Why Two-Factor Authentication is Broken: Vulnerabilities and Solutions | HM Journal