Paypal not updating in quicken


16-Jul-2019 00:58

Here are my recommendations: Security questions are often pretty terrible and consist of options that could be Google searched for many people, and Pay Pal is no exception.

This makes it even worse since you can bypass the 2nd factor with these.

This is a scenario that I saw play out recently, and although the theft was unsuccessful, I decided to research how it was done.

The results bothered me, and showed that a under a fairly common scenario, this type of account takeover is rather simple.

I called Verizon about blocking this and they told me there's no way to disable it, the only small consolation is that you will receive a text when it is turned on and when someone logs into it.

The text message is supposed to include some identifying details, but the attackers clearly took steps to mask their OS and browser because where these are normally displayed, the text from the attack just said "unknown" and a known malicious IP.

You need to make sure no one can guess or password reset their way into your mobile account.

You quickly go through the reset process and regain control but find that a hacker has already initiated a 00 transfer from your bank into your Pay Pal account and claimed that you bought a 00 purse from them.

You have a strong password that is not repeated anywhere else and have 2 factor authentication turned on, how is this possible?

I also came to another disturbing conclusion: Because of the online SMS reading features offered by some of the biggest cellphone providers, your Pay Pal account security is intrinsically linked to the security of your cellphone provider account, and that your Pay Pal account can only be made as secure as your mobile account login.

The following are the results of my research on how someone can break into a Pay Pal account and if you read no further, the one takeaway is this - text messages should NOT be considered a "something you have" for 2 factor authentication, they're just one more account password away from being accessed, and this is something that can't easily be fixed. Please note that although I specifically mention Verizon, because that's the attack I encountered and investigated, I believe this technique applies equally to any cell provider that allows you to view your text messages online (Verizon, AT&T).

You're wide awake now, cause you're pretty sure you know what's going on.