Phone-based authentication is the way forward instead.
Tag: Tech
The defenses put in place to thwart the 2008 attack turn out to be very weak.
And Microsoft is offering enterprises dedicated app compatibility support.
Their complexity makes them a security hazard; their ubiquity makes replacement nigh impossible.