1184 Results for

authentication

Article

Two-step authentication made easy with Authy

Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.

By 3 May 2014

Article

Heartbleed attack used to skip past multifactor authentication

In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.

By 19 April 2014

Article

Tumblr boosts security with two-factor authentication

In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.

By 25 March 2014

Article

Breville Crispy Crust serves authentic stone-baked pizza

If there's one thing we can all agree on, it's that pizza is delicious. We took Breville's dedicated pizza-baking appliance for a spin.

By 20 February 2014

Article

Multifactor authentication extended to all Office 365 users

All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.

By 11 February 2014

Article

FileVault's authenticated restart has hardware requirements

If you use FileVault and wish to restart remotely, you can do so with the "fdesetup" command; however, this does have some hardware limitations.

By 24 January 2014

Article

Google eyes password-free authentication in Chrome OS

If a Chromebook is near trusted hardware like a phone or watch, an app could wake up the machine. Easier screen unlocking could encourage people to lock them in the first place.

By 11 December 2013

Article

Hackers hold 7 million Dropbox passwords ransom

Dropbox denies it has been compromised as hackers leak hundreds of passwords online and threaten to release millions more.

By 14 October 2014

Article

Google exposes 'Poodle' flaw in Web encryption standard

Three Google security engineers uncover a major vulnerability in the older -- but still supported -- Web encryption standard SSL 3.0. Experts say fixing it is impossible and upgrading will be difficult.

By 15 October 2014

Article

Using NFC, IBM brings dual-factor authentication to mobile

Dual-factor authentication can work by combining smartphones and PCs, but that approach needs to be updated for the mobile era. An new IBM technique combines near-field communications and smartphones.

By 18 October 2013