Two-Factor Authentication Vulnerabilities

14 Pages Posted: 26 Apr 2018

Date Written: April 8, 2018

Abstract

Corporative giants of the internet, such as Google, Facebook, Various Banks have been using the two-factor authentication technique to ensure security to its users. Although, this companies don’t make this kind operations by themselves, they hire third part companies to do so, integrating the API products for onwards delivery. Because of this, technique have serious breaches that can be explored by an ill-intentioned company. The third part companies stay between the client and the website being in a privileged place to attack any unsuspecting victim.

Keywords: ​internet, 2FA, data security, attacks, breaches

JEL Classification: L86, L63, L86

Suggested Citation

Certic, Stefan, Two-Factor Authentication Vulnerabilities (April 8, 2018). Available at SSRN: https://ssrn.com/abstract=3158601 or http://dx.doi.org/10.2139/ssrn.3158601

Stefan Certic (Contact Author)

University of Belgrade ( email )

Studentski trg 1
Belgrade, 11000
Serbia

Register to save articles to
your library

Register

Paper statistics

Downloads
52
Abstract Views
349
rank
379,439
PlumX Metrics