Skip to main content

Yahoo Introduces Second Sign-in Verification

After Gmail, Hotmail and Facebook, Yahoo is adopting two factor authentication to protect users from account hijacks where the attacker gains access to the victim’s account using stolen password. When a Yahoo account is protected by the new Second Sign-in Verification feature, a mobile phone number is associated with the account through which the user has to verify his or her identify before it can login to their account. This prevents a hacker from gaining entry into the victim’s Yahoo account even if the password is compromised.

yahoo-Second-Sign-in

To enable second sign-in verification, login to your yahoo account and go to your Yahoo Account Info. Under Sign-In and Security, you can find the Second Sign-in Verification link. Click on it and follow the steps during which you will required to add your mobile phone number and subsequently verify it by entering the confirmation code sent to your cell phone by SMS.

Once the feature is turned on, any suspicious account sign-in attempt will be challenged by a second sign-in verification beyond the initial password validation. To confirm the legitimacy of the sign-in attempt, you or the hijacker will have to answer your account security question or enter a verification code that will be sent to your mobile phone. Only the legitimate user with access to the mobile phone can sign in. Account hijackers will be blocked since they neither know your security answer nor possess your mobile phone.

This feature is currently being rolled out users residing in the United States, Canada, India, and the Philippines. The rest of the world can expect to have it by March 2012.

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: