Microsoft Announces Two-Factor Authentication For Online User Accounts

This new and optional feature will roll out to all Microsoft accounts over the next few days. The two-factor authentication works very much like the two-factor authentication schemes being used today in other Microsoft products making it familiar to most users. Besides your usual password, you will also need a second piece of information which can be a short code. For the user to obtain the codes, Microsoft also launched their own Authenticator app for Windows Phone, but the company also notes that “there are excellent authenticator apps that already exist for those platforms and are compatible with Microsoft account two-step verification. Read the full story right here.



Comments

  • A fair double take on adidas

    Posted by Updatatweda on 05/05/2013 09:07pm

    E [url=http://www.adidaskutuja.com/]アディダス スニーカー[/url] qgPmg TmqMas GmjEta WeaR [url=http://www.adidaskutuja.com/adidas-originals-c-4.html]アディダス ランニングシューズ[/url] wuBecUth YxsCevLkfE [url=http://www.adidaskutuja.com/adidas-superstar-c-2.html]アディダス スタンスミス[/url] ev EfnLgh [url=http://www.adidaskutuja.com/jeremy-scott-c-5.html]アディダス 通販[/url]RcpJrc TsdNbu

    Reply
  • A powerful double strain on adidas

    Posted by Updatatweda on 05/05/2013 08:58pm

    X [url=http://www.adidaskutuja.com/]アディダス スニーカー[/url] xdGhb IchPbp AzgAkd HxgD [url=http://www.adidaskutuja.com/adidas-originals-c-4.html]アディダス ランニングシューズ[/url] ecTeoOsn KohFdbGlqE [url=http://www.adidaskutuja.com/adidas-superstar-c-2.html]アディダス シューズ[/url] py CtbJec [url=http://www.adidaskutuja.com/jeremy-scott-c-5.html]adidas jeremy scott[/url]WndWnd WlaHyu

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • How to Select, Design and Implement a Virtual Contact Center What is a Virtual Contact Center? A Virtual Contact Center (VCC) is a cloud-based call center that delivers call routing, interactive voice response (IVR), and computer telephony integration (CTI); empowering your business to create optimal customer experiences (CX). This eBook will help you decide if a VCC is right for you by covering the following: A Needs Assessment Implementation and Productivity VCC Strategy Use Cases Are you ready to …

  • As the threat landscape for data breaches continues to advance in both volume and sophistication, businesses must mature their security strategies to confront and hopefully outpace these new challenges. Unless changes are made to existing security protocols, it's only a matter of time before security barriers are penetrated and valuable data is lost. While there is no silver bullet to ensure complete protection from data breaches, read this Forrester thought leadership paper to learn the four key steps to …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date