Within the enterprise realm, two-factor authentication has become more than just an option — it’s now an indispensable asset. By implementing an additional authentication wall, a company takes a vital proactive step toward making the business infrastructure safe from a malicious intrusion. However, there is an important distinction to be made between the two types of authentication tokens organizations use, as illustrated by an Entrust informational graphic:June 26, 2014 in Authentication
Steam, a popular gaming community, is being targeted with a highly sophisticated phishing attack. But it's the way the hackers are bypassing two-factor authentication that is really concerning. A new story from Netcraft explains the multilayered attack in detail.