About Lesson
Real-world example:
John’s Gmail password gets leaked in a data breach. But since he has 2FA, hackers also need the code sent to his phone—which they don’t have.
Common 2FA methods:
-
Text (SMS) codes
-
Authenticator apps (e.g., Google Authenticator, Authy)
-
Hardware tokens (e.g., YubiKey)
Best practice:
Avoid SMS-only 2FA if possible—SIM swapping is a real risk. Use authenticator apps instead.
Join the conversation