Two Factor Authentication launched
Two Factor Authentication launched
They wouldn't just use your phone number alone. CIG is employing an app-based method that would require the attacker to have access to your device. It's enough for malware on your phone to take control remotely, which is more challenging than stealing your number if you're knowledgeable about security.