DATA DOCTORS

How do USB security keys work and should I get one?

Dec 8, 2018, 5:56 AM

(Pexels photo)...

(Pexels photo)

(Pexels photo)

Q: How do USB security keys work and should I get one?

A: Your online assets have long been one of the major targets of hackers and generally speaking, the only thing keeping them out of your accounts is your passwords.

Weak passwords are no match for today’s hacking technology as high-speed cracking systems can crack any 8-character password in just over 1 minute.

Even if you create a long complex password, they can be compromised through data breaches at any of the companies you do business with online.

The black market for ‘known passwords’ is thriving because hackers know that people tend to use the same passwords across so many of their online accounts.

2-Factor Authentication

Since a password alone provides very little security these days, the addition of a second form of authentication became popular years ago as smartphones became ubiquitous.

It’s akin to the 2-factors necessary when using your debit card at an ATM; you need the physical card AND the associated PIN.

Activating 2-factor authentication on all your online accounts means that whenever an online service detects that your username and password are used from a location or device that’s never been seen before, a special code is sent to the registered phone number that is required to access the account (the second form of authentication).

This means that a cyber-thief needs to steal both your password and your smartphone in order to gain access.

SIM Hijacking

The popularity of using 2-factor authentication with smartphones has led to various exploits to usurp this extra layer of protection including SIM swapping or SIM hijacking.

By taking over control of your phone number, hackers can have the special code sent to a phone that they have in their possession.

Pretexting

They’ve also become very good at fooling victims by calling them posing as an organization that claims to have detected a break in that wants to verify that the victim is the actual owner of the account.

They’ll tell the victim that they will be getting a special code on their smartphone that they need them to read back to ‘verify’ that they are the authentic owner.  Of course, reading back the code allows the remote hacker into the account because they are at the screen that is asking for the code on their computer.

USB Security Keys

Since the bad guys have found easy ways to side step the security that smartphone based 2-factor authentication offers, another form of higher level of security has surfaced in the form of the USB key.

Instead of using a smartphone as the 2nd form of authentication, you would use a special USB key on your computer, smartphone or tablet that costs $20 to $50.

Once you set them up, a USB security key connected to your device is required in order to gain access to the protected accounts.  There are backup methods to allow you in, should you lose your USB key, so be sure to set one up if you plan on using them.

To get more of an understanding of your options, checkout the various models from YubiKey or Google’s offering called Titan.

Data Doctors

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

5 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

12 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

19 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

26 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

1 month ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

Sponsored Articles

...

DESERT INSTITUTE FOR SPINE CARE

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

...

Day & Night Air Conditioning, Heating and Plumbing

Day & Night is looking for the oldest AC in the Valley

Does your air conditioner make weird noises or a burning smell when it starts? If so, you may be due for an AC unit replacement.

...

Fiesta Bowl Foundation

The 51st annual Vrbo Fiesta Bowl Parade is excitingly upon us

The 51st annual Vrbo Fiesta Bowl Parade presented by Lerner & Rowe is upon us! The attraction honors Arizona and the history of the game.

How do USB security keys work and should I get one?