Two gadgets enter the ring, but only one can leave the champion! Each week Brian Tong pits two compe
Stop with the excuse that two-step authentication is too much work. Use Authy and thank yourself later.
There's one important detail you have to know should you want to use your Google Voice number with a two-step authentication service.
In an effort to deter hackers, the blogging platform introduces added security that requires users to log-in with both a password and cell phone code.
In one of the earliest instances of a Heartbleed attack breaking through a private corporate network, security firm Mandiant reports that a client's virtual private network session was successfully hacked.
If there's one thing we can all agree on, it's that pizza is delicious. We took Breville's dedicated pizza-baking appliance for a spin.
All users will now have the option of using a second layer of log-in verification to reduce vulnerability to online identity theft.
First released for Premium accounts only, this important security feature is now available to all Evernote users. Learn how to set it up to add another layer of protection to your account.
Dual-factor authentication can work by combining smartphones and PCs, but that approach needs to be updated for the mobile era. An new IBM technique combines near-field communications and smartphones.
Twitter just got it. Apple recently got it, too. Google, Microsoft, Facebook, and Amazon have had it for a while. But why's two-factor authentication important, and will it keep you safe?
Twitter finally launched two-factor authentication to help you keep your account secure. Here's what you need to know to set it up.