Is Your Mobile Carrier Your Weakest Link?
Credit to Author: BrianKrebs| Date: Mon, 28 Aug 2017 02:46:42 +0000
More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device after supplying a username and password. But with so many services relying on your mobile for that second factor, there has never been more riding on the security of your mobile account. Below are some tips to ensure your mobile device (or, more specifically, your mobile carrier) isn’t the weakest link in your security chain.
Read more