Should we be moving toward a hardware token for 2FA?

562 Views | 6 Replies | Last: 5 yr ago by KidDoc
saw em off
How long do you want to ignore this user?
Reading this article, makes me wonder if authenticator apps and sms are going to be a thing of the past. I knew sms was the least 2FA security. Anyone had experiences with yubikeys and the like?
kb2001
How long do you want to ignore this user?
AG
We have a yubikey for our AWS root accounts, it just sits in a safe onsite though, not really used. We're generally still using software for this. Not looking forward to having to get physical keyfobs again
TravelAg2004
How long do you want to ignore this user?
AG
If you read the article, it's really just a sophisticated man-in-the-middle attack.

https://blog.duszynski.eu/phishing-ng-bypassing-2fa-with-modlishka/

He's just setting up a proxy and passing all information back and forth, but capturing data. So it's not really bypassing 2FA in the way the article is implying.

And based on my very limited understanding of hardware 2FA such as yubikeys, not sure they would be safe from this unless they communicate on a completely different channel and not via the website.
mhayden
How long do you want to ignore this user?
I know very little on the topic but anything SMS based just seems ridiculously insecure.
Prince_Ahmed
How long do you want to ignore this user?
saw em off said:

Reading this article, makes me wonder if authenticator apps and sms are going to be a thing of the past. I knew sms was the least 2FA security. Anyone had experiences with yubikeys and the like?
Wow, and I thought hardware tokens were a thing of the past - are we going back to 2004?

My last vendor that required a hardware is phasing them out this year.
CapCity12thMan
How long do you want to ignore this user?
AG
we use Google authenticator and/or LastPass authenticator for our MFA
UmustBKidding
How long do you want to ignore this user?
Obviously haven't been bitten by sim swap, you are basically backwards sms is now likely one of the least secure
KidDoc
How long do you want to ignore this user?
AG
We(docs) have to use a hardware autheticator as well as retyping our password to send controlled substances electronically. DEA requirement.

Mine is a little blue plastic thing called "exostar"
No material on this site is intended to be a substitute for professional medical advice, diagnosis or treatment. See full Medical Disclaimer.
Refresh
Page 1 of 1
 
×
subscribe Verify your student status
See Subscription Benefits
Trial only available to users who have never subscribed or participated in a previous trial.