Fake followers hurt your credibility -- so clean up your follower list!
Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.
Ready to pay by phone? Here's what you need to know.
The search giant's new project aims to make phones more secure by loading a microSD card that serves as a security powerhouse.
The hackers used data stolen from the IRS to file fraudulent tax returns and received $50 million before they were caught, according to the report.
The feature would allow developers to bake fingerprint sensing into their applications and Google to use it freely across Android.
Maker of the Android mobile operating system helps developers build apps that let users easily, safely sign in.
Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.
In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.
This week on Crave, we check out an augmented-reality tattoo... just add a smartphone. Yahoo Labs shows off its ear-scanning authentication tech, and an e-sports legend retires due to injury. It's the Crave show!