Narrow your search
Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.
In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.
Even the strongest passwords can be hacked, which is why Google urges users to adopt two-step authentication. A new USB drive makes it easier for users to safeguard their data.
Using two-step verification is a smart way to help protect your data on Google. Follow these steps to move the app to your new mobile device, and also as a reminder to remove it from your old one.
There's one important detail you have to know should you want to use your Google Voice number with a two-step authentication service.
Dropbox denies it has been compromised as hackers leak hundreds of passwords online and threaten to release millions more.
What does the hack mean for your own cloud security? Here are all of your nude selfie-related questions answered.
Hackers accessed celebrities' iCloud accounts through targeted attacks on usernames, passwords, and security questions -- something Apple says is "all too common on the Internet."
Celebrities will continue to take nude photos of themselves and certain hackers will try their damnedest to uncover the goodies. All the more reason, say security experts, to fix bad habits.
Heading back to school this fall? These apps will help you save money now and throughout the year.