Session hijacking is when an attacker steals a session cookie or auth token and uses it to act as the user. Always-logged-in apps (phone apps, Outlook, social apps) often use refresh tokens that keep access alive until you revoke sessions.
If an attacker can run JavaScript inside your site (unsafe HTML rendering, vulnerable input, compromised scripts), they can steal tokens in JS storage or perform actions as the user.
If your site allows HTTP or mixed content, cookies/tokens can leak on unsafe networks or via downgrade tricks.
Malicious downloads/extensions/apps often steal sessions/tokens, leading to account takeover.
Duo Mobile is a multi-factor authentication (MFA) app used by businesses (VPN, Microsoft 365/SSO, admin portals, etc.). It commonly uses push approvals and/or codes to confirm it’s really you signing in.
For high-value accounts (Google, Microsoft, YouTube, business admin logins), the strongest practical login protection is: Passkeys and/or a hardware security key (FIDO2/WebAuthn).
Apps commonly use short-lived access tokens + long-lived refresh tokens stored on the device. As long as the refresh token stays valid, the app can keep you signed in for weeks/months.
Most logins rely on session cookies (or tokens) to remember that you already authenticated. Blocking cookies can protect privacy, but it can also break sign-in or cause repeated logouts.
If someone stole a session cookie/token or an app refresh token, they may still be logged in even after a password change. The fix is to terminate sessions and remove persistence.
Choose: Done, In progress, or Not started. This drives your score + report + recommended next steps.