Why You Should Ditch Google Authenticator for Authy (for Two-Factor Authentication) – By Khamosh Pathak guidingtech.com
Google is pushing two-factor authentication really hard. And that’s great news. The problem is that Google Authenticator for Android is an abomination (and I’m not even using hyperbole here). It’s still using Holo interface. That’s now 2 generations old. What hurts even more is the fact that Google Authenticator for iPhone was upgraded recently with Material Design.
Authy vs LastPass Authenticator: Which 2FA App Should You Use – By Gaurav Bidasaria guidingtech.com
As privacy concerns continue to rise, the use of two-factor authentication (2FA) apps is now a necessity. Apart from Google and Microsoft, a handful of players are offering their 2FA apps packed with new and innovative features. Authy and LastPass Authenticator are quickly rising the popularity charts among the 2FA apps.
You're Probably Doing 2FA Wrong: Here's the Right Way – By Paul Wagenseil Tom's Guide
The most common method for two-factor authentication is texted codes, but it's also the least secure.
Google, Facebook, Apple, Microsoft, Dropbox and many other online services offer two-factor authentication (2FA) as an option to protect your account.
With 2FA enabled, it's much harder for a crook to break into your account, even if he or she knows or can guess your password, because the crook will be missing that crucial second factor that only you possess. We at Tom's Guide urge our readers to enable 2FA whenever they can.
Why You Shouldn’t Use Your Web Browser’s Password Manager – By Chris Hoffman howtogeek.com
We recommend using a password manager like 1Password, LastPass, or Bitwarden. But modern web browsers have built-in password managers, so why install a different one? There are many good reasons to avoid your web browser’s built-in tool.
The Best Way to Tackle the LastPass Security Challenge – By Chris Hoffman howtogeek.com
If you use LastPass, you should take the Security Challenge. It will scan your vault for compromised, weak, reused, and old passwords and recommend passwords you should change. LastPass will give you a numerical security score, too.
Are free password managers safe to use? – By Ken Colburn datadoctors.com
Everyone has heard the advice that you need to use long, complex passwords that are unique to each account that you use. Unless you only have one or two online accounts, the only way to adhere to these security measures is to use some form of password manager.
Low-Hanging Fruit Series: Multi-factor Authentication (MFA) – By Austin Downing vdalabs.com
At VDA Labs we work with a variety of companies both large and small. During our engagements, we see many of the same reoccurring issues that allow us access to systems. To help combat these threats VDA Labs is starting a blog series we are calling “Low-Hanging Fruit”. Throughout this series VDA will be talking about the most common issues we see, along with how each issue can be combated. In our previous piece we talked about password security. This article discusses why organizations need Multi-Factor Authentication (MFA) and some foibles we see around MFA implementations.
How to Use Chrome’s Built-in Virus Scanner – By Neeraj Chand maketecheasier.com
Viruses and malware used to attack only desktops, but now it is very prevalent online, too. Surfing the web nowadays requires plenty of caution, as you never know if the next website you are visiting contains a virus.
Privacy.com Offers Virtual Payment Cards To Keep Your Digital Cash Secure – By Curtis Silver forbes.com
Technology, as cliche as this might sound, has come a long way. Yet, we still cling to paper and plastic as payment methods. Plastic being the dominant one these days. Chip readers, card swipers and constantly typing our debit card number into online forms puts us and our meager finances at continuous risk. Similar to how we protect ourselves online through VPN services, Privacy.com offers virtual payment cards that act like a VPN when it scrambles your IP address, shielding your true account information from possible scammers.
Money at 30: Privacy.com Review — How it Could Help Keep Your Money Safe – By Kyle Burbank dyernews.com
First the bad news: considering all the major data breaches that have hit retailers, websites, and freaking credit bureaus alike, there’s a very strong chance your personal info has been compromised at some point. Luckily, in addition to steps you can take such as freezing your credit reports to prevent criminals from using this data, there are a growing number of tools you can use to foil thieves in the future. Add to this list Privacy.com, which allows users to create unique card numbers they can use to conceal their actual info.
The difference between Encryption, Hashing and Salting – By Patrick Nohe thesslstore.com
Encryption and Hashing both serve different functions despite their similarities
Quick, do you know the difference between encryption and hashing? Do you know what salting is? Do you think salting your hash is just part of an Irish breakfast?
How Safe Are Password Managers? – By Chris Hoffmanhowtogeek.com
A password manager stores all your passwords and automatically fills them in your web browser and mobile apps. But is trusting an app with your passwords and storing them all in one place a smart idea?
What's the Password? – By Constance Gibbs timeforkids.com
In an ancient folktale, a giant rock blocks the entrance to a cave filled with treasure. A door appears only for those who speak a secret phrase aloud: “Open, sesame!” This is an early example of a password.
Enable 2FA for your favorite sites.
Go beyond the password and protect yourself from hackers and account takeovers. 2-factor authentication (2FA) is the best way to protect yourself online. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts.
The Best Two-Factor Authentication App – thewirecutter.com
The most important thing you can do to increase your online security, alongside using a password manager, is to enable two-factor authentication. After interviewing three experts and testing seven authenticator apps, we think Authy has the best combination of compatibility, usability, security, and reliability.
Getting started with security keys – By Bruce Schneier paulstamatiou.com
Every week I come across another headline about how someone got hacked and within moments many of their online accounts had become compromised. These aren't simple cases of bad actors using account credentials from large public data breaches and the unfortunate result of people using the same password across many websites.