Date | Title | Description |
11.07.2024 | Как я взломал штрих-коды продавца билетов TicketMaster
Реверс-инжиниринг | Недавно я купил билеты на концерт на сайте TicketMaster. Если бы мне отправили обычный распечатываемый билет в PDF, который бы можно было сохранить офлайн на телефоне, то этой статьи никогда бы не было. Но ведь сейчас 2024 год: всё, что дел... |
05.07.2024 | Hacker rouba 33 milhões de números de telefone de usuários do Authy | Usuários do Authy devem tomar cuidado com possíveis tentativas de golpe (Imagem: Vitor Pádua / Tecnoblog)
Saiba mais sobre Authy no nosso canal no WhatsApp
Entre Agora
A Twilio sofreu um ataque hacker e números de telefone de 33 milhões de ... |
05.07.2024 | Hackers Access Millions of User Phone Numbers After Successful Apple, Android Authy App Breach | By Aldohn Domingo
Published Jul 5, 2024 9:51AM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
Android and iOS users of Twilio's Authy are now being warned by the company that hack... |
07.06.2024 | Apple to Launch Passwords App for iPhone and Mac, Competing With 1Password and LastPass | By Inno Flores
Published Jun 7, 2024 2:40AM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
Apple is making waves with its latest endeavor in digital security: Developing a new app... |
24.10.2023 | The Complete List of Alternatives to All Google Products | With growing concerns about online privacy and the security of personal data, more people than ever are considering alternatives to Google products. After all, Google's business model is fundamentally centered on data collection and adverti... |
11.08.2023 | Top 6 Google Authenticator Alternatives in 2023
Top 6 Google Authenticator Alternatives in 2023 | Top 6 Google Authenticator Alternatives in 2023
Multifactor authentication is one of the most effective ways to enhance security, and with the rise of apps such as Google Authenticator, the authentication method has become easier to deploy.... |
12.03.2023 | Меня достало, что компании всё чаще используют двухфакторную аутентификацию только через фирменное приложение... | Серия Disclaimer'ов
Общий дисклеймер
- Публикация предназначена для просмотра с устройства под управлением клавиатуры. Настоятельно рекомендуется подключить мышь или использовать тачпад;
- Это одна из первых статей автора на подобных площад... |
30.08.2022 | All the Possible Ways to Secure Your Mobile Devices from Hackers | David Thompson, Tech Times 30 August 2022, 11:08 am
(Photo : mohamed Hassan from Pixabay)
These days, our mobile devices are like an extension of ourselves. We use them for just about everything, from keeping in touch with friends and famil... |
23.06.2022 | How to transfer Authy to a new phone | Image: Miha Creative/Adobe Stock
Authy is a two-factor authentication app that makes it possible for you to easily work with 2FA codes for the apps and services you use.
Two-factor authentication adds a layer of security to the sites and se... |
21.06.2022 | Linux has a new authenticator app, and it’s easy enough for anyone to use | Image: igor_kell/Adobe Stock
I’ve relied on various authenticator apps for some time. For those that don’t know, an authenticator app is used to generate random codes used for two-factor authentication. How they work is simple: You install ... |
17.06.2022 | How to back up your Authy app | Image: madedee/Adobe Stock
Twilio’s Authy is a two-factor authentication app that uses a zero-trust approach to protect users against unauthorized access through compromised credentials and weak passwords.
It does this via an easy-to-use AP... |
08.05.2022 | How to use Authy: A guide for beginners | Image: David/Adobe Stock
It’s becoming more common for users to enable two-factor authorization when accessing their various accounts on the internet. The addition of 2FA over a simple password provides an increased layer of security and pr... |
12.01.2022 | HubSpot : The 12 Best Free (and Private) Email Accounts and Service Providers of 2022 | You need an email account - whether it's for networking, job recruitment, downloading resources, transferring files, setting reminders, meeting with colleagues, or something else.
