Safety Tales: Personal Safety Taken to the Test - 5
Vladimir Bezmaly | 03/19/2018
Two weeks had passed since the mobile data collection point on Mr. Green's company employees had been set up . The diner was already operating normally, and Peter had come up with a new attack on the employees, and in particular on Green himself.
In a couple of days, together with Jason, they listened to Green's home Wi-Fi point and made sure that it was reliably protected. But no one was going to hack it. It was only necessary to get its ID. After that, a fake access point with the same ID as the home one, but without a password, was deployed on the territory of Mr. Green's company. Green's smartphone found a familiar point and latched onto it. As a result, Peter got Green's password to the social network and home and work email.
- Robert, here are your passwords. Here is your italy mobile database password, here is your work password, here is your social network password.
- Of course! There are two ways. And the first is to use two-step authentication wherever possible.
- Is it when you present a password, and you receive an SMS with a code? And the second step is entering the code?
- Yes! It's much more secure than just a password.
- I know. But sometimes, as far as I understand, the SMS arrives late, and that's inconvenient, right?
— Of course! But there are two more ways to do this. The first is to install a one-time password generator on your smartphone, and the second is to print out about ten codes from the site in advance, and then print out the next 10.
— However, there is another way. When you log into your mail site, you indicate that you are working in an untrusted environment. For example, on someone else's PC. In this case, you can enter only the second part of the password. Without the first at all. And since it changes every 30 seconds, let them intercept this information. This is called OTP (One Time Password).
- Guys, is there anything I can hide from you?
-
- Posts: 560
- Joined: Mon Dec 23, 2024 3:16 am