Two Factor Authentication and Phishing

We wrote last week about the log in bugs in Oracle which allows for the hacking of Oracle databases because of the lack of two-factor authentication. Today we follow-up with a second article on what happens when two-factor authentication is not present combined with a slightly gullible person believing everything they read on Twitter with the result being person phished – Radar