This has been translated into Polish here:
Here are two new active attacks we're starting to see:
However, one has to take into consideration the "work factor" of moving from passive attacks to active attacks. I think that two factor authentication is a great technology that will overall increase security by "raising the bar", forcing the attacks to get much more sophisticated (which will tend to filter out all but the most determined attackers).
Well done! Tell us all something we don't know. :-p
He also proposes that in general, attacks are moving from passive (time shifted) methods to active (real time) methods, which is what makes them especially effective against two factor authentication. Again I would have to agree.
9. S. McVay, 216(No. 8), 13 (1966).
I say that two-factor authentication is just about to reach the early majority, and I emphatically agree with your words of caution since careful thought during adoption will help spur real innovation, but I totally disagree with your economics. The early majority phase should remind you to change you message in order to communicate with the mass of users/adopters who are far more accepting of change and are actively shifting the culture towards an improved security posture. These are the users and system stewards who will know that two-factor is not a panacea. The sun always rises.
10. J. Fletcher, (Westminster, Philadelphia, 1966).
"Indeed, the process has been so widely commented uponthat one writer postulated a common life cycle for all of theattempts to develop regulatory policies. The life cycle islaunched by an outcry so widespread and demanding that itgenerates enough political force to bring about establishment ofa regulatory agency to insure the equitable, just, and rationaldistribution of the advantages among all holders of interest inthe commons. This phase is followed by the symbolic reassuranceof the offended as the agency goes into operation, developing aperiod of political quiescence among the great majority of thosewho hold a general but unorganized interest in the commons. Oncethis political quiescence has developed, the highly organized andspecifically interested groups who wish to make incursions intothe commons bring sufficient pressure to bear through otherpolitical processes to convert the agency to the protection andfurthering of their interests. In the last phase even staffing ofthe regulating agency is accomplished by drawing the agencyadministrators from the ranks of the regulated." [p.p.60-61]