{"id":8077,"date":"2024-06-10T17:18:44","date_gmt":"2024-06-10T10:18:44","guid":{"rendered":"https:\/\/diringkas.com\/?p=8077"},"modified":"2024-06-10T17:18:45","modified_gmt":"2024-06-10T10:18:45","slug":"tips-menghindari-metode-phishing-yang-dapat-menembus-pertahanan-keamanan-2fa","status":"publish","type":"post","link":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/","title":{"rendered":"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses"},"content":{"rendered":"<p>In today&#39;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is phishing, where attackers try to obtain personal information such as usernames and passwords via emails or messages impersonating official institutions. Even with Two-Factor Authentication (2FA), this phishing method can still penetrate security defenses.<\/p><h2 class=\"wp-block-heading\"> What is Phishing<\/h2><p> Phishing is an attempt to obtain information about someone&#39;s data using phishing techniques. The data targeted by phishing is personal data (name, age, address), account data (username and password), and financial data (credit card information, account). The official term phishing comes from the word \u201cfishing,\u201d which refers to fishing. Phishing activities aim to lure people into providing personal information voluntarily without realizing it. In fact, the information shared will be used for criminal purposes.<\/p><p> Phishing perpetrators usually present themselves as authorized parties or institutions. By using fake websites or emails that look convincing, many people are successfully fooled.<\/p><h3 class=\"wp-block-heading\"> Phishing Methods Used To Penetrate 2FA Security Defenses<\/h3><p> 2FA phishing is a cyber fraud technique that aims to steal a person&#39;s two-factor authentication (2FA) information. Typically, attackers will try to imitate the official login page of an online service and bait victims into entering their personal information, including passwords and 2FA codes that are usually sent via SMS or an authenticator app.<\/p><p> After obtaining this information, the attacker can access the victim&#39;s account under a legitimate guise. This method is very dangerous because 2FA is designed to add an additional layer of security to the authentication process, and if 2FA information is stolen, the security of the account could be compromised. Therefore, it is very important to always be alert to any form of suspicious communication and never share 2FA codes with anyone.<\/p><p> Phishing methods that can bypass two-factor authentication (2FA) security defenses are increasingly sophisticated and dangerous. Here are some explanations regarding this method:<\/p><h4 class=\"wp-block-heading\"> Phishing Via Email and Websites <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-2-1024x576.jpg\" alt=\"\" class=\"wp-image-8080 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-2-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-2-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-2-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-2.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Phishing via email and websites is one of the most common tactics in 2FA attacks. Attackers send fake emails or create fake websites that imitate legitimate services. They try to obtain user login credentials through fake links or forms.<\/p><h4 class=\"wp-block-heading\"> Social Engineering Techniques in 2FA Attacks <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-3-1024x576.jpg\" alt=\"\" class=\"wp-image-8081 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-3-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-3-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-3-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-3.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Social engineering plays an important role in 2FA attacks. Attackers use social engineering to obtain sensitive information from victims, including 2FA codes.<\/p><h4 class=\"wp-block-heading\"> Smishing (SMS Phishing) <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-4-1024x576.jpg\" alt=\"\" class=\"wp-image-8082 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-4-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-4-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-4-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-4.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Smishing uses text messages (SMS) to deceive recipients. Attackers send fake messages claiming to be from financial institutions or other services, asking victims to share 2FA codes.<\/p><h4 class=\"wp-block-heading\"> Credential Theft <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-5-1024x576.jpg\" alt=\"\" class=\"wp-image-8083 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-5-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-5-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-5-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-5.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Attackers steal login credentials through techniques such as keyloggers or exploiting leaked data.<\/p><h3 class=\"wp-block-heading\"> Tips to Avoid This Phishing Method <\/h3><ol class=\"wp-block-list\"><\/ol><p> Here are some tips for avoiding phishing methods that can bypass 2FA security defenses.<\/p><h4 class=\"wp-block-heading\"> Avoid Opening Links from Suspicious Emails <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-6-1024x576.jpg\" alt=\"\" class=\"wp-image-8084 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-6-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-6-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-6-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-6.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Don&#39;t open links you receive via suspicious emails. If you need to log in to your account, type the address manually or use a bookmark. Make sure the website address is correct and there are no writing errors before entering the credentials.<\/p><h4 class=\"wp-block-heading\"> Check Website Information <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-7-1024x576.jpg\" alt=\"\" class=\"wp-image-8085 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-7-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-7-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-7-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-7.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Use the <a href=\"https:\/\/who.is\/\">Who.is<\/a> service to check websites. If the site has just been registered, it is most likely a fake site.