Hacker Kevin Mitnick demonstrates a phishing attack designed to abuse multi-factor authentication and take over targets' accounts.
Businesses and consumers around the world are encouraged to adopt two-factor authentication as a means of strengthening login security. But 2FA isn't ironclad: attackers are finding ways to circumvent the common best practice. In this case, they use social engineering.
While smartphones are the epitome of modern convenience, these devices which store our personal and professional information like emails, photos, bank details etc. can easily fall prey to hackers and to other malicious activities. With the recent series of data breaches across businesses globally, the concern regarding protecting user data has become more relevant than before. There are many applications in your smartphones that access your private data by taking permissions through pop-ups or otherwise. You would notice apps like third-party applications, flashlights, etc. asking permissions to access your gallery, messages, calls, which they don’t need. Allowing these third-party applications access to your smartphone's data puts your information at risk. Hardip Singh, Executive Director, Optiemus Infracom, feels that the dirty little secret that these ubiquitous devices, which we have with us 24X7, and keep switched on for most of the time, is also a serious threat to our privacy. An innocent looking message could be all that is needed to compromise on your privacy — accessing your microphone, your call logs, your locations, your bank details and everything that is very personal to you. Here’s why:
WATCH: Here’s how to protect yourself against ransomware attacks
With just one wrong click, your entire digital life can be put up for ransom. One of the most famous hackers in the United States, and author of the book "The Art of Invisibility," explains how you can protect yourself against becoming the victim of malicious ransomware attacks.