wireless carriers

  • Plug The Security Holes In Your Two-Factor Authentication

    Plug The Security Holes In Your Two-Factor Authentication

    On Tuesday, Techcrunch writer John Biggs had his phone number stolen by a hacker who gained control of Biggs’ T-Mobile SIM card, granting him access to Biggs’ phone number used to verify his identity. Biggs correctly employed SMS-based two-factor authentication on his accounts, but forgot to add extra security layers to his wireless carrier account.…