All You Need to Know About Multi-factor Authentication

In our digital world, passwords are as much a part of our lives as Netflix and Amazon. Keeping information stored in dozens of accounts across the web can make it easier to stay on top of your finances, order a new pair of jeans or even schedule a dentist appointment. Unfortunately, though, passwords can be relatively easy for scammers to hack, opening the door for identity theft, credit card fraud and more. 

Here’s where multifactor authentication (MFA) comes into play. As a means of securing your information, MFA provides an extra layer of protection for your accounts and sensitive data. 

Here’s all you need to know about MFA, how it works and why it’s an important step in protecting your information. 

How multifactor authentication works

Multifactor authentication utilizes two or more factors to allow the user to sign into an account. Generally, these will consist of something the user knows, like a password or PIN, along with one or both of the following: 

  • Something the user has. This can include a phone, key fob or smartcard. 
  • Something the user is. This can include an iris or fingerprint scan, or voice or facial recognition.

Accounts that use MFA will not allow the user to sign into their account unless both factors are verified.

Why multifactor authentication is crucial for protecting sensitive information

While passwords can provide some protection against hackers, they’ve proven to be an abysmally weak barrier against hackers. A recent study by Digital Shadows, a digital risk protection company, found evidence of approximately 15 billion passwords and logins floating around the darkweb as a result of 100,000 data breaches. These passwords are up for sale to  other cybercriminals, potentially providing them with access to the victims’ financial accounts, credit card information, Social Security data and more.

In addition to opening up the door to sensitive information, a single password can give the hacker entry into a victim’s private life. For example, by hacking into a victim’s Google password, the cybercriminal now has access to their email history, which can include important correspondence and other information; calendar, which can provide a complete picture of the victim’s upcoming events and meetings; YouTube account, which unlocks the victim’s viewing history and uploads, and any other apps that allow users to sign in with a Google account, such as Asana and Mint.

Unfortunately, passwords can be cracked by amateur hackers, even without a data breach. Many consumers make it even easier for hackers to break into their accounts by using weak, ineffective passwords that are simple to guess, and by using the same password across multiple accounts. For these reasons, using MFA when available — especially for accounts that store highly sensitive information — is crucial for ongoing security and protection. This way, in the event of a data breach or hack providing a criminal with your password or login credentials, your information will still be protected. Without access to your account’s second factor for authentication, the hacker has no way to gain entry into your account. 

Where you may encounter MFA

In general, the more sensitive the data an account stores, the stronger security measures the company hosting or providing the account will use. Consequently, you’re most likely to encounter MFA on banking apps and accounts, money management apps, investment apps and the like. Depending on your line of work, you may also need to use MFA to sign into your personal workplace account. Finally, some retailers may offer clients the option of using MFA to sign into their accounts. 

Under each of these and similar circumstances, using MFA means a login time that’s a bit longer and more complicated than just inputting a password or PIN. However, measuring this inconvenience against the time, stress and money it will take to recover from a potential data breach makes it more than worth the extra few minutes. 

Stay safe!

Your Turn: Which means of MFA is your favorite? Tell us about it in the comments.

What’s Up With WhatsApp?

WhatsApp Logo on green backgroundA cybersecurity breach in Facebook’s WhatsApp app last month left users vulnerable to spyware attacks via voice calls. An undetermined number of the 1.5 billion users of the popular messaging app may have had malicious spyware installed on their devices.

Let’s take a closer look at the security breach and the steps you can take to protect yourself, both now and in the future.

What happened?
Security breaches are old news in the app world, but a breach of extremely high magnitude and reach is something new and fairly frightening. The fact that the breach hit WhatsApp is especially alarming. WhatsApp utilizes strong encryption for both voice and text messaging and is used as a communication platform for government and security officials around the world.

Here’s how it went down:
A government-grade intelligence collection tool was employed to target WhatsApp users via voice calls. The spyware has been endowed with the ability to seize control of the affected smartphones and to access any private information stored on the device.

The spyware utilized in the attack was allegedly created by the NSO Group, an Israeli cyber surveillance company that has developed this advanced technology for the express purpose of allowing government agencies to infiltrate terrorist groups and to fight crime. Unfortunately, when the spyware fell into the wrong hands, it helped scammers pull off one of the greatest cybersecurity breaches of all time.

The Financial Times reported that the WhatsApp breach was made possible because of a loophole in the app’s code that allowed hackers to transmit spyware onto smartphones by calling targets through the app. The malicious code could be injected into the device whether the user picked up the call or ignored it.

According to WhatsApp, the cyber breach was first discovered in early May and had been used to target an undisclosed number of WhatsApp users. The Facebook-owned messaging company claimed it briefed human rights organizations about the breach and also asked U.S. law enforcement agencies to assist it in conducting an investigation. When WhatsApp had more definite information, it notified the public about the breach.

Who was affected?
It doesn’t matter what kind of phone you have; the security vulnerability affects both iPhone and Android devices. The good news is that not every version of WhatsApp was affected. To check whether the version you have on your phone was part of those impacted by the breach, check out Facebook’s official advisory confirming the vulnerability, which outlines which versions were affected.

The messaging giant has not confirmed a specific number of targeted victims. Rather, it has only shared that a “select number of users were targeted through this vulnerability by an advanced cyber actor.”

What do I need to do now?
Since the vulnerability that caused the breach lies in the makeup of the app and not in an unsafe or negligent practice in the hands of a user, there is no way you could have prevented your device from being affected. However, now that the facts are on the table, you can take the recommended steps to keep your device safe from this vulnerability.

Since the breach was discovered, WhatsApp engineers have been working hard to close the app’s security vulnerability. The company has started installing a fix to servers and to private customers. It has also created an updated, safer version of the app that it has urged all users to employ on their devices as soon as possible.

Here’s a quick guide for updating your WhatsApp.

  • For iPhone users: Open the App Store, choose updates, select WhatsApp and then click Update.
  • For Android users: Open the Play Store, click the three lines in the upper left-hand corner, choose My Apps & Games, select WhatsApp and then hit Update.

If you haven’t yet updated your device, do it now. It only takes a few seconds of your time to make sure your WhatsApp is operating at its safest level.

You never know when those scammers are going to hit next. Practice safe measures by always using the latest version of any application or operating system, keeping yourself in the know about recent security breaches and never sharing sensitive information online.

Stay safe!

Your Turn:
How do you keep yourself safe from security breaches? Share your tips with us in the comments.

SOURCES:

https://www.iol.co.za/news/south-africa/gauteng/consumerwatch-what-you-should-know-about-whatsapp-breach-23607175

https://www.people.com/human-interest/whatsapp-security-breach-update-app/amp/

https://www.forbes.com/sites/zakdoffman/2019/05/14/whatsapps-cybersecurity-breach-phones-hit-with-israeli-spyware-over-voice-calls/amp/