67259 Results for

two-factor authentication

Article

Tumblr boosts security with two-factor authentication

In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.

By Mar. 24, 2014

Article

Two-factor authentication: What you need to know (FAQ)

Twitter just got it. Apple recently got it, too. Google, Microsoft, Facebook, and Amazon have had it for a while. But why's two-factor authentication important, and will it keep you safe?

By May. 23, 2013

Article

How to enable Twitter's two-factor authentication

Twitter finally launched two-factor authentication to help you keep your account secure. Here's what you need to know to set it up.

By May. 22, 2013

Article

Twitter fights hacking with two-factor authentication

Enough is enough for the global network of fast-moving 140-character missives. Twitter now hopes to protect member accounts with a more sophisticated log-in system.

By May. 22, 2013

Article

Microsoft rolling out two-factor authentication

Microsoft is joining the two-factor authentication ranks, adding support for this security mechanism across its products and services accessible via a Microsoft Account.

By Apr. 17, 2013

Article

Twitter considers implementing two-factor authentication

Microblogging site posts job opening for a software engineer to develop security features, including multifactor authentication.

By Feb. 4, 2013

Article

How to enable two-factor authentication on popular sites

It may not be the perfect security solution, but two-factor authentication reduces the risks associated with common Web activities -- from searching to social networking to online banking.

By Jan. 29, 2013

Article

Multifactor authentication extended to all Office 365 users

All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.

By Feb. 10, 2014

Article

Using NFC, IBM brings dual-factor authentication to mobile

Dual-factor authentication can work by combining smartphones and PCs, but that approach needs to be updated for the mobile era. An new IBM technique combines near-field communications and smartphones.

By Oct. 18, 2013

Article

How to use Google Voice with two-step authentication

There's one important detail you have to know should you want to use your Google Voice number with a two-step authentication service.

By May. 23, 2013