Authentication with one-time codes: pros and cons
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
57 articles
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
How authenticator apps work and what alternatives there are to Google Authenticator.
And more importantly — how to stop your passwords from being used by cybercriminals.
We review a recent study on biometric authentication that uses breath analysis.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
Examples of the cybersecurity technologies and practices of Durin’s folk abound in Tolkien’s Middle-earth.
Want to teach your kid the concept of cybersecurity? Start with Transformers: War for Cybertron Trilogy.
A complete guide to security and privacy settings for your Battle.net account.
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
What to do if an account is hijacked: How to minimize damage, restore your Digital Comfort Zone, and avoid getting bamboozled.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
Your online finances need proper protection. Learn how to secure your PayPal account.
A brief but comprehensive guide to security and privacy on the world’s most popular gaming platform.
Dave and Jeff discuss the EU’s response to Facebook’s pleas for regulation, ransomware shutting down a US energy company, Ring requiring 2FA, and more.
We analyze the fairy tale The Wolf and the Seven Young Goats in terms of cybersecurity