2333 Results for

Authentication

Article

How to use two-factor authentication without a phone

You're locked out of your account and you don't have a phone with you to receive the verification code. What do you do?

By August 22, 2015

Article

How to enable two-step authentication for your IFTTT account

If This Then That now offers a must-have security feature for account.

By June 24, 2015

Article

How to enable two-factor authentication on popular sites

It may not be the perfect security solution, but two-factor authentication reduces the risks associated with common Web activities -- from searching to social networking to online banking.

By June 16, 2015

Article

How to enable Twitter's two-factor authentication

Twitter finally launched two-factor authentication to help you keep your account secure. Here's what you need to know to set it up.

By June 15, 2015

Article

How to keep your Twitter following authentic

Fake followers hurt your credibility -- so clean up your follower list!

By March 30, 2015

Article

How to move Google Authenticator to a new device

Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.

By February 19, 2015

Article

​Startup aims to make home devices smart enough to anticipate what you need

Silk Labs wants to weave its software and services into all the new networked devices coming to homes of the future. Behind it: a trio fresh from the ambitious Firefox OS smartphone project.

By August 21, 2015

Article

Microsoft's Hello facial detection system tells twins apart

The new log-in system for Windows 10 recognizes your face -- and reportedly can distinguish you from your identical twin.

By August 24, 2015

Article

The 6 coolest things Intel showed off this week

Intel debuted a number of new technologies at its annual Developer Forum in San Francisco. These are the products that excited us the most.

By August 19, 2015

Article

​Researchers hack a Corvette's brakes via insurance black box

Researchers exploit a Web-connected insurance monitor to hijack a car using text messages.

By August 11, 2015