Hacked: Hacking Finance

Australian Government Advises Citizens to Switch off Two-Factor Authentication

Introduction

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.


LATEST POSTS

ChronoPay Looks to Kickstart Bitcoin Adoption in Russia 29th May, 2017

Alleged FBI Hacker Lauri Love Ordered to US Extradition by UK Home Secretary 15th November, 2016

Cybersecurity

Australian Government Advises Citizens to Switch off Two-Factor Authentication

Posted on .
This article was posted on Wednesday, 23:34, UTC.

It’s a move that beggars belief. The Australian Government, via Twitter, is advising citizens to turn off their 2FA or two-factor authentication setting when they’re out of mobile range, a normal occurrence when travelling abroad. In a bizarre series of tweets, the Australian Government has advised citizens to disable two-factor authentication on their accounts on myGov, the Australian government’s main digital portal. myGov is a portal wherein Australian citizens can access and manage several services including tax payments, health insurance and more, as reported by ArsTechnica. The 2FA security measure in the portal is a system wherein users receive text…

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

To continue reading you need to be a Gold Member or Platinum Member. Let us help you become financially independent by signing up. You will get access to exclusive stories, analysis, and guides by experienced traders, economists, and entrepreneurs. Learn more about us here.

Log In Join Now for $39 a Month! OR Save $69 by Subscribing for a Year!

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

Receive New Posts on Email:



Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.

Navigation
What follows is a comprehensive, reverse-chronological list of network security…