something called an SS7 attack, a hacker can spy via the cell phone system, listening to your calls, intercepting text messages and viewing your phone location.

We hope you get how bad it could turn out to receive 2FA codes via SMS or text.

What to use instead?

Well, there are a couple of authentication apps for you such as Google Authenticator, Microsoft Authenticator or Authy. These apps make sure you don’t rely on your carrier, thereby lifting off the risk of an SMS swap. Moreover, the codes expire quickly, usually after 30 seconds or so.

Most people that have enabled 2FA on Facebook might know what we are talking about. It’s the same concept.

In addition, the authentication apps are faster, and you may get access by simply tapping a button to verify your identity. No codes, no password needed to enter.

In fact, if you have an Android phone or iPhone with the Google search or Gmail app, you can set up Google prompts to receive codes without having to install a separate authenticator app.

You will receive push notifications on your phone that require a simple tap to approve.

So much quicker, reliable, and convenient!

 Isn’t it?

Do I really need two-factor authentication?

If you want to secure your online account and data, you sure do need it. Using stronger passwords and security questions is one thing. And, setting up 2FA can be the best move you make to secure your online privacy.

We would choose two-step verification over one-step any day. After all, our online data and activities are on the line. Hackers target the weak accounts and it’s almost sure that without 2FA, your account could be next.

It might sound like a hassle but compare it with the hassle of getting hacked.

For more ways to stay safe online, check out how to secure your online presence


Share It On:

Recent Posts

Lumbini Lions Jersey Unveiled: A Tribute to Buddhist Heritage

Lumbini Lions Jersey Unveiled: A Tribute to Buddhist Heritage

Share It On:17th November 2024, Kathmandu The Lumbini Lions Club has unveiled their jersey for the upcoming Nepal Premier League

Barbadian Fast Bowler Ramon Simmonds Joins Lumbini Lions for NPL 2024

Barbadian Fast Bowler Ramon Simmonds Joins Lumbini Lions for NPL

Share It On:17th November 2024, Kathmandu Lumbini Lions have added firepower to their bowling attack for the upcoming Nepal Premier

Xiaomi Unveils New High-Capacity Fast-Charging Power Banks in Nepal

Xiaomi Unveils New High-Capacity Fast-Charging Power Banks in Nepal

Share It On:17th November 2024, Kathmandu Xiaomi, a global leader in consumer electronics and smart manufacturing, has unveiled three new

.NET Conf 2024 AspnetCommunity Kathmandu Nepal Successfully Concludes With 130+ Attendees

.NET Conf 2024 AspnetCommunity Kathmandu Nepal Successfully Concludes With 130+

Share It On:17th November 2024, Kathmandu The ASP.NET Community has successfully hosted “.NET Conf 2024 AspnetCommunity Kathmandu Nepal” at Kantipur

Gen AI in Focus 2024: November Breakthroughs, Industry Stats & Election Impact

Gen AI in Focus 2024: November Breakthroughs, Industry Stats &

Share It On:17th November 2024, Kathmandu Generative AI is revolutionizing industries, with the market expected to surge from $40 billion

Shocking T-Mobile Breach: Chinese Hackers Have Access to Your Private Data

Shocking T-Mobile Breach: Chinese Hackers Have Access to Your Private

Share It On:17th November 2024, Kathmandu T-Mobile’s network has been targeted in a major Chinese cyber-espionage campaign that has infiltrated