
Is Google Authenticator irreplaceable?
How authenticator apps work and what alternatives there are to Google Authenticator.
632 articles
How authenticator apps work and what alternatives there are to Google Authenticator.
Scammers are cashing in on the PlayStation 5 shortage. Here’s how to avoid their bait.
How attackers hunt for Battle.net accounts in World of Warcraft, aiming to get valuable content.
One short message is enough to send a Sony PS4 into an infinite restart loop. Here’s how to deal with it.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.
At the recent I/O 2016 conference Google announced Android N, Wear 2.0, new messenger Allo, voice assistant Google Home, and a laundry list of other tech miracles. What about security?
A serious zero-day has been disclosed in Unity Web Player. We provide a full breakdown of what it means and how you can protect yourself.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
As part of its Project Zero security initiative, Google disclosed a few vulnerabilities in Windows, some ahead of a planned patch. Google simply adhered to its “publicize in 90 days after private vendor disclosure” policy, but where are end users’ interest in this “game of flaws”?
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
Google provides some pretty strong security controls like two-factor authentication in order to prevent hackers from hijacking your account and other controls that allow you to recover your account in
A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form of a
Google Glass was among the main attractions at the Mountain View, California search giant’s developer-centric I/O conference in San Francisco last week. We had high hopes that Google would address
If we’re to believe all the headlines this week, then it appears that the one-time search giant Google has finally shipped off developer-models of Google Glass – their oft-mocked, thoroughly
BlackBerry’s preeminent Z10 smartphone (and other devices running the BlackBerry operating system beyond version 4.5 for that matter) has a feature built-into its messaging service called “Show What I’m Listening
If you still think that Steam, Google Play, and the App Store are malware-free, then read this fascinating story about PirateFi and other hacker creations disguised as games.
Our Android apps are no longer available on Google Play. We explain how to download, install, and update them by alternative means.
Our products are no longer available on Google Play. We explain why this happened, and how to install or update our apps for Android.
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.