Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Two-Factor Authentication Breaks Free from the Desktop
    Cybersecurity

    Two-Factor Authentication Breaks Free from the Desktop

    adminBy adminApril 16, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Two-Factor Authentication Breaks Free from the Desktop
    Share
    Facebook Twitter LinkedIn Pinterest Email

    These days, organizations require two-factor authentication (2FA) to log into a variety of platforms and applications, such as messaging apps, cloud services and virtual private networks (VPNs). However, the average driver may not be aware that 2FA can protect the car sitting in their driveway.        

    Authentication measures are consistently crucial as phishing campaigns become more sophisticated, and attackers steal credentials in mounting data leaks. Now 2FA is expanding beyond traditional IT computer use cases to include the physical world as well. Protocols can keep hackers from compromising the heat pump warming the house, breaching medical devices treating patients, or driving away in a stolen car.  

    Two-factor authentication is now considered a hygiene factor for traditional IT systems as well as physical security, explains Kalyan Arety, director of product management at SecureW2, warning that users shouldn’t blindly trust devices. Concerns particularly extend to Internet of Things (IoT) and protecting supply chain integrity, adds Arety. 

    Related:Microsoft’s Original Windows Secure Boot Certificate Is Expiring

    While organizations can apply 2FA to protect physical environments across a variety of industries, auto and healthcare have made plenty of strides already. 

    How Is the Auto Industry Using 2FA?

    Attacks targeting cars are becoming increasingly sophisticated, explains Keyfree Technologies VP, David Berg. Organized crime rings are using electronics systems to clone car keys, he tells Dark Reading. 

    “They know where people are located and when the time is right, they send someone to retrieve the car in the driveway without the user knowing, because it’s stolen with a key,” Berg explains.  Canadian insurers and law enforcement have become concerned, says Berg, who is based in Toronto. 

    Since the attacks are similar to ones observed on computers, like man-in-the-middle or spoofing, implementing 2FA looks like a viable way to address the non-IT related problem, he adds. Keyfree has developed 2FA technology that combines hardware installed in the car and a mobile application where users authenticate a key fob with a one-time password in order to start the car. 

    Bypassing Security Systems

    Attackers target a variety of cars, but they usually prefer older cars because they’re easier to steal. Electric cars are less affected because they are always connected to the internet. It’s hard to make them disappear since they’re constantly tracked, explains Berg. 

    “The challenge is that not only are people beating things like steering wheel clubs and bypassing GPS trackers, but they’re also doing things that are very sneaky,” Berg says. “[They’re] bypassing built-in security systems by doing relay attacks and key cloning. People are bypassing these security systems.”

    Related:CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

    There is a growing interest in multifactor authentication (MFA)  for keyless vehicles, observes Lisa Caldwell, commercial U.S. manufacturing and automotive industry practice leader at Marsh. She attributed the evolution to increasing thefts and new technology which has left few possibilities of solutions under evaluation since companies know that users want frictionless security options. 

    “While auto companies have known of the vulnerability for a while, challenges with convenience, reliability, and cost slowed progress,” Caldwell tells Dark Reading.

    Instead of entering a code, as in a computer, auto companies are considering 2FA using secure digital keys with ultra-wideband capabilities that require proximity to the vehicle, biometrics like face ID or fingerprints, and a pin-to-drive model like an ATM with no extra communication steps. That brings up another challenge, explains Caldwell, highlighting how there are no clear standards for authentication. 

    Trade groups like SAE International and the International Organization for Standardization have focused more on outcomes to manage safety and security, and now mechanisms for vehicle entry, adds Caldwell. 

    Related:Booz Allen Announces General Availability of Vellox Reverser to Automate Malware Defense

    Right now, it is unlikely people will see a direct regulatory requirement for authentication but there will be more focus on broad cybersecurity requirements for vehicles, adds Caldwell. 

    Progress may be slow because, as is the case with any 2FA requirements, usability could pose issues. The authentication measure provides a high level of security, but it is mainly suitable for occasional actions only, and not acceptable for everyday use, explains Dr. Bastian Holderbaum, global director of functional safety and cybersecurity at automotive software company, FEV.io GmbH.

    “For interactions that happen frequently, like unlocking or starting the vehicle, mandatory 2FA is not convenient for the users,” Holderbaum tells Dark Reading. 

    Healthcare Enters the Chat

    Healthcare is another highly targeted industry pushing to incorporate 2FA into daily practices. Devices like dialysis machines and any big diagnostic machine that captures patient healthcare information will have 2FA or MFA enabled to protect sensitive data, says Arety. The key is to implement 2FA to ensure the data residing in the device is encrypted and when users actually transmit data to secure communication between the device and the central control plane, he adds. 

    “It’s all driven by policy,” Arety tells Dark Reading. “All inherent, implicit policy that pushes the second, third, or fourth factor before you issue that certificate.” 

    Medical devices such as infusion pumps, imaging systems, and electronic health record terminals are network-connected and high-value targets for cybercriminals, explains Keeper Security CISO, Shane Barney. Therefore, some healthcare organizations now require clinicians to enter both a physical credential and PIN before they can interact with sensitive equipment or patient data, adds Barney. 

    “When unauthorized access to medical infrastructure carries real-life safety consequences, the bar for identity assurance must be higher than a single factor,” Barney says. “That bar should also extend to the quality of the factors themselves.”

    Barney warns authentication methods like SMS-based code, while still commonly used, remain vulnerable to interception and SIM-swapping. Implementing 2FA could also “close a category of risk that most threat models still don’t account for,” he adds. 

    “Whether someone is unlocking a server room, accessing a medical device, or authorizing a wire transfer, the underlying question is the same: Can you prove who you are through at least two independent channels?” Barney says.  

    authentication breaks desktop free TwoFactor
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMicrosoft makes it easier to import Google PMax campaigns
    Next Article Chrome just flipped the switch on its new enhanced AI Mode, and it’s a huge upgrade
    admin
    • Website

    Related Posts

    CISA cancels prestigious summer internships, citing government shutdown

    April 16, 2026

    ZionSiphon malware designed to sabotage water treatment systems

    April 16, 2026

    Government Can’t Win the Cyber War Without the Private Sector

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    CISA cancels prestigious summer internships, citing government shutdown

    April 16, 2026

    Stop New York’s Attack on 3D Printing

    April 16, 2026

    Chinese scientists grew 2D chips 1000x faster using liquid gold and a crazy tungsten trick

    April 16, 2026

    AI shifts IT roles from operator to orchestrator

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,353)
    • Privacy & Online Earning (170)
    • SEO & Digital Marketing (830)
    • Tech Tools & Mobile / Apps (1,617)
    • WiFi / Internet & Networking (227)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    CISA cancels prestigious summer internships, citing government shutdown

    April 16, 2026

    Stop New York’s Attack on 3D Printing

    April 16, 2026

    Chinese scientists grew 2D chips 1000x faster using liquid gold and a crazy tungsten trick

    April 16, 2026
    Most Popular
    • CISA cancels prestigious summer internships, citing government shutdown
    • Stop New York’s Attack on 3D Printing
    • Chinese scientists grew 2D chips 1000x faster using liquid gold and a crazy tungsten trick
    • AI shifts IT roles from operator to orchestrator
    • ZionSiphon malware designed to sabotage water treatment systems
    • Google AI Mode in Chrome Gets Side-by-Side Browsing
    • Email alerts in Proxmox saved me from discovering backup failures weeks too late
    • Government Can’t Win the Cyber War Without the Private Sector
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.