Researchers detail how Android apps can steal one-time 2FA codes from Google Authenticator by taking screenshots, a flaw that was first disclosed in 2014 (Catalin Cimpanu/ZDNet)

Researchers detail how Android apps can steal one-time 2FA codes from Google Authenticator by taking screenshots, a flaw that was first disclosed in 2014 (Catalin Cimpanu/ZDNet)

Researchers detail how Android apps can steal one-time 2FA codes from Google Authenticator by taking screenshots, a flaw that was first disclosed in 2014 (Catalin Cimpanu/ZDNet)

Researchers detail how Android apps can steal one-time 2FA codes from Google Authenticator by taking screenshots, a flaw that was first disclosed in 2014 (Catalin Cimpanu/ZDNet) https://ift.tt/2Q036VH

Catalin Cimpanu / ZDNet:
Researchers detail how Android apps can steal one-time 2FA codes from Google Authenticator by taking screenshots, a flaw that was first disclosed in 2014  —  Google Authenticator app lets other apps take screenshots of its code.  Issue was first reported to Google in October 2014, but it was never addressed.


Related Posts

0 Response to "Researchers detail how Android apps can steal one-time 2FA codes from Google Authenticator by taking screenshots, a flaw that was first disclosed in 2014 (Catalin Cimpanu/ZDNet)"

Post a Comment

THANK YOU

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel