New Year, New You Sale ☀️- Up to 20% off 500+ books!

Hacking Multifactor Authentication

4.32 goodreads logo

Ratings/reviews counts are updated frequently.

Check link for latest rating.
( 19 ratings, 3 reviews)
Book Hero Magic crafted this summary to help describe this book. While it's new and still learning, it may not be perfect - your feedback is welcome! Summary
Hacking Multifactor Authentication by Roger A. Grimes delves into the vulnerabilities of multifactor authentication systems used today. The book explores various attack scenarios and provides insights into how these security measures can be compromised. It aims to inform and educate readers on potential threats while emphasising the need for continuous improvement in security practices.
Read More
Format: Paperback / softback
$7599
AVAILABLE WITH SUPPLIER Ships from our Auckland warehouse within 3-4 weeks

Found a better price? Request a price match

Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?

You might enjoy this book if you're interested in the intricacies of cybersecurity and want to explore the vulnerabilities in multifactor authentication systems. It's a compelling choice for tech enthusiasts eager to understand the potential weaknesses in digital security measures and learn how to safeguard their information.

Book Hero thinking about your next read

Hacking Multifactor Authentication

Book Hero Magic formatted this description to make it easier to read. While it's new and still learning, it may not be perfect - your feedback is welcome! Description

Protect your organisation from scandalously easy-to-hack MFA security “solutions”

Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked in at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allow MFA to be hacked and compromised.

This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defences) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengths and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book.

  • Learn how different types of multifactor authentication work behind the scenes
  • See how easy it is to hack MFA security solutions—no matter how secure they seem
  • Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate them

Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organisation needs to take to prevent losses from MFA hacking.

Book Hero Magic summarised reviews for this book. While it's new and still learning, it may not be perfect - your feedback is welcome! HOW HAS THIS BEEN REVIEWED?

Hacking Multifactor Authentication by Roger A. Grimes is generally well-received, with reviewers appreciating its detailed breakdown of the vulnerabilities and potential exploits within multifactor authentication systems. Experts commend the author's expertise and practical insights, highlighting how the book combines technical depth with real-world examples. Some readers find it valuable for its clear guidance on improving security practices and defending against diverse threats.

Book Hero reading reviews

Book Details

INFORMATION

ISBN: 9781119650799

Publisher: John Wiley & Sons Inc

Format: Paperback / softback

Date Published: 17 December 2020

Country: United States

Imprint: John Wiley & Sons Inc

Audience: Professional and scholarly

DIMENSIONS

Spine width: 31.0mm

Width: 188.0mm

Height: 231.0mm

Weight: 930g

Pages: 576

About the Author

ROGER A. GRIMES is a computer security professional and penetration tester with over three decades of experience. He's an internationally renowned consultant and was the IDG/InfoWorld/CSO magazine weekly columnist for fifteen years. He's a sought-after speaker who has given talks at major security industry events, including RSA, Black Hat, and TechMentor.

Also by Roger A. Grimes

View all

More from Computing & Technology

View all

Why buy from us?

Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!

Service & Delivery

Service & Delivery

Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.

Auckland Bookstore

Auckland Bookstore

We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.

Our Gifting Service

Our Gifting Service

Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.