Even with the rise of office chat platforms, you still depen... |
27.10.2021 | Securing your digital life, part two: The bigger picture—and special circumstances | Enlarge
ANDRZEJ WOJCICKI / SCIENCE PHOTO LIBRARY / Getty Images reader comments 200 with 107 posters participating, including story author
Share this story
Share on Facebook
Share on Twitter
Share on Reddit Securing your digital life
Securi... |
27.10.2021 | Securing your digital life, part two: The bigger picture—and special circumstances | Enlarge
ANDRZEJ WOJCICKI / SCIENCE PHOTO LIBRARY / Getty Images reader comments 132 with 78 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit Securing your digital life
Securing your digital life, par... |
10.08.2021 | How to reduce your organization’s security risk in 6 steps | Image: Andy Wolber/TechRepublic
“During the meeting, [name withheld] said their organization was hacked. Is there anything we should all do?” the email said. Apparently, unauthorized access to an email account allowed a thief to make a fina... |
27.05.2021 | How to enable SSH 2FA on AlmaLinux for more secure logins | Image: iStockphoto/Jirsak Must-read security coverage
Best encryption software 2022
The 10 best antivirus products you should consider for your business
8 enterprise password managers and the companies that will love them
Security incident ... |
06.04.2021 | Facebook Data Breach: Here’s What To Do Now | The phone numbers and email addresses of 533 million Facebook users have been exposed in a data breach. Here’s how to find out if your data was leaked, and how to secure your Facebook account. |
17.03.2021 | Lessons From the Nifty Gateway NFT Heist: Not Your Keys, Not Your Art | Nifty Gateway, the popular non-fungible token marketplace, issued a statement Monday that a small group of its users experienced “account takeovers.” Victims claimed they either had their NFT art stolen or NFTs purchased and then stolen, us... |
28.12.2020 | Top 5 ways to protect MFA codes | Someone wrote in, after seeing my Top 5 about avoiding using SMS for multi-factor authentication, and asked, “Do you have any suggestions on how to protect myself from getting locked out of my accounts if my phone disappears or dies?” Great... |
25.11.2020 | A Guide To Digital Privacy In The Era Of Covid-19 | Oleksandr Kosovan is a Ukrainian tech-entrepreneur, founder and CEO of MacPaw and Setapp. |
07.11.2020 | How to set up two-factor authentication on Amazon to protect your account data and payment information | Amazon offers two-factor authentication to secure your account. Thomas Barwick/Getty Images
You can set up two-factor authentication on Amazon to keep your personal info, credit cards, and transactions secure if someone gets your password.
... |
06.11.2020 | How to set up two-factor authentication on Amazon to protect your account data and payment information | You can set up two-factor authentication on Amazon to keep your personal info, credit cards, and transactions secure if someone gets your password.
Amazon refers to two-factor authentication as two-step verification, and you can find the se... |
06.11.2020 | How to set up two-factor authentication on Skype, and increase the security of all your Microsoft accounts | You can enable two-factor authentication for Skype by turning the security feature on in your Microsoft Account settings.
Two-factor authentication provides extra security by requiring you to enter a code from your phone or an app when logg... |
26.06.2020 | The 7 Tools That Every Remote Team Needs | Are virtual jobs the death of the office? No, just the evolution of it. The rise of remote means that our workplaces are being extended beyond brick and mortar buildings and are expanding as far as the internet can reach. In remote work, te... |
27.05.2020 | Choosing 2FA authenticator apps can be hard. Ars did it so you don’t have to | Enlarge
Aurich & Hannah Lawson reader comments 272 with 170 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
Last year, Sergio Caltagirone found himself in a tough spot. While traveling, his phon... |
25.03.2020 | Your Social Security Number Costs $4 On The Dark Web, New Report Finds | Social security and medicare concept with social security card and pile of money.Getty |
23.11.2019 | Now you can enable 2FA on Twitter without a phone number | There's a lot to be said for enhancing account security with two-factor authentication (2FA) but Twitter has long-insisted that this be done by handing over your phone number -- not something everyone is happy with.
But now the company has ... |
14.11.2019 | This App Will Tell You if Your iPhone Gets Hacked | A few years ago, Dan Guido’s partner couldn't log into her bank account via the bank’s official iPhone app. The app kept alerting her that her phone was not secure.
“Being a security guy, I freaked out,” said Guido, who is the founder of th... |
29.01.2018 | La Guía Motherboard Para Evitar Ser Hackeado | A finales del año pasado, publicamos una exhaustiva guía sobre cómo protegerse contra hackers y contra la vigilancia del estado.
La guía fue publicada en Inglés, pero hay muchos Americanos que no hablan Inglés. Hoy publicamos La Guía Mother... |
16.11.2017 | The Motherboard Guide to Not Getting Hacked, Part I | Editors note: This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces some of our old guides. It is also available as a printable PDF. It was last updated on November 14, 2017
One of the q... |
01.12.2016 | Encrypted email app ProtonMail introduces two-factor authentication | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
ProtonMail has finally introduced two-factor authentication (2FA) to its encrypted email service, meaning you can now make it harder fo... |
01.12.2016 | A beginner’s guide to beefing up your privacy and security online | Enlarge / Unfortunately, it's easier to stick a lock on the Brooklyn Bridge than it is to secure your data. We can at least try to help, though.
