1202 Results for

authentication

Article

How to buy a new phone: The CNET smartphone buying guide

The most important things to know when shopping for a cell phone.

By December 16, 2014

Article

How to move Google Authenticator to a new device

Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.

By February 19, 2015

Article

Two-step authentication made easy with Authy

Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.

By May 2, 2014

Article

Heartbleed attack used to skip past multifactor authentication

In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.

By April 18, 2014

Article

Tumblr boosts security with two-factor authentication

In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.

By March 24, 2014

Article

​Gemalto: No major theft of keys to smartphone kingdom

Yes, it seems US and UK spy agencies tried to snoop on people's smartphones, the company says. But privacy and security harm to users is limited by Gemalto's own network security and newer encryption used on modern networks.

By February 25, 2015

Article

Breville Crispy Crust serves authentic stone-baked pizza

If there's one thing we can all agree on, it's that pizza is delicious. We took Breville's dedicated pizza-baking appliance for a spin.

By February 19, 2014

Article

Listen up! Qualcomm's ultrasonic 3D fingerprint scanner could one day give passwords the finger (hands-on)

Sound waves aren't just for voices. They're also adept at priming your prints, and one day replacing your passwords.

By March 2, 2015

Article

Multifactor authentication extended to all Office 365 users

All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.

By February 10, 2014

Article

FileVault's authenticated restart has hardware requirements

If you use FileVault and wish to restart remotely, you can do so with the "fdesetup" command; however, this does have some hardware limitations.

By January 23, 2014