<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d8211560\x26blogName\x3dTech+Tips,+Tricks+%26+Trivia\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://mvark.blogspot.com/search\x26blogLocale\x3den\x26v\x3d2\x26homepageUrl\x3dhttp://mvark.blogspot.com/\x26vt\x3d-5147029996388199615', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Tech Tips, Tricks & Trivia

by 'Anil' Radhakrishna
An architect's experiments, little discoveries and annotated bookmarks.

Search from over a hundred HOW TO articles, Tips and Tricks


List of online services that offer 2-Step Verification

"..all you data from “smart” devices could be accessible from internet,which is the  place of  anarchy.."

Apple has acknowledged that computer hackers broke into the accounts of several celebrities and advises all users to always use a strong password and enable two-step verification. It turns out two-factor authentication may have not entirely protected anyone in this case. The criminals apparently used ElcomSoft, a law enforcement tool(!), to expedite the extraction of information from iCloud backups, not protected by two-factor. Being paranoid is probably a good thing to get used to.

As the Internet evolves, there will probably be a security hack for every deterrent that the good guys enforce. Two-step verification can be one of many checks that regular users can make use of to ward off evil hackers.

Josh Davis maintains a list of websites that offer 2-Step Verification that you should check if you don't want to lose critical information to hackers.

(Similarly, MyPermissions.org is a site that makes it easy to track which Apps you've subscribed to via social logins & the permissions granted to them. If you see any apps playing mischief, this site can lead you to direct links where you can control the permissions.)

Google was one of the first Internet companies to introduce a two-step verification process. This Google site explains how it works and why you need it.

Their implementation takes care of the case when a mobile may go down and offers alternatives:

Labels: ,

Tweet this | Google+ it | Share on FB

« Home | Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »
| Next »

»

Post a Comment