1214 Results for

authentication

Article

How to keep your Twitter following authentic

Fake followers hurt your credibility -- so clean up your follower list!

By March 30, 2015

Article

How to move Google Authenticator to a new device

Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.

By February 19, 2015

Article

​Want fancy Firefox features? Secure your website

In a bid to make the Web a safer place, Mozilla's security team proposes making encrypted connections necessary for using new Web technologies. Google's Chrome team has a similar idea.

By April 14, 2015

Article

Apple Pay may reach first country beyond US this year

The mobile payments service is on the verge of expanding to Canada, according to the Wall Street Journal. But will Apple be able to seal the deal?

By April 17, 2015

Article

Two-step authentication made easy with Authy

Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.

By May 2, 2014

Article

Heartbleed attack used to skip past multifactor authentication

In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.

By April 18, 2014

Article

PlayStation Vue vs. Sling TV: Streaming live TV compared

PlayStation Vue is the new TV service from Sony that starts at $50 per month. Its competitor Sling TV starts at $20 per month. Both use the Internet to stream numerous live TV channels as well as VOD, and both are free from long-term contracts. So how do they stack up?

By March 18, 2015

Article

Tumblr boosts security with two-factor authentication

In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.

By March 24, 2014

Article

How to stay safe online: CNET's security checklist

Do you have good habits? Safeguard your personal information against the most common Internet perils by taking these security measures.

By April 4, 2015

Article

Study highlights security vulnerabilities in the smart home

An in-depth look at the security behind six well-known smart-home products shows some alarming vulnerabilities.

By April 9, 2015