Modern Australian
Men's Weekly

.

Receiving a login code via SMS and email isn't secure. Here's what to use instead

  • Written by Mike Johnstone, Security Researcher, Associate Professor in Resilient Systems, Edith Cowan University
Receiving a login code via SMS and email isn't secure. Here's what to use instead

When it comes to personal cybersecurity, you might think you’re doing alright. Maybe you’ve got multi-factor authentication setup on your phone so that you have to enter a code sent to you by SMS before you can login to your email or bank account from a new device.

What you might not realise is that new scams have made authentication using a code sent by SMS messages, emails or voice calls less secure than they used to be.

Multi-factor authentication is listed in the Australian Cyber Security Centre’s Essential Eight Maturity Model as a recommended security measure for businesses to reduce their risk of cyber attack.

Last month, in an updated list, authentication via SMS messages, emails or voice calls was downgraded, indicating they’re no longer considered optimal for security.

Here’s what you should do instead.

What is multi-factor authentication?

Whenever we login to an app or device, we are usually asked for some form of identity check. This is often something we know (like a password), but it can also be something we have (like a security key or an access card) or something we are (like a fingerprint).

The last of these is often preferred because, while you can forget a password or a card, your biometric signature is always with you.

Multi-factor authentication is when more than one identity check is conducted via different channels. For instance, it’s common these days to enter your password, and an extra authentication code you need to enter is sent to your phone via SMS message, email or voice mail.

Lots of services, such as banks, already offer this feature. You’re sent a “one-time” code to your phone in order to confirm authority to enact a transaction.

This is good because:

  • it uses two separate channels
  • the code is randomly generated, so it can’t be guessed
  • the code has a limited lifetime

How could this go wrong?

Suppose a cybercriminal has stolen your phone, but you have it locked via fingerprint. If the criminal wants to compromise your bank account and attempts to login, your bank sends an authentication code to your phone.

Depending on how your phone settings are configured, the code could pop-up on your phone screen, even when it’s still locked. The criminal could then input the code and access your bank account. Note that “do not disturb” settings on your phone won’t help as the message still appears, albeit quietly. In order to avoid this problem, you need to disable message previews entirely in your phone’s settings.

A more elaborate hack involves “SIM swapping”. If a criminal has some of your identity details, they might be able to convince your phone provider that they are you and request a new SIM attached to your phone number to be sent to them. That way, anytime an authentication code is sent from one of your accounts, it will go to the hacker instead of you.

This happened to a technology journalist in the US a couple of years ago, who described the experience:

At about 9pm on Tuesday, August 22 a hacker swapped his or her own SIM card with mine, presumably by calling T-Mobile. This, in turn, shut off network services to my phone and, moments later, allowed the hacker to change most of my Gmail passwords, my Facebook password, and text on my behalf. All of the two-factor notifications went, by default, to my phone number so I received none of them and in about two minutes I was locked out of my digital life.

Then there is the question of whether you want to provide your phone number to the service you are using. Facebook has come under fire in recent days for requiring users to provide their phone number to secure their accounts, but then allowing others to search for their profile via their phone number. They have also reportedly used phone numbers to target users with ads.

This is not to say that splitting identity checks is a bad thing, it’s just that sending part of an identity check via a less-secure channel promotes a false sense of security that could be worse than using no security at all.

Multi-factor authentication is important – as long as you do it via the right channels.

Which authentication combinations are best?

Let’s consider some combinations of multi-factor authentication that have varying degrees of ease of use and security.

An obvious first choice is something you know and something you have, say a password and a physical access card. A cybercriminal has to obtain both to impersonate you. Not impossible, but difficult.

Another combination is a password and a voiceprint. A voiceprint recognition system records you speaking a particular passphrase and then matches your voice when you need to authenticate your identity. This is attractive because you can’t leave your voice at home or in the car.

But could your voice be forged? With the aid of digital software, it might be possible to take an existing recording of your voice, unpack and re-sequence it to produce the required phrase. This is somewhat challenging, but not impossible.

