Thursday, September 17, 08:54
Home security Google Authenticator: Shouldn't users use it?

Google Authenticator: Shouldn't users use it?

Google Authenticator, released in 2010, is one of the most popular applications two-factor identity (2FA). Specifically, it is used by millions of users for authentication of links across various sites websites and services. However, it has some disadvantages that must be taken into account.2FA Google Authenticator Cons

Initially, it works on only a few platforms and specifically on Android, iOS and Blackberry. Another disadvantage is that users have to configure it separately on each device they use. This is not a major disadvantage for those who do not particularly use their smartphone, but for those who do smartphone has been "extended their hand", it can be a serious disadvantage because they have to have the device near them. Another disadvantage, which is quite important, is that every time a user switches their phone, they have to shut down the entire application and synchronize all accounts from scratch. This is very tiring, so switching off 2FA might be a good option. Another disadvantage of Google Authenticator is that there is no password or biometric lock in the application. And this ease of access to the app seems to allow for any malware steal 2FA codes directly from Google Authenticator. This is another reason why users should stop using this application.

So there is a need to find a new service out of the thousands available that performs better than Google Authenticator. The managers passwords 1Password and LastPass have built-in authentication applications, but there is also the application Authy. It is an application that is fast and easy to use and set up, runs on multiple devices and platforms, allows users to back up, and its site has a wealth of information on how to back up accounts using 2FA.password managers

Some users argue that the benefits of removal from Google Authenticator far outweigh the disadvantages. Therefore, if one uses Google Authenticator, one can take a taste of some of the alternatives offered and consider all the above information the next time a smartphone is to be changed.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

IoT devices are a big risk for companies

Teddy bears, coffee makers and cars are some of the Internet of Things (IoT) devices that are connected to corporate networks and could ...

Brexit: The border control information system will not be ready

The basic information system designed to prevent border chaos when Britain is finally separated from the European ...

Microsoft Project Reunion has just acquired a new tool

Microsoft has released Resource Technology (MRT), an open source project that supports the company's efforts behind Project Reunion ...
00:01:48

Interview with Turkdef Ops hackers: The attack on the .gr name registry

Interview with Turkdef Ops hackers: The attack on the .gr name register Global exclusivity on SecNews is the interview of the Turkish hacking team Turkdef Ops, ...

Instax Square SQ1: Fujifilm's new instant camera!

Fujifilm's new Instax Square SQ1 instant camera will make social distancing a lot of fun and interesting. The...

COVID-19: Half of American citizens would share their medical data

More than half of American citizens are estimated to be willing to share their medical records and records about ...

Dunkin Donuts will offer compensation for data leakage

Dunkin Donuts has agreed to refund customers who have been the victim of a data breach. Return is part of the arrangement ...

IOS 14 has been released, but you better not install it

Apple may feel that iOS 14 is ready for release, but the developers are terrified because they were not given ...

Texas Children's Hospital reported data theft

There seems to be no end to the list of companies that have fallen victim to the attack on Blackbaud. As he announced ...

Chrome is separate from Chrome OS! What does this mean for you?

It may sound strange, but for users of older Chromebooks, it can be a blessing. There is a distribution in the Chrome browser ...