GUEST BLOG: In the wake of Yahoo’s CONFESSION it’s time for you learn about 2-factor authentication!

19 December 2016 Internet, IT & e-Discovery Blog Blog
Author(s): Peter Vogel

My Guest Blogger Eddie Block (CISSP, CIPM, CIPP/G, CISA, CEH) is a senior attorney in Gardere’s Litigation Group and member of the Cybersecurity and Privacy Legal Services Team who focuses on all aspects of information cyber security, including credentialing functions, firewall and IDS deployment and monitoring, and penetration testing, and related complex litigation.

Last week Yahoo announced that over 1 billion user accounts had been breached, exposing usernames and passwords. This account information has been available to attackers since 2013.

Passwords as a means for secure authentication are anything but secure. Analysis of passwords from network breaches shows that most people choose simple, easy to guess passwords. WordPress Engine has an in depth paper title “Unmasked: What 10 million passwords reveal about the people who choose them” which describes how people pick passwords and how that gives an attacker insight into cracking passwords.

Even worse is password reuse. The security community has been educating people for years to use long, complex passwords. People can’t remember long, complex passwords easily so they either write them down or memorize one and use it everywhere. Unfortunately, reusing passwords everywhere means that a breach of one website, like Yahoo, exposes the same password on all websites where it is used.

The passwords in the Yahoo breach were also associated with usernames and email addresses. Many people will use the same username or email address on multiple sites, allowing the attacker to exploit multiple accounts with the same credentials.

For more advanced protection people should use 2-factor authentication on any sites that support it.

2-factor authentication requires 2 types of information to let you in:

  • Something you know (like a password),
  • something you are (like a fingerprint), or
  • something you have (like your cell phone).

Google, PayPal, Amazon, and, yes, Yahoo allow the consumer to enable 2-factor authentication. It usually isn’t on by default, though, so the user has to affirmatively turn it on.

Amazon explains how 2-factor works, you can quickly enable 2-factor authentication with a video entitled “About Two-Step Verification.” After 2-factor is enabled, each time the user logs into Amazon they will be prompted for their password as normal, then receive a text message with a random 6 digit number they have to enter into their web browser. Thus they have used 2 factors: something they know (their password) and something they have (the ubiquitous cell phone).

2-factor authentication does add a step to logging into a website, but it also means that an attacker cannot login unless they know the password AND have access to the user’s text messages. For sites that store or handle financial, personal, or confidential data this additional step is well worth the extra minute or two to use the second factor. In cases like the Yahoo breach, this step implemented on sites other than Yahoo would prevent the attacker from using their stolen credentials.


This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.


Related Services


Foley Manufacturing Update
18 August 2022
Manufacturing Industry Advisor
Using Upfront IP Licensing to Reduce Future Supply Chain Disruptions
18 August 2022
Manufacturing Industry Advisor
Do you have adequate Ransomware Cyber Insurance Coverage?
18 August 2022
Internet, IT & e-Discovery Blog
Warning to All U.S. Taxpayers Who Use Cryptocurrency: “Crypto” Doesn’t Mean Your Currency is Secret — or Protected — from the IRS
17 August 2022
Legal News: Government Enforcement Defense & Investigations
Foley Sponsors Ernst & Young Entrepreneur of the Year® Program
1 December 2021 - 30 November 2022
Michigan and Northwest Ohio Region
Moss Adams 2022 Health Care Conference
3-4 November 2022
Las Vegas, NV
An Update on Remote Patient Monitoring Policy and Reimbursement
28 October 2022
Austin, TX
AI in Healthcare: EU-U.S. Legal Challenges and Guidance and Security Implications
26 October 2022
Las Vegas, NV