Tag: 2FA

Highlights from DEFCON 26 – CF047

This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms -- and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for… Click for more / Podcast Player>