Two Factor Authentication Flaws and how to protect yourself