Plugavel.
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us
No Result
View All Result
Plugavel.
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us
No Result
View All Result
Plugavel.
No Result
View All Result
ADVERTISEMENT

Why do I need to enable two-factor authentication?

2 de December de 2021
in Tech
Authentification à deux facteurs via l'envoi d'un code sur une application présente sur le smartphone. © bestforbest, Adobe Stock
ADVERTISEMENT

Whether it’s for accessing Facebook, Amazon, your bank account, your cryptocurrency wallet, two-factor authentication is vital! It’s good to enable it whenever possible and better yet, enable strong authentication if it’s available.

You will also be interested

If you regularly make purchases on the Internet, it is likely that your bank has activated the following system: before validating a payment, a code is sent by SMS on your phone mobile. You must enter this code online so that the payment can take place.

This system – thetwo-factor authentication or 2FA (2 Factors Authentification) is what has been found simpler to date to solve the insufficiency of the system of Passwords.

Password protection has lived

It all started with an observation: the password system has lived. It has too many weaknesses to offer absolute security.

  • First, a large number of users use expressions that hackers can easily “crack”. Every year, Splashdata publishes the list of the 25 most used passwords. We can hardly believe it but the reality is there, the number 1 of the lot is: “123456”. Number 2 is barely more complex: “123456789”. And # 3 is “QWERTY,” which is the first six letters of an American keyboard.
  • It is also common for users to use combinations that are easy to guess. Example: Claude Dubois, born January 24, 1984, will have the password: “CD240184”.
  • Even though the password would be more complex, hackers have developed a large number of techniques to get a user to reveal his password in spite of himself. One of these methods is the phishing, or a site which faithfully reproduces the interface of a site known as Amazon.
  • Another method is to place on thecomputer of a user a keylogger, that is, a program that records what it types on its keyboard.
  • It is common for databases to be hacked and for hackers to gain access to the passwords of a large number of users. In September 2018, Facebook was forced to reveal that a security breach had compromised 50 million accounts, including 200,000 in France.

The need for alternatives to passwords

To remedy the weaknesses of the password system, many systems have been devised.

  • If you have an iPhone, you know that Apple has opted for a biometric identification (the recognition of attributes physical) as the sesame of your device. First of all the digital entrepreneurs, more recently, facial identification.
  • From applications such as Dashlane, 1Password, KeePass ou LastPass create ultra-complex and different passwords for each site visited, and provide them on their own on each visit.
  • Protection systems involving a key USB were developed, such as Yubikey by Yubico. In the sector of cryptomonnaies, the French company Ledger offers a key of this type, which stores all access to wallets (wallets) and exchanges (market places).
  • Companies such as Google Where Microsoft are working, in partnership with companies such as Visa or Mastercard, on a universal alternative that would be used on the Web.

However, two-factor authentication is the simplest system. It was put in place by a large number of Web players, in particular banks and for good reason: the second European Directive on payment services, in force since January 13, 2018 – and aimed at strengthening the security of payments by line – advocates the use of this two-factor authentication by payment service providers.

On sites such as Facebook, Twitter, Amazon, it is up to the user to take the step of activating two-factor authentication – it is not offered by default. Be aware that sometimes this system is called “two-step verification”.

How does it work ?

Two-factor authentication (2FA) works like this. If an intruder tries to gain access to your wallet cryptomonnaies, to your Cloud, to your Twitter or Amazon account from an unusual device, a security code is sent in the form of an SMS or even to an e-mail address, sometimes also on an authenticator application. It is necessary to type in this code before you can proceed.

So even then, even if you would use a password little solid, it will be impossible for a hacker to enter your account or carry out financial transactions.

In addition, receiving a code requesting access to your Facebook or Amazon may alert you that someone has “cracked” your password, which alerts you to the need to change it immediately.

ADVERTISEMENT

Even more important is the need for 2FA if you are managing a cryptocurrency account. Many exchanges – this is particularly the case of Binance or Coinbase – require this authentication before authorizing a transfer of crypto-assets to an external address. In addition, on a site such as Binance, you can also protect access to your account by scanning a barcode from the corresponding mobile application.

