GitHub announces two-factor authentication mechanism
Github realizes the need for the hour and has announced its very own two-factor authentication mechanism.
The world is realizing the importance of data security. Thus, Github has recently announced the integration of two-factor authentication into its platform. They have enabled this through an ... Read more
Google is normalizing two-step verification for all sign-ins
Google standardizes two-step verification (2SV) for signing into services such as Gmail.
Google is in the process of necessitating more and more accounts to use two-factor authentication. The tech giant has been working on this process for some time and, in its own words, wants to improve securi... Read more
Google plans to turn on 2FA by default for 150M users
In May, Google announced that it plans to enable 2FA (two-factor authentication/two-step verification) by default to enhance security for accounts. As it celebrates Cybersecurity Awareness Month, Google is once again reminding us that it will enable two-factor for 150 million more accounts by the e... Read more
Google improves security in the Play Store
Google wants to enhance integrity in the Play Store, by adding new restrictions and safety measures to developer accounts. Google Play Store developers will soon be needed to verify their email address and phone number, as well as provide extra details like a physical address.
The move is an att... Read more
Google will require two-step verification to allow logins
To mark World Password Day, Google has declared that passwords are the single biggest threat to your online security, reminding us once again just how much passwords suck. It announced plans to automatically add multi-step authentication to its users’ accounts.
It has only been eight years sin... Read more
WhatsApp vulnerability allows hackers to suspend your account
A newly-discovered flaw in the Facebook-owned messaging app WhatsApp can allow an attacker to suspend your account, using just your phone number. The proof-of-concept of this attack was developed by Luis Márquez Carpintero and Ernesto Canales Pereña.
It involves some pretty simple steps, where... Read more
‘Biggest security risks are due to user error’
Users yet again turn out to be the weakest link in the security of computer systems. This is suggested by a survey by IT security company Zscaler among its customers.
The research is based on 'customers with thousands of workloads in AWS, Azure and Google Cloud Platform'. Zscaler also looked at ... Read more
Hacker offers access to C-level executives email accounts
On a closed-access underground forum used by Russian hackers, a cybercriminal is selling passwords for email accounts belonging to hundreds of C-level execs in companies all over the world. The forum is named Exploit.in and was discovered just last week.
The hacker is selling email, and password... Read more
Two-step verification Google makes security key from smartphones
Smartphones running Android 7.0 or higher can now be used as two-step verification (2FA) tools as part of Google's 2FA strategy. With this, the tech giant wants to improve the security of his online services. That's what Security Intelligence reports.
According to Google, using devices such as secu... Read more
Phishing tool bypassing two-step verification in Gmail posted on GitHub
A security researcher has published a tool that can bypass various two-step verifications commonly used on platforms such as Gmail and Yahoo. That's what IT Pro says. The tool was placed on GitHub by Polish researcher Piotr Duszy?ski.
The tool was placed along with a step-by-step plan that explains... Read more