Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Your search for two-factor authentication returned 105 results.Sort results:
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
A vulnerability exists that allows anyone with legitimate account credentials to bypass two-factor authentication on some of PayPal's mobile applications.
An Australian researcher has discovered and posted a method for getting past PayPal's two-factor authentication, but it requires primary credentials.
Added security and no longer having to memorize increasingly difficult passwords are some of the benefits resident members of Singapore's NTUC will get by activating their new OneKey two-factor authentication devices.
According to a blog post by company CTO Rob Platzer, attackers gained access to the company's database backup storage.
This solution, part of our Emerging Products Group Test on online fraud, provides two-factor authentication in a consumer environment.
The use of two-factor authentication, along with advancements in 3-D camera and facial recognition technology, will soon come together as one.
In this video interview, Dug Song, CEO of Duo Security, discusses the impact of two-factor authentication and its deployment in the workplace, as well as the effect that wearables will have on the enterprise in the future.
World of Warcraft players were forced to halt their virtual gaming to combat a trojan designed to compromise account credentials - even those with two-factor authentication enabled.
Inputs.io was left unable to pay an undisclosed number of user balances after the free Bitcoin eWallet service was hacked on Thursday and relieved of 4,100 Bitcoin. That translates to about $1.1 million.
VASCO IDENTIKEY Authentication Server and DIGIPASS GO in combination are a physical token-based authentication tool.
The use of passwords as the only authentication method has many flaws, and has the potential for security breaches, which has left people questioning how passwords will change, or remain, as we know them today.
By early 2014, the alliance plans to release an open standard that would shrink users' dependency on password and PIN authentication.
It is clear that the industry is ripe for a next-gen approach that delivers truly secure, real-time multifactor authentication.
A technologist at EFF discovered the browser cookie was not encrypted but rather was sent in plaintext over HTTP.
The strongest aspects of this product were its support, functionality and ease of use.
Rogue Android apps can steal authentication tokens and risk the accounts of some of the most widely used services, including Google, Facebook and Twitter.
"Smart identification" is just one strategy seeking to replace passwords, says Google's Eric Sachs. Karen Epper Hoffman reports.
One issue with password systems has always been the 'reset' problem: what to do when a user forgets their password.
The Gameover variant of the Zeus trojan is targeting employment sites Monster and CareerBuilder, according to F-Secure researchers.
GitHub users may have had their accounts compromised in a brute force attack that mostly impacted individuals with weak passwords, according to a Tuesday blog post by Shawn Davenport, GitHub director of security.