MFA incorporates knowledge, possession, and inherence to layer protection around a username and password.
But possession proof, in the form of codes, one-time passwords, sms, push, and magic links increase the attack surface and, perhaps worse, raise the illusion of authentication security.
In episode 5 of Beyond Identity CTO Jasson Casey's Zero Trust Authentication Master Class, well investigate a common Man-in-the-Middle attack framework – no ordinary “catphish” if you follow the logic.
This is Multi-Factor Authentication and Phishing Explained.
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-inc
Website:
beyondidentity.com