As I write this, the folks at LastPass recently announced that they saw unexplained traffic on their network and could potentially have seen some of their internal data compromised. It's important to note that no user accounts have been hacked, and no unencrypted user account information has been compromised.
However, to err on the side of caution, they are recommending that we all change our master passwords.
Here's how you do that.
Continue Reading: How do I change my LastPass master password?
I regularly hear from people who've had their email or other online account compromised, are able to recover access to it, and change their password, only to have the account stolen again almost immediately.
The problem is actually quite simple, but the solution is a bit of work.
First, you have to realize that while someone else has access to your account, they have access to everything related to that account.
As a result, changing your password just isn't enough. You need to do more.
Continue Reading: Is changing my password enough?
You're not alone.
Many people jumped at the Windows 10 icon when it appeared, thinking they would get Windows 10 immediately. In reality, of course, it's only a reservation for a download that will occur when the product is released.
Realizing this, and for a variety of other reasons, many people are electing to cancel the reservation and wait to get Windows 10 until sometime well after its release.
How to cancel is not obvious, and there's a bit of trick.
Continue Reading: How do I cancel my Windows 10 update?
Continue Reading: Are you ready to lose your phone?
The Ask Leo! Guide to Staying Safe on the Internet
- Ask Leo! #552 - Changing the default program, Subnet masks, Having fun with your tech, and more...
- How do I change the default program to open a file?
- What is a "subnet mask"?
- How do YOU use your computer for FUN?
Two factor authentication is a mechanism for verifying identity that relies on two different types of things, both of which must be correct, in order to allow access.
Traditionally authentication has been in the form of something you know: i.e. a password, and perhaps the accompanying answers to a set of security questions. Since this is simply based on knowledge (if you know your password you must be authorized to access this account) it's easily transferred from one person to another – intentionally or otherwise.
The most common form of two-factor authentication adds something you have to the requirements – you must prove that you are in possession of something specific, something that is completely unique to you and of which there is only one.
A popular implementation of this is in the form of key chain fobs or smartphone applications such as Google Authenticator which present a 6 digit number that changes every 30 seconds. That 6 digit number is generated by a cryptographic algorithm and is tied to your account in such a way that only your device has the correct number for your account at any point in time. Because the algorithm used to generate the number is based on a form of cryptography it's not possible to predict the numbers that would be displayed without the secret keys held by the authentication system.
You then simply "prove" you have your phone or key chain fob by entering the number displayed on it when requested.
Another factor that can be used is something you are, which typically boils down to facial recognition, fingerprint scanning or other biometric measurement.
While each can be used in isolation – something you know, something you have or something you are – as the very common "single factor authentication", requiring more than one increases security dramatically. While two-factor authentication naturally requires two, it's actually a subset of "multi-factor authentication" which can require two or more.
There have been SO MANY great responses to this posts, I'm going to have to collect some of my favorites into a separate post! Thanks everyone! :-)
And why is so important to them to have your phone number,that they deny their services because you don`t want to give it to them?
call me paranoid ,but they indeed have an agenda
IMO: Their "agenda" is keeping your account secure.
How do I get into my Hotmail/Outlook.com account if I don't have the recovery phone or email any more?
From past two years I have not used and now I want to open my hot mail account. Its telling could not recognise please help to recover my account.
Two years is too long. It's probably been closed and cannot be recovered.
More Ask Leo!
Need more help with or have questions about the newsletter? Check out the newsletter administration page.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2015,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC