2FA Chatbots vs. SMS Authentication
Oct22

2FA Chatbots vs. SMS Authentication

In this article, we’ll explain what is a bot for two-factor authentication and how 2FA chatbots (two-factor authentication with messaging service chatbots) work. We’ll look at the pros and cons of this one-time password delivery method and figure out which is best: 2FA bots or SMS authentication. Table of contents: How did the Protectimus Bot token come to be? How does two-factor authentication with chatbots work? 2FA...

Read More
2FA Security Flaws You Should Know About
Sep16

2FA Security Flaws You Should Know About

Hackers are not lazy, they evolve fast, so relying on old security measures is a terrible idea. Today we will look into how secure two-factor authentication is in general, what methods are used to hack 2FA and up-to-date ways to protect yourself against those account hacks. Finally, you will get answers to the most recurrent questions on 2FA security. How secure is two-factor authentication? Is two-factor authentication safe? All...

Read More
How to Protect Yourself From Email Hacking
Aug30

How to Protect Yourself From Email Hacking

We have almost stopped writing paper letters, those on crispy brand-new sheets. The lion’s share of the correspondence is now sent via emails. And often it is not even personal correspondence. For personal purposes, we have different messengers and can have an interactive dialogue. Usually, emails are used for sending business letters, which contain sensitive information. Thus, the email data protection is extremely important...

Read More
SMS Authentication: All Pros and Cons Explained
Jul18

SMS Authentication: All Pros and Cons Explained

It’s delightful to see that more and more websites, apps and services employ MFA and even make this type of log-in protection a mandatory feature. What makes us a bit concerned, is that a huge portion of those websites still opt for SMS 2fa. Despite the facts that SMS verification has too many limitations and has been proven to be a lot less secure as any other two-factor authentication method. In fact, NIST (the National Institute of...

Read More
Time Drift in TOTP Hardware Tokens Explained and Solved
Jun03

Time Drift in TOTP Hardware Tokens Explained and Solved

Multi-factor authentication by a Time based One Time Password (TOTP) generated with a physical device is, without any doubt, the staunchest approach to safeguarding sensitive data and securing access to your invaluable accounts. But being physical objects and having no internet connection gives physical TOTP tokens both their main strength and their major drawback. Without any connection to the net, the tokens’ internal clocks...

Read More