Logitech Bluetooth Audio Adapter
Lenovo Vibe X2
Microsoft Lumia 730
Martian Notifier smartwatch
Motorola Moto 360
How offline retailers can make a comeback
6 important takeaways from Google's study on e-commerce in India
Android Lollipop vs KitKat on Nexus 4
Nokia N1 Android tablet: All you need to know
Moving ahead with Microsoft Azure
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
NotCompatible: New malware threat for Android devices
Xiaomi readies the Redmi Note for Dec 2 launch, announces a contest
100 OnePlus One India invites up for grabs via contest
Xiaomi to launch smartwatches next year?
Twitter now lets you send private tweets
Alcatel One Touch Flash
Celkon Millennia Epic Q550
Karbonn Titanium S12 Delite
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
iPhone 5S vs iPhone 6 Showdown
Samsung Galaxy Note 4 - The best phablet today
Digit's 11 hi-tech tests that gadgets fear
4 Android features erased by Lollipop update
5 great Android games launched this month
The 5 most underrated and under-hyped smartphones of 2014
5 great Android apps launched this month
The 5 most overrated and overhyped smartphones of 2014
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
Peer to Peer Connection in AndroidHow to setup the peer to peer connection between two Android devices
Click to know more
In light of the recent Twitter hack, the social networking site has announced all intentions to beef up its security and put in place a two-factor authentication system, according to a new job posting put in place on behalf of the site.
A few days ago Twitter had announced that it had detected a breach in its system. Since it could not ascertain the extent of the breach, Twitter has gone ahead and reset the acocunts of the 250,000 users along with revoking all security tokens. However, some users are reporting being able to access their Twitter accounts via third party apps with their old password, meaning that Twitter has not revoked the OAuth tokens.
Twitter is taking this breach quite seriously as a new job posting for a a new worker to increase security by implementing two-factor authentication. Two-factor authentication will make it nearly impossible for hackers to gain access to accounts even if they know the password. Two-factor authentication involves the use of at least two forms of authentication (from three) such as a password, a physical token of sorts and biometrics.
Obviously, while this would be a serious beefing up of security, one can't help but wonder how Twitter would go about implementing this. While a password is something universal, will Twitter be issuing physical authentication tokens to each one of its users or will they instead employ biometric? It is important to note that not every user has access to a fingerprint scanner or a webcam on their machine.
While Twitter might not implement this new measure for all users, it could do so for corporate and celebtrity accounts on a paid basis, or just make this feature available to anyone who chooses to pay for it. Regardless of how Twitter implements this, it is nice to see someone taking security seriously.