Quote Originally Posted by Norack View Post
He could of had the software security token on his smart phone, which is rather easy to hack.

The hardware security token can't be hacked but you can figure out the algorithm that a persons hardware security token uses if you monitor his one time passwords via a key logger or other means.
Yeah, the hardware tokens are still your best bet, but that doesn't mean they're perfect. There ARE still ways to get around them, however if you take care with your security on your computer and other such things, you often have little to nothing to worry about.