Andrew Cunningham reader comments 189 with 92 posters participating
Share this story
Share on F... |
21.09.2016 | Two-Factor Authentication: Methods and Myths | When I mentioned to a few friends that I was writing a feature about two-step authentication, the typical response was an eye-roll and "Oh, that annoying thing?..." Yes, that annoying extra step. We've all had that thought when we... |
09.11.2015 | Twitch finally adds two-factor authentication to boost livestreaming platform’s security | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Livestreaming platform Twitch has taken steps to further secure its service. The company announced that it has partnered with Authy to ... |
10.10.2015 | Introducing our GamesBeat Online schedule | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Above: Doki Tops, CEO of Utomik
Image Credit: Utomik
We’re going to keep our Twitch livestream going during break times at our GamesBea... |
08.10.2015 | Panel to explore the super-geek gaming future | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
Where is gaming technology going?
Above: Seamus Blackley of Innovative Leisure
We’ve had tantalizing glimpses of the future with demos ... |
07.10.2015 | Here’s one of our mystery speakers for GamesBeat 2015 | We’re revealing today that Sinjin Bain, CEO of Maxplay, will be one of our mystery guest speakers at GamesBeat 2015.
OK, so it’s not much of a mystery anymore. But Bain has an interesting company. And we’ve still got one more mystery speake... |
07.10.2015 | Here’s one of our mystery speakers for GamesBeat 2015 | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
We’re revealing today that Sinjin Bain, CEO of Maxplay, will be one of our mystery guest speakers at GamesBeat 2015.
OK, so it’s not mu... |
06.10.2015 | GamesBeat 2015 addresses how to play the branding game right | There’s been a mad rush into brands in the past year, thanks in no small part to the success of celebrity-branded Kim Kardashian: Hollywood, the mobile game from Glu. Niccolo De Masi, the chief executive of Glu, will talk about that in a fi... |
06.10.2015 | GamesBeat 2015 addresses how to play the branding game right | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn more.
There’s been a mad rush into brands in the past year, thanks in no small part to the success of celebrity-branded Kim Kardashian: Holly... |
21.08.2015 | Feature Friday: Password Reminder Popup | I use the Authy mobile app to serve up my 2-factor tokens when I need them. I’ve blogged about Authy before here at AVC so regular readers will be familiar with it.
Authy does something that I really like. Even though my password is stored ... |
19.05.2015 | Authy Launches Simplified Two-Factor Authentication | Authy, the two-factor authentication startup recently acquired by Twilio, announced its newest product at its parent company’s Signal developer conference today.
Authy’s new OneTouch authentication service makes two-factor authentication ab... |
02.03.2015 | Twilio Acquires Authy | Twilio, a San Francisco, CA-basee cloud communications platform company, acquired Authy, a provider of authentication as-a-service for large-scale Web and mobile applications.
The amount of the deal was not disclosed.
Led by Daniel Palacio,... |
26.02.2015 | Twilio adquiere Authy y Startcaps Ventures materializa su primera desinversión | 26/02/2015
TWILIO ADQUIERE AUTHY Y STARTCAPS VENTURES MATERIALIZA SU PRIMERA DESINVERSIÓN.
La firma de inversión en empresas en fase semilla Startcaps Ventures, ha desinvertido su participación en Authy, compañía especializada en la auten... |
24.02.2015 | Twilio buys two factor authentication company Authy | Authy will be embedded into Twilio applications, but also remain its own independent company
As we've all witnessed over the last few years, cyber security has gone from existential threat to something very, very real. Every week, it seems,... |
24.02.2015 | Twilio Acquires Two-Factor Authentication Service Authy | Twilio today announced that it has acquired Authy, a Y Combinator-backed startup that offers two-factor authentication services to end users, developers and enterprises. The two companies declined to disclose the financial details of the tr... |
26.12.2014 | Feature Friday: Password Management | I posted about The Interview last Thursday and the next morning I woke to a message from Facebook:
I can’t imagine the login attempt on my Facebook was in reaction to my blog post about The Interview, but as Andy Grove famously said “only t... |
06.11.2014 | Two-factor authentication service Authy reaches 1M users | Consumer two-factor authenticating service Authy just announced that it’s surpassed 1 million unique users.
That may not seem like a big deal, but it could point to a trend in the way consumers interface with the Web. Authy is a service tha... |
08.09.2014 | Authy Raises $2.3M To Help Prevent The Next Celebrity Hack | Hacking into poorly secured online accounts isn’t all that hard, as a few celebrities found out this week. One of the easiest ways to secure your accounts is by using two-factor authentication so that you have both something you know (your ... |
08.09.2014 | Two-factor authenticator Authy gets $3 million to help secure the web | While Apple was busy fielding media inquiries about a hack into several celebrity iCloud accounts, two factor authentication service Authy was finalizing a $3 million funding round.
