Facebook no longer requires phone numbers for multi-factor authentication

Facebook updated its multi-factor authentication options on Tuesday, no longer requiring a phone number to use the service to sign into the company’s platform. Product manager Scott Dickens laid out the changes in a Wednesday blog post saying that “third-party authentication apps like Google Authenticator and Duo Security” are now easier to use. Those apps offer more security than phone numbers, due to the fact that SMS messages tied to phone numbers can be hijacked. Facebook has also long offered security keys like Yubikey as a multi-factor authentication option. The option to remove phone numbers is significant for several reasons. First, SMS messages are considered an insecure authentication method by authorities including the National Institute of Standards and Technology. Facebook has also run into some issues regarding SMS in the past few months. A bug allowed for the platform to spam users with updates via SMS, which drove users to complain on Twitter about the […]

The post Facebook no longer requires phone numbers for multi-factor authentication appeared first on Cyberscoop.

Continue reading Facebook no longer requires phone numbers for multi-factor authentication

Security Boulevard’s 5 Most Read Stories for the Week, May 14-May 18

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some insight into Securing the Network—and Your Organizatio… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, May 14-May 18

Security Boulevard’s 5 Most Read Stories for the Week, May 7-May 11

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some insight into Securing the Network—and Your Organizatio… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, May 7-May 11

Security Boulevard’s 5 Most Read Stories for the Week, April 30-May 4

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some insight into Securing the Network—and Your Organizatio… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, April 30-May 4

What is SSH Key Management?

How IT admins manage their digital assets can have a tremendous impact on an organization’s security. Whether it is access credentials like passwords and SSH keys, or assets used to create work product, it’s critical that IT is able to effe… Continue reading What is SSH Key Management?

Security Boulevard’s 5 Most Read Stories for the Week, April 23-27

A new week, a new crop of security stories. Last week, sophisticated attackers, desktop security, healthcare data breaches and data security in GDPR made headlines, as well as Multi-Factor Authentication featured in the our latest cartoon series calle… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, April 23-27

Security Boulevard’s 5 Most Read Stories for the Week, April 16-20

A new week, a new crop of security stories. Last week, sophisticated attackers, desktop security, healthcare data breaches and data security in GDPR made headlines, as well as Multi-Factor Authentication featured in the our latest cartoon series calle… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, April 16-20

Security Boulevard’s 5 Most Read Stories for the Week, April 2-6

A new week, a new crop of security stories. Last week, sophisticated attackers, desktop security, healthcare data breaches and data security in GDPR made headlines, as well as Multi-Factor Authentication featured in the our latest cartoon series calle… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, April 2-6

The Role Of Mobile During Authentication

Nearly all the big player social networks now provide a multi-factor authentication option – either an SMS sent code or perhaps key derived one-time password, accessible via a mobile app.  Examples include Google’s Authenticator, Faceb… Continue reading The Role Of Mobile During Authentication