Tag: two-step verification

Here you will find all the articles with the tag: two-step verification.

GitHub announces two-factor authentication mechanism

GitHub announces two-factor authentication mechanism

Github realizes the need for the hour and has announced its very own two-factor authentication mechanism. The world is realizing the importance of data security. Thus, Github has recently announced the integration of two-factor authentication into its platform. They have enabled this through an ... Read more

date1 year ago
Google is normalizing two-step verification for all sign-ins

Google is normalizing two-step verification for all sign-ins

Google standardizes two-step verification (2SV) for signing into services such as Gmail. Google is in the process of necessitating more and more accounts to use two-factor authentication. The tech giant has been working on this process for some time and, in its own words, wants to improve securi... Read more

date2 years ago
Google plans to turn on 2FA by default for 150M users

Google plans to turn on 2FA by default for 150M users

In May, Google announced that it plans to enable 2FA (two-factor authentication/two-step verification) by default to enhance security for accounts. As it celebrates Cybersecurity Awareness Month, Google is once again reminding us that it will enable two-factor for 150 million more accounts by the e... Read more

date2 years ago
Google improves security in the Play Store

Google improves security in the Play Store

Google wants to enhance integrity in the Play Store, by adding new restrictions and safety measures to developer accounts. Google Play Store developers will soon be needed to verify their email address and phone number, as well as provide extra details like a physical address. The move is an att... Read more

date2 years ago
WhatsApp vulnerability allows hackers to suspend your account

WhatsApp vulnerability allows hackers to suspend your account

A newly-discovered flaw in the Facebook-owned messaging app WhatsApp can allow an attacker to suspend your account, using just your phone number. The proof-of-concept of this attack was developed by Luis Márquez Carpintero and Ernesto Canales Pereña. It involves some pretty simple steps, where... Read more

date2 years ago
‘Biggest security risks are due to user error’

‘Biggest security risks are due to user error’

Users yet again turn out to be the weakest link in the security of computer systems. This is suggested by a survey by IT security company Zscaler among its customers. The research is based on 'customers with thousands of workloads in AWS, Azure and Google Cloud Platform'. Zscaler also looked at ... Read more

date2 years ago
Hacker offers access to C-level executives email accounts

Hacker offers access to C-level executives email accounts

On a closed-access underground forum used by Russian hackers, a cybercriminal is selling passwords for email accounts belonging to hundreds of C-level execs in companies all over the world. The forum is named Exploit.in and was discovered just last week. The hacker is selling email, and password... Read more

date3 years ago
Two-step verification Google makes security key from smartphones

Two-step verification Google makes security key from smartphones

Smartphones running Android 7.0 or higher can now be used as two-step verification (2FA) tools as part of Google's 2FA strategy. With this, the tech giant wants to improve the security of his online services. That's what Security Intelligence reports. According to Google, using devices such as secu... Read more

date4 years ago
1 2