Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device.
Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.
In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.
In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.
BlackBerry's BES 12 brings secure group collaboration and two-factor authentication to BlackBerry, iOS and Android devices.
All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.
Customers will have their finances at their fingertips if they have an Apple device.
The communications services get two-step verification, aimed at preventing unauthorized access to accounts, even if the username and password are entered.
At a cybersecurity summit held on the Stanford University campus, President Obama outlines a plan for companies and the US government to share information and fend off cyberattacks.
The hectic shopping season isn't just about finding perfect gifts. It's also prime time for identity thieves to snag your info. Here's five tips from security experts on staying safe online.