Authentication applications

In order to protect their users against any risk of scams, a large number of cryptocurrency-related applications may require enhanced verification. For example, on Binance, it is possible to require a higher level authentication:

  • sending an SMS to a mobile phone;
  • validation via an authentication application that must be launched on his mobile such as Google Authenticator.

Result: it is necessary to type two codes to authorize a transaction. Whenever such an option is offered, it must be activated. It would be too bad to see a wallet emptied of its assets following an intrusion.

To choose, it is better to adopt a validation via an app like Google Authenticator than sending an SMS. An SMS message could be intercepted by a zealous hacker, while an authenticator app enjoys a higher level of security. However, the ideal is to activate both.

Also, sometimes the Google Authentication app will just ask you to hit the “Yes” key in response to a question such as: “Are you trying to sign in?” “. The validation is therefore fast, but efficient. In particular, Google may request this verification each time you connect to Gmail, Google Sheets, or other home app from an unusual device. In fact, Google considers this protection so important that since November 2021, this publisher has decided to impose it on two million account owners. YouTube and intends to extend it to various Google accounts.

We can only advise to take advantage of these various authentication systems. It doesn’t matter if you waste a little time providing these sesame seeds each time. The security of your accounts is at stake. Those who have had their Facebook hacked can easily testify to the nuisances that they thus suffered.

Interested in what you just read?

.

Tags: authenticationcryptocurrency scamcybersecurityenableInternetinternet social networkspasswordspiracysecuritytwofactor
ShareTweetPin

Related Posts

Une fonction liée à iOS 15 rend les plus iPhone plus vulnérables. © Apple
Tech

A dead iPhone can be hacked!

You will also be interested Phishing: what is it and how to prevent it? Phishing, or phishing in English, is...

21 de May de 2022
Réseau informatique © Gerd Altmann, Pixabay
Tech

CCNA2 training: get 89% off thanks to this good plan

Are you in professional retraining or want to progress in your career by taking the official Cisco CCNA 200-301 certification...

21 de May de 2022
Bénéficiez d'une réduction sur la formation à SketchUp © black_mts, Adobe Stock
Tech

SketchUp: get 89% off the full course

Amateurs, students or professionals in the fields of technical drawing and architecture, you want to train in 3D modeling with...

21 de May de 2022
Le métavers donne naissance à des mondes virtuels dans lesquels chacun peut s’immerger et vivre une vie parallèle. © garrykillian, Adobe Stock
Tech

Who invented the metaverse?

The metaverse was the result of long decades of reflection, whether by science fiction authors, engineers or even simple geeks....

21 de May de 2022
Next Post
Le secret des couchers de soleil de rêve d’Instagram avec Lightroom © Adobe

Tutorial: How to achieve a double exposure effect with Adobe Photoshop?

Le livre blanc aide les professionnels dans leur pratique, les guident dans leur prise de décision et les conseillent dans leurs usages au quotidien. © Canva Studio, Pexels

What is a white paper and what is it for?

Recommended

With all these police cars chasing them, the fugitive manages to get away!

24 de February de 2022
Bon plan : la télévision Samsung 55TU7022 © Cdiscount

Samsung 55TU7022 TV: a reduction of 224 € to be seized on this good plan Cdiscount

31 de March de 2022

Botched encryption exposes millions of Samsung smartphones

26 de February de 2022
Le mensonge est très difficile à détecter, mais une étude israélienne montre que les mouvements des muscles du visage peuvent trahir. © digitalskillet1, fotolia

A new, highly effective technology for detecting lies

19 de November de 2021
ADVERTISEMENT

Categories

  • Car
  • Carros
  • Tech
  • Tecnologia
ADVERTISEMENT
  • Home
  • Privacy policy
  • About us
  • Contact us
© 2021 Plugavel - News about technology and cars on one site Plugavel.
No Result
View All Result
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us