References
-
Barrett, B 2018, How to secure your accounts with better two-factor authentication, viewed 22 October 2019,
https://www.wired.com/story/two-factor-authentication-apps-authy-google-authenticator/ -
Brown, W 2018, How to prevent future incidents like the Voxox data breach, viewed 23 October 2019,
https://www.techradar.com/news/how-to-prevent-future-incidents-like-the-voxox-data-breach -
Colt, J 2018, Simplify and secure your online logins with a YubiKey, viewed 24 October 2019,viewed 23 October 2019,
https://www.wired.com/story/how-to-use-a-yubikey/ -
Gunson, N, Marshall, D, Morton, H & Jack, M 2011, ‘User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking’, Computers & Security,viewed 23 October 2019,
https://doi.org/10.1016/j.cose.2010.12.001 -
Kemshall, A 2011, ‘Why mobile two-factor authentication makes sense’, Network Security,
https://doi.org/10.1016/S1353-4858(11)70038-1 -
Lecher, C 2019, A hacking ring stole millions by hijacking SIM cards, feds say, viewed 23 October 2019,
https://www.theverge.com/2019/5/11/18564381/community-hacking-sim-hijacking-cryptocurrency -
O’Neill, P, 2019, Here's the best way to protect your accounts from hacker takeovers, viewed 21 October 2019,
https://www.gizmodo.com.au/2019/05/heres-the-best-way-to-protect-your-accounts-from-hacker-takeovers/ -
Webster, A, 2014, Neiman Marcus CEO apologizes for data breach, offers free credit monitoring, viewed 24 October 2019,
https://www.theverge.com/2014/1/16/5317378/neiman-marcus-ceo-apologizes-for-data-breach-offers-free-credit -
Zoir, S, 2018, Two-factor authentication vs. two-step verification – you’ve probably missed this tiny difference, viewed 21 October 2019,
https://www.techradar.com/au/news/two-factor-authentication-vs-two-step-verification-youve-probably-missed-this-tiny-difference