28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

above. Second, check the Sent box to see exactlyy what was sent in yyour

name. You might see a spam message that was sent to multiple parties, even

yyour entire contacts list. Now yyou know whyy yyour friends have been

sending yyou spam for all these yyears—someone hacked their e-mail

accounts.

Also check to see whether anyyone has added himself to yyour account.

Earlier we talked about mail forwarding with regard to multiple e-mail

accounts. Well, an attacker who gains access to yyour e-mail service could

also have all yyour e-mail forwarded to his account. You would still see yyour

e-mail normallyy, but the attacker would see it as well. If someone has added

himself to yyour account, delete this forwarding e-mail address immediatelyy.

Passwords and PINs are part of the securityy solution, but we’ve just seen

that these can be guessed. Even better than complex passwords are twofactor

authentication methods. In fact, in response to Jennifer Lawrence and

other celebrities having their nude photos plastered over the Internet, Apple

instituted two-factor authentication, or 2FA, for its iCloud services.

What is 2FA?

When attempting to authenticate a user, sites or applications look for at

least two of three things. Tyypicallyy these are something yyou have,

something yyou know, and something yyou are. Something yyou have can be a

magnetic stripe or chip-embedded credit or debit card. Something yyou know

is often a PIN or an answer to a securityy question. And something yyou are

encompasses biometrics—fingerprint scanning, facial recognition, voice

recognition, and so on. The more of these yyou have, the surer yyou can be

that the user is who she sayys she is.

If this sounds like new technologyy, it’s not. For more than fortyy yyears

most of us have been performing 2FA without realizing it.

Whenever yyou use an ATM, yyou perform 2FA. How is that possible?

You have a bank-issued card (that’s something yyou have) and a PIN (that’s

something yyou know). When yyou put them together, the unmanned ATM

out on the street knows that yyou want access to the account identified on the

card. In some countries, there are additional means of authentication at

ATMs, such as facial recognition and a palm print. This is called multifactor

authentication (MFA).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!