Last week, we posted an article on our research into companies with two-factor authentication (2FA) processes that are often bypassed using open SMS websites. Firstly, it’s important to know if people… [Continue Reading]
Author: John
Bypassing Two-factor Authentication with Disposable Phone Numbers
Recently, more and more platforms have been adopting two-factor authentication (2FA) to reduce fraud, with SMS two-factor authentication being the most common form. It’s a well know fact that fraud… [Continue Reading]
Improving User Verification Processes: Verification Hiccups and Smart Solutions
Verifying users’ phone numbers during on-boarding secures your user base, reduces fraud, and limits duplicate signups. Properly verifying users is therefore important and will impact your business in a variety… [Continue Reading]
Passwords Done Right: Getting The Protection You Need
Passwords: they can be a pain to remember. A password, like anything, is only as strong as its ability to remain secure. In this post, we will discuss best practices… [Continue Reading]