“When I talk to big online services, many of them are tota... |
08.09.2014 | Authy Raises $3M |
SAN FRANCISCO, CA, Global leader in advanced authentication for cloud services, announces the completion of $3 million in financing.
>> Click here for more funding data on Authy
>> To export Authy funding data to PDF and Exc... |
28.04.2014 | Authy Brings Two-Factor Authentication To The Desktop | When you use two-factor authentication, chances are you are getting your second factor from a mobile phone app like Google Authenticator or Authy. This makes sense, given that you want to ensure that nobody who has access to your computer a... |
22.11.2013 | Feature Friday: Two Factor Authentication | With everything in the cloud now, it is important to protect your most sensitive information. I like two factor authentication for doing that. Bad people can steal passwords, but stealing your password and your phone at the same time is not... |
21.11.2013 | Authy Now Lets You Use Its Two-Factor Authentication System On Multiple Devices | Two-factor authentication is one of the most effective ways to keep your accounts safe, but it also means that if you ever lose your phone and don’t have access to a backup code, you won’t be able to read your email or sign in to your WordP... |
31.07.2013 | Authy Makes Using Two-Factor Authentication Easier By Connecting Your Phone And Mac Over Bluetooth | Authy, the Y Combinator-backed security startup that aims to make two-factor authentication as secure and easy to use as possible, launched a new product today that makes using it quite a bit easier. Authy now lets you connect your phone an... |
31.01.2013 | Authy Brings Two-Factor Authentication To Self-Hosted WordPress Sites (Updated) | If you run your own WordPress site, chances are you are using a pretty secure password to keep hackers from posting random stories to your blog. Still, even the best password isn’t as good as using Gmail-style two-factor authentication, but... |
28.11.2012 | CloudFlare Now Uses Authy’s Two-Factor Authentication To Keep Its Users Safe | CloudFlare, the popular website security and CDN service, suffered an embarrassing security breach earlier this year when the company’s CEO’s Gmail account was hijacked, giving the hacktivist group UGNazi access to a customer’s account and ... |
10.09.2012 | Social Fortress Is A Simple (But Powerful) Skeleton Key/Data Security Service For Your Digital Life | Georgia-based Social Fortress may have started out as a pet project to make communicating on Facebook more privacy-friendly, but over the past two years, its ambitions have grown considerably loftier.
After being bolstered by early positive... |
02.08.2012 | Y Combinator Backed Startup Authy Wants To Help You Prevent A Dropbox Style Security SNAFU | In response to a security breach, Dropbox promised to add an optional new layer of security known as two factor authentication. If you want to add two factor authentication to your own app but don’t know where to start, you’re in luck: Auth... |
02.08.2012 | Authy (YC W12) launches the simplest way to add Google-style two-factor authentication to your site or service | If you want to add two factor authentication to your own app but don’t know where to start, you’re in luck: Authy is a Y Combinator backed startup launching today that makes it easy to add optional two factor authentication to your applicat... |
- | Tecnocast 004 – Blogs brasileiros de tecnologia só copiam e colam? | Ser blogueiro de tecnologia no Brasil não é fácil – como ela não acontece aqui (na maior parte das vezes), nosso contato com os lançamentos e criadores acaba não sendo tão próximo quanto gostaríamos. Mas e aí, como contornamos isso? É verda... |
- | Como recuperar contas que usam o Google Authenticator após perder o celular | Toda a história começa quando meu celular cai na água e eu perco o aparelho. Sem salvação, migrei de um Android para o iOS, perdi muitos dados que recuperei com muita paciência. A coisa mais chata foi ter de volta o acesso a contas de redes... |
- | Como recuperar contas após perder o celular com Google Authenticator | Toda a história começa quando meu celular cai na água e eu perco o aparelho. Sem salvação, migrei de um Android para o iOS, perdi muitos dados que recuperei com muita paciência. A coisa mais chata foi ter de volta o acesso a contas de redes... |
- | Como ativar verificação de duas etapas nos principais serviços que você usa | A autenticação de dois fatores (também chamada de verificação em duas etapas) coloca uma camada de proteção a mais na sua conta, fazendo com que um hacker (ou qualquer outra pessoa) não consiga usar o seu login apenas com a senha. Neste pos... |
- | O que é e como usar autenticação de dois fatores | Se você é uma pessoa preocupada com a segurança das suas informações, provavelmente está usando o recurso de autenticação de dois fatores nas suas contas mais importantes, como no Gmail, Facebook ou Microsoft, especialmente com as notícias ... |