Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.
How a hacker circumvents two-factor authentication:
- First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile.
- Or sends a preliminary phishing e-mail tricking the recipient into revealing login credentials for an account, such as a bank account.
- The next phase is to send out