[ad_1]
The Instagram platform confirmed that it was updating the binary authentication feature without texting and did not require a user's phone number, using a more secure method. allowing users to authenticate the binary via Google Authenticator, Duo or Authy. You create your own security codes to log into your account and you can not create them on another phone when a SIM card penetration occurs on your phone, according to the TechCrunch report.
Hackers can steal your phone number by rebadigning it to a different SIM card, use it to reset your pbadwords, steal your account on Instagram and other accounts, and sell them for Bitquin .
Instagram accounts are rather weak because the application provides only binary authentication via SMS that provides a pbadword reset or access code.
The Instagram platform confirmed that it was updating the binary authentication feature after Jane Manchun Wong released an initial version of the updated binary authentication feature. Instagram in the Android version of the Android version and published yesterday on his Twitter account.
Topics related to what you are reading now:
An Instagram spokesperson confirmed, "We continue to improve the security of Instagram accounts, including by improving the function of the Instagram account. double authentication.
The Instagram app did not have the 2FA authentication feature to protect user accounts until 2016, even though it had 400 million users , and in 2016 the application began to offer the SMS based authentication function based on 2FA. There was hacking for some user accounts in November 2015.
Instagram now allows you to recover your account and sign in to new devices as long as you confirm your identity through a phone number badociated with your account. account. Access the phone number of the user and link to a new SIM card.
Hackers can do this with little information such as social security numbers that may have leaked through countless data breaches to fool a customer service agent to reset a phone number to a new one SIM card. If their purpose is to steal private images or digital coin wallets and many other reasons to try to penetrate the SIM card, according to the report of the motherboard.
As a result, hackers can extort the victim for financial gain, or they can use the phone number to reset pbadwords to accounts such as Amazon, Instagram, Twitter, and other important accounts.
New applications should be updated to avoid reliance on SMS in the coming period, especially after the SIM card is released, making phone service providers more demanding. More steps to protect their accounts
The news (Instagram is working on a new method of binary authentication to protect against the penetration of SIM cards) Offered by the website [Portail arabe des nouvelles techniques]
We are not responsible for his content. function (d) {var js, id = & # 39; facebook-jssdk & # 39 ;; if (d.getElementById (id)) {return;} js = d.createElement (& rd; sc ript & # 39;); js.id = id; js.async = true; js.src = "http://connect.facebook.net/ar_AR/all.js#appId=&xfbml=1";d.getElementsByTagName('head & # 39;) [0] .appendChild (js) ;} (document));
[ad_2]
Source link