• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

You’re Implementing This Basic Security Feature All Wrong

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
June 27, 2016, 7:27 PM ET
87th Annual Academy Awards - Arrivals
HOLLYWOOD, CA - FEBRUARY 22: Actress Reese Witherspoon attends the 87th Annual Academy Awards at Hollywood & Highland Center on February 22, 2015 in Hollywood, California. (Photo by Kevork Djansezian/Getty Images)Kevork Djansezian—Getty Images

You’ve created different passwords for all your online accounts and set up a password manager to remember them all. You’ve also changed your passwords after all the recent hackings and implemented two-factor authentication, a tool that provides extra protection against breaches by requiring a second login code that is sent to your smartphone, for example, each time you sign on.

Nice job! This is the closest thing to hacker-proof you’ve ever been, right?

Hold the phone—literally. Because that last measure—two factor authentication—may have several vulnerabilities. The flaws here have to do with the way many Internet companies send security codes to your phone as part of the two-factor authentication process, as Wired points out.

Texts, or SMS messages, are not the ideal way to convey such information. Attackers can compromise your text-based two-factor authentication in a few ways.

Get Data Sheet, Coins2Day’s technology newsletter.

First, they can do it through social engineering—in other words, by calling your mobile service provider and asking them to redirect messages normally delivered to your phone to one containing a different SIM card. You can help block this by calling your provider and asking to set up a PIN code on your account, where applicable.

Second, attackers can intercept messages using a device called an IMSI—or international mobile subscriber identity—catcher. The machines are not cheap, sure—but hey, maybe your enemies are well off?

And third, hackers can exploit weaknesses in the protocols that allow telecom carriers to exchange data between networks. That became clear earlier this year after 60 Minutes aired a segment on Signaling System 7, one such vulnerable protocol.

The good news: there are alternatives. Instead of using a two-factor process tied to your mobile device’s SMS, consider downloading and implementing a separate two-factor authentication app. These apps generate random numbers on your device—time-based one-time passwords—that are coupled with your online accounts. Examples include EMC-owned (EMC) RSA SecurID, or Google (GOOG) Authenticator.

For more security advice, watch:

Now I know what some of you are probably thinking: this level of security must just be for the paranoids. Well, maybe.

Security is a risk based decision. But if you would like to be proactive, go ahead and make the change where you’re able. In this humble reporter’s opinion, it’s worth staying ahead of the attack curve when possible. Because when the lions approach, you don’t want to be the straggler left sipping at the watering hole.

This isn’t just a theoretical weakness, after all. Black Lives Matter activist DeRay McKesson had his Twitter (TWTR) account taken over, apparently by a hacker who duped someone at Verizon (VZ) into authorizing a fraudulent SIM card. Political activists in Russia and Iran have had their Telegram accounts hijacked. Even Lorrie Cranor, chief technologist of the U.S. Federal Trade Commission, got scammed.

If you’re an online business, here’s the takeaway: offer your users a non-SMS two-step login method. Besides, you might be keeping privacy-conscious users—ones who don’t wish to part with their phone numbers—from protecting their accounts.

For the rest of the Internet’s denizens: if you haven’t set up two-factor authentication, do! Even in the absence of an app-based option, you still should. SMS-based two-factor authentication is better than nothing.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.