1190 Results for

Authentication

Article

Can a phone replace your wallet? I went shopping to find out.

CNET editor Sharon Profis takes Apple Pay, Google Wallet and PayPal for a test drive and compares the options.

By October 20, 2014

Article

Two-step authentication made easy with Authy

Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.

By May 2, 2014

Article

Heartbleed attack used to skip past multifactor authentication

In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.

By April 18, 2014

Article

Tumblr boosts security with two-factor authentication

In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.

By March 24, 2014

Article

Google endorses a simpler way to secure your data

Even the strongest passwords can be hacked, which is why Google urges users to adopt two-step authentication. A new USB drive makes it easier for users to safeguard their data.

By October 21, 2014

Article

Breville Crispy Crust serves authentic stone-baked pizza

If there's one thing we can all agree on, it's that pizza is delicious. We took Breville's dedicated pizza-baking appliance for a spin.

By February 19, 2014

Article

Multifactor authentication extended to all Office 365 users

All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.

By February 10, 2014

Article

FileVault's authenticated restart has hardware requirements

If you use FileVault and wish to restart remotely, you can do so with the "fdesetup" command; however, this does have some hardware limitations.

By January 23, 2014

Article

Google eyes password-free authentication in Chrome OS

If a Chromebook is near trusted hardware like a phone or watch, an app could wake up the machine. Easier screen unlocking could encourage people to lock them in the first place.

By December 10, 2013

Article

Using NFC, IBM brings dual-factor authentication to mobile

Dual-factor authentication can work by combining smartphones and PCs, but that approach needs to be updated for the mobile era. An new IBM technique combines near-field communications and smartphones.

By October 18, 2013