By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Now we are discovering reality
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Now we are discovering reality
Mobile

Now we are discovering reality

News Room
Last updated: 2025/08/17 at 8:14 AM
News Room Published 17 August 2025
Share
SHARE

Passwords are a gain. Remembering them is an almost impossible mission, creating safe versions makes us entering several special symbols, and to top it off, we see leaks of these data from time to time. Therefore, the different technology companies seek a definitive solution to end them. One of the alternatives that is gaining more popularity is apparently simple and elegant: introducing the email or telephone and receiving a single -use code. But it is not completely safe.

Large companies adopt the ‘Magic Link’. The login without password has been adopted by different companies such as Microsoft. The promise is clear: eliminate friction and risk of reused passwords in different services. However, what seems like an ingenious solution is becoming a security nightmare, a system that, in certain scenarios, can even be worse than the denoted passwords, as the expert Daniel Huang recognizes. And it is not a theoretical threat; It is already actively exploited.

Introducing the email is the first step of deception. A priori seems like a simple and harmless system, and as users we are getting used to the fact that if we receive a code we must use it. But where? This is where a cyber -intensary finds a new reef for improperly effective phishing attacks.

Mail

It all starts receiving an email or a SMS of phishing Very convincing. It can be an irresistible offer or a security notice that attracts a lot of attention that is accompanied by access to a web page, which is a perfect clone to the original through which they are being passed in the SMS. This is where they ask that the phone or email be introduced, and it only remains to wait for the next step.

Behind the screen is where the attacker is located. Where it is not seen, the hacker introduces the email or telephone on the legitimate website, which makes the real service send a completely valid digit code to the entrance tray OA the mobile messages section. And this is where the false website asks that the verification code that has been received to be introduced, taking advantage of the previous times where doing this had happened absolutely nothing.

Here the damage is done. The code is received by the attacker who will use it on the Real website, starting session and changing all the login information such as email or telephone to seize an account. And defense systems serve as little, since a password manager cannot self -reflect anything and as the code is legitimate and sent from a real service the spam filters will not jump either.

A security problem that has already been exploited. This does not remain alone in theory, but has been put into practice. One of the most notorious examples is the Microsoft login system for Minecraft accounts, as shown in the company’s forums or in Reddit’s threads. Many players point to how they lost access to the account of the morning due to this type of fraud.

The employer was always the same: they received an email with some excuse about their Mojang account and following the steps delivered the hint access code in the silver tray.

What is the fraud of the CEO and why you should not set up your boss: thus cheat cybercounts and manage to skip the antispam filters

Classic access code or passwords. This is the great decision that must now be made by large companies. And one of the solutions that would guarantee to have a safe password is a good password manager. In the event that it is of quality, access credentials are linked to a specific URL, and that is why if an illegitimate website will be accessed, the web address will not coincide and will not be self -realized.

The best defense is common sense. With both access systems, 100% security is not achieved. In the past we have seen very important password leaks, such as hackers published very extensive files with credentials, the robbery scams that have been reported or the strategies that are followed to make the theft of credentials, even in Chrome. That is why, as Security Councils, the most important thing is to review web addresses and distrust everything that can get out of the normal.

Images | Brett Jordan Towfiquiqu Barbhuiya

In WorldOfSoftware | Si fraud: what is and why it is not recommended with a “yes” when it calls you an unknown number

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The provider of services and solutions Ti SCC buys omega peripheals
Next Article Eerie texts ‘parent-killing teen’ sent from jail as family begs for help
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Mom traveling with baby hit with $3.6k ‘seating’ fee from American Airlines
News
How to Easily Claim VSK94 and M590 Guns in Free Fire MAX and Dominate Mid-Range and Close-Quarters Battles
Mobile
Meta’s promising new display-enabled smart glasses are right around the corner, and this is how much you’ll have to pay
News
TikTok challenges US law forcing owner ByteDance to sell or face nationwide ban · TechNode
Computing

You Might also Like

Mobile

How to Easily Claim VSK94 and M590 Guns in Free Fire MAX and Dominate Mid-Range and Close-Quarters Battles

3 Min Read
Mobile

The provider of services and solutions Ti SCC buys omega peripheals

1 Min Read
Mobile

Connected glasses that focus on AI and confidentiality

3 Min Read
Mobile

Apple Just Added Two Free Apps in iOS 26 That Will Completely Change the Way You Use Your iPhone Every Day

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?