A third combination is a card and a voiceprint. This choice removes the need to remember a password, which could be stolen, and as long as you keep the physical token (the card or key) safe, it is very hard for someone else to impersonate you.

There are no perfect solutions yet and using the most secure version of authentication depends on it being offered by the service you are using, such as your bank.

Cyber security is about managing risk, so which combination of multi-factor authentication suits your needs depends on the balance you accept between usability and security.

Authors: Mike Johnstone, Security Researcher, Associate Professor in Resilient Systems, Edith Cowan University

Read more http://theconversation.com/receiving-a-login-code-via-sms-and-email-isnt-secure-heres-what-to-use-instead-112767

Best Ways to Trade In Your Old Tech for Cash in Australia

Upgrading your mobile is exciting, but many Australians are left wondering what to do with the device they no longer use. Instead of leaving it in a...

Why Doctors in Bundoora Play an Important Role in Community Health

Access to quality healthcare is essential for maintaining a healthy lifestyle and managing medical conditions effectively. Visiting experienced doctor...

Backyard Aesthetics Decoded: Mediterranean, Coastal, Retro, Rustic, and Beyond

Backyard design has come a long way from a patch of lawn, a barbecue in the corner, and a few chairs chosen purely for practicality. Today, outdoor ...

What Stops a Home From Feeling Flat-Pack Generic

There is nothing wrong with convenience. Flat-pack furniture, fast styling decisions, and online checkouts have made it easier than ever to furnish ...

5 Best Dental Clinics in Beecroft, NSW

The best dental clinics in Beecroft, NSW are Beecroft Smiles Dental Surgery, Beecroft Elegant Dental Clinic, McConnell Dental, Dentistry for Life, a...

Executive Recruitment: Finding Leadership Talent That Drives Organisational Success

Hiring the right leadership team can significantly influence the direction and performance of any organisation. Strong executives bring strategic thin...

Understanding the Importance of Abrasive Blasting in Industrial Surface Preparation

Surface preparation is an essential step in many industrial processes. Whether preparing metal structures, removing old coatings, or cleaning equipmen...

Farm Machinery Costs Set to Rise

With steep rises in fuel prices and the need for specialised maintenance, farm machinery costs are set to rise across Australia. The need for transpor...

Why an Employer Recruitment Agency Helps Businesses Build Stronger Teams

Finding the right employees is one of the most important responsibilities for any organisation. Businesses rely on skilled professionals who can con...

Why Quality Trailers Are Essential for Transport and Trade Businesses

Transportation plays a major role in industries ranging from construction and landscaping to logistics and agriculture. Businesses that frequently m...

Why Professional Car Removal Services Are The Best Way To Dispose Of Unwanted Vehicles

When a vehicle reaches the end of its useful life, owners often face the challenge of deciding how to remove it safely and responsibly. Old vehicles...

Why Professional Commercial Carpet Cleaning Matters for Modern Workspaces

Clean office environments influence how employees work, how clients perceive a business, and how long workplace interiors last. Carpets in commercia...

Why Hiring Removalists Makes Moving Easier And More Efficient

Relocating to a new home or office can be an exciting yet demanding experience. Packing belongings, organising transport, and ensuring that items ar...

The Importance of Hiring Local Lawyers in Melbourne for Business Protection

When it comes to protecting a business, the legal support you choose matters just as much as the decisions you make day to day. Working with lawyers...

Why Packaging Boxes Are Important for Product Protection and Logistics

Packaging plays a crucial role in modern commerce, ensuring that products are transported safely from manufacturers to consumers. One of the most wide...

Best Practices for Promoting Crypto Payment Options to Your Customers

Promoting crypto payment options is no longer a futuristic concept but a present-day strategy for venues aiming to reduce transaction costs, attract a...

What Is Allocated vs Unallocated Gold?

Gold has been a trusted store of value for thousands of years, prized for its rarity, durability, and universal recognition. Even in the modern financ...

Physiotherapy Strategies for Improving Independence in Daily Living

For many individuals living with permanent and significant disabilities, the concept of "independence" is not about a total absence of support, but ra...