Security   488961

« earlier    

A Guide to Common Types of Two-Factor Authentication on the Web | Electronic Frontier Foundation
Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.
In addition to requesting something you know to log in (in this case, your password), an account protected with 2FA will also request information from something you have (usually your phone or a special USB security key). Once you put in your password, you'll grab a code from a text or app on your phone or plug in your security key before you are allowed to log in. Some platforms call 2FA different things—Multi-Factor Authentication (MFA), Two Step Verification (2SV), or Login Approvals—but no matter the name, the idea is the same: Even if someone gets your password, they won't be able to access your accounts unless they also have your phone or security key.
security  privacy  guide  EFF  2FA  authentication 
12 hours ago by rgl7194
After on-stage failure, Federighi tries to quiet fears about Face ID’s function and security | iLounge News
In its first big moment on stage during last week’s Apple Keynote, Face ID failed to unlock SVP Craig Federighi’s iPhone X, leading to all kinds of speculation that the new authentication system will be a disaster. Sitting down with Daring Fireball’s John Gruber, Federighi did his best to assuage those fears, saying the very public failure surprised him because usually the Face ID “just works,” and he’s certain that any fears over the functionality will “melt away” as soon as users have their hands on the iPhone X. “Honestly, we’re just all counting the days that customers can finally get their hands on these. Because I think just like with Touch ID, initially people thought oh, ‘Apple’s done something that’s totally not going to work and I’m not a believer and I’m not gonna use this feature,’” Federighi said. “Now everyone’s worried because they can’t imagine life without Touch ID. We’re going to see exactly the same thing with Face ID.”
faceID  apple_event  federighi  demo  security  privacy 
13 hours ago by rgl7194
Interview: Apple’s Craig Federighi answers some burning questions about Face ID | TechCrunch
Face ID is easily the most hot-button topic to come out of Apple’s iPhone event this week, notch be damned. As people have parsed just how serious Apple is about it, questions have rightly begun to be raised about its effectiveness, security and creation.
To get some answers, I hopped on the phone with Apple’s SVP of Software Engineering, Craig Federighi. We went through a bunch of the common concerns in rapid-fire fashion, and I’ve also been asking around and listening to Apple folks who have been using the feature over long periods. Hopefully we can clear up some of the FUD about it.
federighi  faceID  apple  privacy  security  interview 
13 hours ago by rgl7194
Photo Privacy
Photo Privacy is an EXIF Metadata removal tool for your Mac which you can use to remove all the private information from your photos.
privacy  security  mac  utlitiy  software 
13 hours ago by objectif
TripMode - Your mobile data savior
A PC and Mac app that helps you save mobile data when on the go. It stops online backups, updates, photos syncs, etc. from using data in background.
networking  software  security  apple  utility 
14 hours ago by objectif
Russia targeted election systems in 21 states, successfully hacking some
At least 21 states were the focus on these hacking attempts, including Alabama, Alaska, Arizona, California, Colorado, Connecticut, Delaware, Florida, Illinois, Iowa, Maryland, Minnesota, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Texas, Virginia, Wisconsin and Washington, as confirmed by the Associated Press and the states themselves. States like Florida, Ohio, Pennsylvania, Virginia and Wisconsin are among the swing states considered critical to an electoral college victory last year. So far, other battleground states including Michigan, Nevada, New Hampshire and North Carolina are not among those confirmed in the hacking attempt.
elections  infosec  security 
14 hours ago by campylobacter

« earlier    

related tags

00000  2fa  2factor  accessibility  advertising  ai  airports  and  android  ansible  anti  antivirus  apache  api  app  apple  apple_event  assembly  authentication  aws  aws_security  axe  baby  ban  bluetooth  bna  breach  browser  bug-out-bag  bug  build  cheat  chrome  cluster  code  codes  computer-science  computer  computer_security  computer_vision  conference  corydoctrorow  credit_report  crime  cryptocurrency  data  demo  development  dns  documentation  education  eff  elections  electronics  encryption  equifax  exploits  extension  facebook  faceid  federighi  finances  firefox  floss  free  funny  gas  git-crypt  git  google  gov2.0  guide  hack  hacking  hardware  helpful  home  honeypot  howto  http  huwayja  iam  identity_theft  ifttt  informatiebeveiliging  information  infosec  internet  interoperability  interview  ios11  iot  it  java  journalism  keyboard  keychain  kirkuk  labourparty  laptop  lasc  lint  linter  linting  linux  location  mac  machinelearning  malware  martialarts  md5  microsoft  military  mozilla  network  networking  office  on  openid  opensource  osx  papers  performance  personal_net  pinterest  pocket  policing  portchecker  ports  printing  privacy  progamming  programming  progressivewebapplication  pump  pwa  ransomware  raspberrypi  react  reference  reviews  risk  ruby  s3  safari  scan  schneier  science  secrets  security  server  sheet.  shortcuts  skim  socialmedia  software  sqlite  ssh  ssl  sso  stuffing  survival  sysadmin  t  teaching  tech  technology  terminal  tobuy  tool  toolkit  tools  touchid  training  travel  tv  twitter  uk  utility  utlitiy  via-pocket  video  visualization  voice  web-app-development  web-development  web  web2  webdev  wifi  windows  wtf  xmpp  xss  |   

Copy this bookmark:



description:


tags: