1224 Results for

authentication

Article

How to keep your Twitter following authentic

Fake followers hurt your credibility -- so clean up your follower list!

By March 30, 2015

Article

Designed for Windows 10: Microsoft shows off 'never before seen' devices at Computex 2015

Microsoft's corporate VP Nick Parker lifts the lid on some of the new PCs, laptops and tablets that have been designed specifically for the new operating system, including the Dell XPS 15.

By June 3, 2015

Article

How to move Google Authenticator to a new device

Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.

By February 19, 2015

Article

Google's Project Vault is a security system disguised as a microSD card

The search giant's new project aims to make phones more secure by loading a microSD card that serves as a security powerhouse.

By May 29, 2015

Article

The Android Pay details Google didn't tell you

Ready to pay by phone? Here's what you need to know.

By May 28, 2015

Article

Russian hackers behind $50 million IRS scheme, report says

The hackers used data stolen from the IRS to file fraudulent tax returns and received $50 million before they were caught, according to the report.

By May 29, 2015

Article

Google beefs up user-identity safety net for apps

Maker of the Android mobile operating system helps developers build apps that let users easily, safely sign in.

By May 28, 2015

Article

Two-step authentication made easy with Authy

Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.

By May 2, 2014

Article

Google's Android poised to get full fingerprint support

The feature would allow developers to bake fingerprint sensing into their applications and Google to use it freely across Android.

By May 22, 2015

Article

Heartbleed attack used to skip past multifactor authentication

In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.

By April 18, 2014