Why SMS 2FA Isn't Enough Anymore
SMS codes can be stolen. Learn about better two-factor authentication methods that actually protect your accounts.

SMS codes can be stolen. Learn about better two-factor authentication methods that actually protect your accounts.

You enabled two-factor authentication. Great! But if you’re using SMS codes, you’re not as secure as you may think.
Because when you log in somewhere and you get a code via text message, that code travels through your phone carrier’s network. And that network can be tricked.
SIM swapping: basically, this is when an attacker has convinced your phone company to move your number onto of their phone. They call customer support, impersonating you, and claim that they lost their phone. Once your number is on their SIM card, they receive all your text messages-including those security codes.
This is not some far-from-reality hacker movie stuff. SIM swap fraud has grown massively and keeps on rising. Using new eSIM technology, attackers are now able to steal your number in under five minutes.
Some attackers don’t even need to call anyone: They exploit old telecom protocols called SS7 to redirect your messages directly.
Yes! Microsoft found that accounts of any form of MFA are 99.9% less likely to get hacked. The problem is, SMS is the weakest form of MFA. It’s better than nothing, but there are much stronger options.
Instead of receiving codes via text, an app generates codes directly on your phone. The codes never travel over any network-they’re generated right on your device.
Why a separate app? Most of the password managers also provide 2FA codes. Convenient. Yet, if someone gets into your password manager, they get both the passwords and the 2FA codes. Game over. Keeping them in separates means an attacker needs to compromise two apps to get in. Don’t put all your eggs in one basket.
Applications recommended:
A small USB device you plug in when you log in. No codes to type-just tap the key.
The popular options include YubiKey and Google Titan Key. They work with most of the major services: Google, Microsoft, GitHub, and many more.
The key uses cryptography that checks if you are on the real website. If you clicked a phishing link, it won’t work on the fake sites.
Newest option. Your phone or computer generates a unique cryptographic key for each site. Nothing to remember, nothing to type.
Passkeys are implemented in iOS, Android, Windows, and macOS. More websites support them — Google, Apple, Microsoft, PayPal, and others.
Like hardware keys, it automatically checks whether a website is real. It makes phishing almost impossible.
There’s one fear associated with authenticator apps: what if your phone gets lost?
Hardware keys? Buy two, keep one as backup.
One decade ago, SMS codes were fine. Nowadays, they’re a weak point attackers know to take advantage of.
Switching to an authenticator app takes maybe 30 minutes and makes you dramatically safer. Hardware keys and passkeys go even further.