2164 Results for



Ghost Recon Wildlands dev diary explores authenticity

Old developers and new talk about what makes a good Ghost Recon.

By 18 September 2015


How to use two-factor authentication without a phone

You're locked out of your account and you don't have a phone with you to receive the verification code. What do you do?

By 23 August 2015


How to enable two-step authentication for your IFTTT account

If This Then That now offers a must-have security feature for account.

By 25 June 2015


How to enable two-factor authentication on popular sites

It may not be the perfect security solution, but two-factor authentication reduces the risks associated with common Web activities -- from searching to social networking to online banking.

By 17 June 2015


How to enable Twitter's two-factor authentication

Twitter finally launched two-factor authentication to help you keep your account secure. Here's what you need to know to set it up.

By 16 June 2015


How to keep your Twitter following authentic

Fake followers hurt your credibility -- so clean up your follower list!

By 31 March 2015


How to move Google Authenticator to a new device

Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.

By 20 February 2015


Amazon offers stronger protection for your account

Two-factor authentication requires both a password and verification code delivered to your mobile phone.

By 19 November 2015


Bezos' Blue Origin makes historic rocket landing

Welcome to the next age of space exploration: reusable rockets. Get the details on the landing by Blue Origin, run by Amazon's Jeff Bezos. Meanwhile, questions swirl over Amazon's security with forced password resets.

By 25 November 2015


The security setting that the best hacker can't crack

Passwords aren't enough. Sharon Profis talks two-step authentication on "You're Doing it All Wrong."

By 8 November 2015