Skip to main content

Enable 2Factor Authentication to protect your Email Account.

Retune.com - Email Security
Retune.com - Email Security
Your email address is the center of your security world. It is highly recommended that you enable Two-Factor Authentication to minimize risk of someone accessing your email through spear phishing attack, discover caches of passwords in your mailbox, and other related email attack. As an example, the attacker of DNC email uses a simple password reset request through spear phishing attack, was able to gain access to the email and password. If the Two-Factor Authentication is enabled, it will require another layer of security through verification code and stop it.



Two-Factor Authentication or 2-Step Verification adds an extra layer of security to your email account by requiring you to enter a verification code in addition to your username and password when signing into your email account. It help protect a user's account from unauthorized access should someone manage to obtain their password. Even if a password is cracked, guessed, or otherwise stolen, an attacker can't sign in without access to the user's additional verification. This verification can be in the form of codes which only the user can obtain via their own mobile phone.

Requirement. To use Two-Factor Authentication you need to have a mobile phone that can receive the verification code via text message or phone call. Other devices use the Google Authenticator mobile app to generate the verification code.

How to enable Two-Factor Authentication?
Retune.com - Cyber Security
Retune.com - Cyber Security
Using Gmail or white label domain name.
  • Login to your email, go to https://www.gmail.com, enter your email address and password.
  • Click your name icon (upper right corner), then click My Account
Google provided a detailed step-by-step procedure on how to enable it. You will see Security Checkup, click on Get Started and follow the steps.
  1. Check your recovery information.
  2. Check your connected devices
  3. Check your account permissions
  4. Check your app password. This is to create password for your MS Outlook or other email reader application.
  5. Check your Two-Factor settings

Have a safe computing experience.

Source: Que.com

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp