Hackers could use phone numbers for phishing. Authy accounts not compromised, but be cautious of unexpected messages from trusted sources. Smishing attacks possible.
Collection
[
|
...
]
Hackers could use phone numbers for phishing. Authy accounts not compromised, but be cautious of unexpected messages from trusted sources. Smishing attacks possible.