<\/p><h4 class=\"wp-block-heading\"> Be Wary of Phone Calls Asking for an OTP Code <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-8-1024x576.jpg\" alt=\"\" class=\"wp-image-8086 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-8-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-8-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-8-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-8.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Never provide an OTP code over the phone, even if the caller&#39;s voice sounds convincing. Banks and other companies will not use this method to verify a client&#39;s identity.<\/p><h4 class=\"wp-block-heading\"> Invest in Cybersecurity Training <\/h4><figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-src=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-9-1024x576.jpg\" alt=\"\" class=\"wp-image-8087 lazyload\" data-srcset=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-9-1024x576.jpg 1024w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-9-300x169.jpg 300w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-9-768x432.jpg 768w, https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-9.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/figure><p> Take cybersecurity training to stay up to date with the latest information. Choose the appropriate training format, be it an online course or live training by experts. <\/p><ol class=\"wp-block-list\"><\/ol><p> By following the tips above, you can increase the security of your personal information and reduce the risk of becoming a victim of phishing. Remember, cybersecurity is a shared responsibility, and every precaution you take can make a big difference. Staying alert and informed is key to protecting yourself online.<\/p>","protected":false},"excerpt":{"rendered":"<p>In today&#39;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is<\/p>\n","protected":false},"author":10,"featured_media":8078,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9],"tags":[],"class_list":["post-8077","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","category-tutorial","resize-featured-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses<\/title>\n<meta name=\"description\" content=\"In today&#039;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is phishing, where attackers try to obtain personal information such as usernames and passwords via emails or messages impersonating official institutions. Even with Two-Factor Authentication (2FA), this phishing method can still penetrate security defenses. What is&hellip;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/In%20today&#39;s%20digital%20era,%20cyber%20security%20is%20a%20major%20concern%20for%20many%20internet%20users.%20One%20frequent%20method%20of%20cybercrime%20is%20phishing,%20where%20attackers%20try%20to%20obtain%20personal%20information%20such%20as%20usernames%20and%20passwords%20via%20emails%20or%20messages%20impersonating%20official%20institutions.%20Even%20with%20Two-Factor%20Authentication%20(2FA),%20this%20phishing%20method%20can%20still%20penetrate%20security%20defenses.%20What%20is&hellip;\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is phishing, where attackers try to obtain personal information such as usernames and passwords via emails or messages impersonating official institutions. Even with Two-Factor Authentication (2FA), this phishing method can still penetrate security defenses. What is&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/\" \/>\n<meta property=\"og:site_name\" content=\"RingRing-Diringkas\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-10T10:18:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-10T10:18:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"loyalty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"loyalty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/\"},\"author\":{\"name\":\"loyalty\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/#\\\/schema\\\/person\\\/96e61357e2a447f165e415b1542b407c\"},\"headline\":\"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses\",\"datePublished\":\"2024-06-10T10:18:44+00:00\",\"dateModified\":\"2024-06-10T10:18:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/\"},\"wordCount\":617,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/#\\\/schema\\\/person\\\/8f62bda68ac9483eece5601234115798\"},\"image\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/phising2fa-1.jpg\",\"articleSection\":[\"Technology\",\"Tutorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/\",\"url\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/\",\"name\":\"Tips Menghindari Metode Phishing yang Dapat Menembus Pertahanan Keamanan 2FA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/phising2fa-1.jpg\",\"datePublished\":\"2024-06-10T10:18:44+00:00\",\"dateModified\":\"2024-06-10T10:18:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/phising2fa-1.jpg\",\"contentUrl\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/phising2fa-1.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Tips Menghindari Metode Phishing yang Dapat Menembus Pertahanan Keamanan 2FA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/diringkas.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/diringkas.com\\\/en\\\/\",\"name\":\"RingRing-Diringkas\",\"description\":\"Kami meringkas apapun yang Anda cari!\",\"publisher\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/#\\\/schema\\\/person\\\/8f62bda68ac9483eece5601234115798\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/diringkas.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/diringkas.com\\\/en\\\/#\\\/schema\\\/person\\\/8f62bda68ac9483eece5601234115798\",\"name\":\"Vrory\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sho-byutipul.jpg\",\"url\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sho-byutipul.jpg\",\"contentUrl\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sho-byutipul.jpg\",\"width\":736,\"height\":1104,\"caption\":\"Vrory\"},\"logo\":{\"@id\":\"https:\\\/\\\/diringkas.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/sho-byutipul.jpg\"},\"description\":\"Writer and proudly owner of Diringkas.com! I like to Staying up-to-date with the latest tech advancements, playing video games, discovering new games, and writing about them.\",\"sameAs\":[\"https:\\\/\\\/diringkas.com\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/diringkas.com\\\/#\\\/schema\\\/person\\\/96e61357e2a447f165e415b1542b407c\",\"name\":\"loyalty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5cd001f955cc99e68d7f79aabc3baa47928a685b82578846377d4a5230db344a?