Tom wants to know how Apple's 2 Factor Authentication works with Find My Phone. When he logs into iCloud to look for his phone, it'll send his 2 Factor Authenticator to his phone. But how can he find his phone that way? Leo says that Apple does 2 Factor different from everyone else. If he has another Apple device like an iMac or iPad, then he could do it. It'll send the code to all of his Apple devices. Not just the iPhone. He can also use trusted phone numbers and enroll a landline or his wife's phone that they will call and give him the number audibly.
2 factor authentication
Saren hasn't been receiving the two factor authentication code he normally gets for his Gmail account. He would normally get it through his Google Voice number. Leo says it's insecure to send those two factor codes through SMS, because someone could spoof his number and get the text message. Google may have even stopped supporting SMS in favor of its Google Authenticator app.
Carla's Google account has been hacked. She sees things in her Gmail account she doesn't recognize and her YouTube watch list has things on it she never watched. Leo says Google has a security checkup that she can use to see if she's being hacked and she can disconnect any device she doesn't recognize. Carla should also engage 2 Factor Authentication. Obviously, Carla is going to want to change her password as well.
Securing your online accounts is vitally important. The consequences of being hacked can be great — someone could lock you out of your email account. If that account is used for password recovery for your other accounts, then a hacker could get access to all of those as well. There are a few basic things that you should make sure you do to protect your email account:
1. Provide a secondary email address for recovery.
2. Provide a phone number for password recovery.
3. Turn on 2 Factor Authentication.
Clinton's Google account was hacked, and the password recovery was changed to another email address. Leo says that's why Google and Leo recommends 2 Factor Authentication so that he would be contacted should a password change happen. He can also use a secondary email. Clinton can contact Google and they can perhaps get his account back by answering questions that only he would know about.
He should keep in mind that if he used this as a recovery email for other sites, they are vulnerable as well. So he'll have to get it back ASAP before more damage is done.
Using Facebook on a public computer, or even on a friend's computer, can be risky. Facebook stores a cookie in the browser that enables the user to get into the site without actually logging in. This would make it possible for someone else to easily gain access to your account. Instead of avoiding Facebook entirely, there is a way you can still use it and prevent someone else from being able to get in — by using a one-time password.
Buzz is having a problem with 2 factor authentication on Apple's Mail app. He is able to input his password, but it won't take it. Leo says that Apple should create an authenticator program that can be used to verify user identity that can then be texted to him. That way, he's protected. If he's having trouble with it, Apple is really the only one that can solve the issue. It may be that his password has been changed and he forgot.
Dan has 2 factor authentication, and he keeps getting a notification that someone is trying to log in using his Apple ID and he gets knocked off his sign in. Can he change his login ID to eliminate it or will he lose all his purchases? Jason says that he's had that issue and it's very annoying.
Henry is annoyed with Apple and its latest MacBook Pro. He's not a fan of the touch bar. He's also annoyed that Apple hasn't updated the MacBook Air. Leo says it's because the MacBook Air is too thin for a Retina display. But in reality, the MacBooks are nearly as thin now.
Using basic social engineering skills, hackers have managed to use the data on cell phone bills to get customer service reps to move service to a set up mobile phone, and then use that to get into CoinBase through 2 Factor Authentication. As such, one hacker stole 8,000 BitCoin from a user named Cody. Read the full article here.