Google rolls out 007-style ‘two-step verification’ security

google rolls out 007 style two step verification security accounts

Many of us go about our day, logging into online accounts from home, work, the library, the Apple store, and wherever else in order to read that inspirational story Mom e-mailed us about a kitten befriending a dog, and everything is hunky dory. Someone, on the other hand, is currently becoming the person you read about who had their password stolen, and their bank account hacked using the information they e-mailed themselves “that one time.” (Almost two thirds of all Americans have been affected, according to a study from Internet security giant Symantec. This type of digital information theft is easier than many of us realize.)

Security concerns have grown steadily over the last several years as users continue to put more and more private data behind the security vault door that is a Google account login. But perhaps these concerns are finally being laid to rest. Google is rolling out a new solution for those desiring additional protection that will make Google as the Alfred to your Bruce, the M to your James, the home base secret-keeper to your mobile, private data-accessing lifestyle.

You can now activate a “two-step verification,” which will will require you to login with your username and password as usual, and then, on a second page, fulfill a request for a verification code before admitting you to your account. This verification code, randomly generated by Google, is only valid for the few seconds while you are completing the login process, and provided to you upon your request. Anyone who steals your password, or even this secret code, will not be able to login to your account later and steal all of the details of your “girls night out” planned for next Thursday night.

google rolls out 007 style two step verification security authenticatorGoogle is providing a variety of ways for you to obtain this temporary password. According to a beta tester at over at TechCrunch, you can request it via a new mobile app called Google Authenticator (for your Android, iPhone, or Blackberry), text Google for it, or have them company call you. You can also authenticate a second phone if you lose access to your primary one, or use a pre-printed list of one-time use passwords (which you will inevitably keep hidden in the sole of your shoe), if you need a fail-safe backup.

To ease the burden of this process for the numerous times a day you access your Google account, you can input a one-time authentication code for devices you use all the time. A little trickier is the requirement to generate and store app-specific pass-codes for programs like Apple Mail and iCal, which often automatically login to your Google account and regularly pull down new data for your preferred method of interface.

We’ve been on the old username-and-password system for some time now, but this new, second-tier authentication approach is starting to spread. You may have seen it on bank websites, with their periodic prompt of security questions, or a “call and answer” system with unique images tied to your account, so that you can verify the page you’re on before inputting your password. You may even have received a portable, random password-generating key fob for your corporate or securities-trading account. Yahoo has taken steps to protect users by helping team them up with Norton’s Internet Security product.

We can’t say your information is now invulnerable, but Google, as usual, has taken another promising step towards solving a big consumer problem. Google’s Accounts Help Center has details on how to get your own Google account set up with two-step verification.

Product Review

Ring Alarm makes DIY home security simple and affordable enough for everyone

Ring first made waves with its video doorbell, and now the Amazon-owned company is moving on to home security with the Ring Alarm. You can install the sensors and keypads yourself, then have Ring professionally monitor your home.
Smart Home

Ward off porch pirates with the best outdoor security cameras

Worried about porch pirates stealing your packages, or intruders entering your home? Always be in the know about who or what is on your property by installing one of these outdoor security cameras.
Computing

Lost your router? Here's how to find its IP address to help track it down

Changing the login information for your router isn't always easy, that's why so many have that little card on the back. But in order to use it, you need to know where to go. Here's how to find the IP address of your router.
Computing

These are the worst passwords of 2018. Is yours on this list?

Do you use a bad password that makes your online accounts easy to break into? SplashData has compiled a list of the top 100 worst passwords for 2018 and there are quite a few listings that were carryovers from prior lists.
Computing

Change your mouse cursor in Windows with these quick tips

The standard mouse cursor is boring, so change it! With this guide on how to change your mouse cursor in Windows, you can choose to use one of Microsoft's pre-installed cursors or download something a bit more extravagant.
Gaming

The DualShock 4 is one of the best controllers ever, and you can use it with a PC

Sony's new DualShock 4 controller has become a fan favorite, and some people want to use it with a PC. Here's how to connect your DualShock 4 and start using it, either with an official adapter, or unofficial software.
Computing

Intel’s 28-core monster Xeon CPU might cost upwards of $4,000

Intel's new-generation 28-core Xeon CPU will debut with a hefty price tag. Although not quite as expensive as some of its predecessors, early pre-order pricing has it costing between $4,000 and $5,000.
Computing

MacBook Pro battery replacement: Everything you need to know

Looking for a new battery for your MacBook Pro? It's important you know what to look for, what model you have, and what options Apple gives you! We'll cover everything you need to know about Apple MacBook Pro battery replacement.
Computing

Acer Swift 7 vs. Apple MacBook Air

The Acer Swift 7 accomplishes its goal of being the world's thinnest notebook, and it's well-built to boot. But is that enough to take on the Apple MacBook Air in terms of being the better to actually use?
Computing

Asus ZenBook 14 UX433 vs. Dell XPS 13

The Asus ZenBook 14 UX433 has some incredibly tiny display bezels, in an effort to jam a 14-inch notebook into a 13-inch chassis. That pits it against the Dell XPS 13, the icon of small clamshells.
Computing

Lenovo’s first ThinkPads with Intel Whiskey Lake processors to arrive this month

Lenovo has opted not to wait for CES 2019 next month to introduce the first ThinkPads with Intel's Whiskey Lake Core I5-8265U and Core i7-8565U processors. They will arrive onboard the new ThinkPad L390 and L390 Yoga.
Computing

LG’s new monitor gives you screen space galore without hurting your wallet

LG's new 32-inch display could be your next great upgrade. For $350, it offers the complete package of high resolution, high refresh rate, and 32 inches of screen space. What more do you need?
Product Review

It's not just light. Alienware's m15 is an entirely new breed of gaming laptop

Thin and light gaming is a new category of laptop, led by options like the Razer Blade. Alienware now has its own entry -- The Alienware m15. It’s not the thinnest, lightest, or sleekest option in the bunch, but it doesn’t hold back in…
Computing

PewDiePie supporters hack printers, hope to boost his subscription numbers

In an attempt to garner more subscribers for their favorite vlogger and secure his status as having the most YouTube subscribers, PewDiePie supporters claimed to have hacked thousands of printers worldwide.