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5cd001f955cc99e68d7f79aabc3baa47928a685b82578846377d4a5230db344a?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5cd001f955cc99e68d7f79aabc3baa47928a685b82578846377d4a5230db344a?s=96&d=wavatar&r=g\",\"caption\":\"loyalty\"},\"url\":\"https:\\\/\\\/diringkas.com\\\/en\\\/author\\\/loyalty\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses","description":"In today&#39;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is phishing, where attackers try to obtain personal information such as usernames and passwords via emails or messages impersonating official institutions. Even with Two-Factor Authentication (2FA), this phishing method can still penetrate security defenses. What is&hellip;","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"In today&#39;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is phishing, where attackers try to obtain personal information such as usernames and passwords via emails or messages impersonating official institutions. Even with Two-Factor Authentication (2FA), this phishing method can still penetrate security defenses. What is&hellip;","og_locale":"en_US","og_type":"article","og_title":"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses","og_description":"In today&#39;s digital era, cyber security is a major concern for many internet users. One frequent method of cybercrime is phishing, where attackers try to obtain personal information such as usernames and passwords via emails or messages impersonating official institutions. Even with Two-Factor Authentication (2FA), this phishing method can still penetrate security defenses. What is&hellip;","og_url":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/","og_site_name":"RingRing-Diringkas","article_published_time":"2024-06-10T10:18:44+00:00","article_modified_time":"2024-06-10T10:18:45+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-1.jpg","type":"image\/jpeg"}],"author":"loyalty","twitter_card":"summary_large_image","twitter_misc":{"Written by":"loyalty","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#article","isPartOf":{"@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/"},"author":{"name":"loyalty","@id":"https:\/\/diringkas.com\/#\/schema\/person\/96e61357e2a447f165e415b1542b407c"},"headline":"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses","datePublished":"2024-06-10T10:18:44+00:00","dateModified":"2024-06-10T10:18:45+00:00","mainEntityOfPage":{"@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/"},"wordCount":617,"commentCount":0,"publisher":{"@id":"https:\/\/diringkas.com\/#\/schema\/person\/8f62bda68ac9483eece5601234115798"},"image":{"@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-1.jpg","articleSection":["Technology","Tutorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/","url":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/","name":"Tips Menghindari Metode Phishing yang Dapat Menembus Pertahanan Keamanan 2FA","isPartOf":{"@id":"https:\/\/diringkas.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#primaryimage"},"image":{"@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-1.jpg","datePublished":"2024-06-10T10:18:44+00:00","dateModified":"2024-06-10T10:18:45+00:00","breadcrumb":{"@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#primaryimage","url":"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-1.jpg","contentUrl":"https:\/\/diringkas.com\/wp-content\/uploads\/2024\/06\/phising2fa-1.jpg","width":1280,"height":720,"caption":"Tips Menghindari Metode Phishing yang Dapat Menembus Pertahanan Keamanan 2FA"},{"@type":"BreadcrumbList","@id":"https:\/\/diringkas.com\/en\/tips-avoiding-phishing-methods-that-can-penetrate-2fa-security-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/diringkas.com\/"},{"@type":"ListItem","position":2,"name":"Tips to Avoid Phishing Methods That Can Penetrate 2FA Security Defenses"}]},{"@type":"WebSite","@id":"https:\/\/diringkas.com\/en\/#website","url":"https:\/\/diringkas.com\/en\/","name":"RingRing-Diringkas","description":"Kami meringkas apapun yang Anda cari!","publisher":{"@id":"https:\/\/diringkas.com\/en\/#\/schema\/person\/8f62bda68ac9483eece5601234115798"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/diringkas.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/diringkas.com\/en\/#\/schema\/person\/8f62bda68ac9483eece5601234115798","name":"Vrory","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/diringkas.com\/wp-content\/uploads\/2023\/03\/sho-byutipul.jpg","url":"https:\/\/diringkas.com\/wp-content\/uploads\/2023\/03\/sho-byutipul.jpg","contentUrl":"https:\/\/diringkas.com\/wp-content\/uploads\/2023\/03\/sho-byutipul.jpg","width":736,"height":1104,"caption":"Vrory"},"logo":{"@id":"https:\/\/diringkas.com\/wp-content\/uploads\/2023\/03\/sho-byutipul.jpg"},"description":"Writer and proudly owner of Diringkas.com! I like to Staying up-to-date with the latest tech advancements, playing video games, discovering new games, and writing about them.","sameAs":["https:\/\/diringkas.com"]},{"@type":"Person","@id":"https:\/\/diringkas.com\/#\/schema\/person\/96e61357e2a447f165e415b1542b407c","name":"loyalty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5cd001f955cc99e68d7f79aabc3baa47928a685b82578846377d4a5230db344a?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5cd001f955cc99e68d7f79aabc3baa47928a685b82578846377d4a5230db344a?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5cd001f955cc99e68d7f79aabc3baa47928a685b82578846377d4a5230db344a?s=96&d=wavatar&r=g","caption":"loyalty"},"url":"https:\/\/diringkas.com\/en\/author\/loyalty\/"}]}},"_links":{"self":[{"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/posts\/8077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/comments?post=8077"}],"version-history":[{"count":1,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/posts\/8077\/revisions"}],"predecessor-version":[{"id":8088,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/posts\/8077\/revisions\/8088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/media\/8078"}],"wp:attachment":[{"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/media?parent=8077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/categories?post=8077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diringkas.com\/en\/wp-json\/wp\/v2\/tags?post=8077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}