Tagged With two factor authentication

0

We’ve been spending a lot of time lately wrestling with what Facebook has been doing with our information from our personal lives — but Facebook isn’t the only place where you’re sharing a lot of information about yourself. LinkedIn, everyone’s favourite professional-networking service, gets a ton of data from you about your career and interests, and uses it to sell ads and other services. You should definitely be careful about what you information you post on LinkedIn, and do you what you can to limit the free flow of data you might consider private. Here are a few ways to start.

0

Just last week, Instagram confirmed reports that it's working on modifications to its two-factor authentication setup that will allow you to create passcodes in your favourite security app - like Google Authenticator, for example. While this isn't the sexiest of news, it's great to see this security practice growing in popularity: using an app, rather than a text message, to authenticate into other apps and services.

3

Two-step verification is great. However, if you happen to lose your phone and don't have a few backup codes on you then it can make finding your device on the fly a bit complicated. You can score backup codes whether you use SMS or an Authenticator app for verification (you should really be using an Authenticator app), and carrying them with you can help get you out of a bind if your phone ends up MIA.

12

A long, long time ago, having a good password was all you needed to make sure your Gmail (or other online) account was secure. Now, if you don't have two-factor authentication, or 2FA, then you're missing out on a really simple way to protect yourself. Why, then, do less than 10 per cent of Gmail users have 2FA enabled? Great question.

Shared from Gizmodo

0

A while back, I woke up to find my Android phone lingering at a pattern unlock screen. Not just to unlock my screen, but a prompt to decrypt all of my phone's data. I was puzzled. Every other morning, I decrypted my device using a 10-digit, alphanumeric passphrase -- something I perceived, accurately, as being infinitely more secure than tracing a dumb pattern with my finger.

0

On Tuesday, Techcrunch writer John Biggs had his phone number stolen by a hacker who gained control of Biggs' T-Mobile SIM card, granting him access to Biggs' phone number used to verify his identity. Biggs correctly employed SMS-based two-factor authentication on his accounts, but forgot to add extra security layers to his wireless carrier account. His attacker proceeded to lock him out of his accounts and attempt to demand ransom in bitcoin.

4

Two-factor authentication (2FA) makes logging onto web services much more secure but it can also be a pain in the neck as it adds an extra step to the sign in process. Usually this involves typing in verification codes that you have to retrieve from an app on your phone. Google is attempting to simplify 2FA with a new feature for its online services called Google Prompt. Here's what you need to know.