| Cult of Mac

Google now lets you use iPhone as a physical security key


A group called Google You Owe Us wants $1000 each after Google invaded their privacy
Your iPhone is now a physical 2FA key.
Photo: Ed Hardy/Cult of Mac

Google is finally letting iPhone owners use their device as a physical two-factor authorization security key for Google services thanks to a new update to the Google Smart Lock app for iOS.

The new feature uses the iPhone’s Secure Enclave to store private keys. Now, instead of having a 2FA code texted to you, Google can send it over Bluetooth, making your accounts less vulnerable to phishing attempts and other hacks.

How to use Instagram’s new secure two-factor login


Here is yet another lazy photographic metaphor for computer security.
Here is yet another lazy photographic metaphor for computer security.
Photo: Jon Seidman/Flickr CC

Instagram has finally added proper secure authentication to its iPhone app. Previously, you could have Instagram send you a one-time login code via SMS every time you signed in. But SMS isn’t secure, making it relatively easy for people to hijack.

Now, you can use your favorite authenticator app — Google Authenticator, for instance — to generate a one-time code any time you need to sign in to Instagram.

How to bag a free Fortnite emote and stop hackers


Fortnite Boogiedown emote
Everyone should be using 2FA to protect their Fortnite account.
Photo: Epic Games

Epic Games is giving Fortnite players even more of a reason to enable two-factor authentication by offering up a free emote. It won’t take you long to claim yours, and it’s the easiest way to prevent hackers from stealing your account.

Facebook two-factor authentication no longer needs a phone number


Facebook two-factor authentication
You can now make Facebook more secure without handing over your number.
Photo: Facebook

You can now secure your Facebook account with two-factor authentication without handing over your phone number.

The social network now works alongside apps like Google Authenticator, Duo Security, and more. Its setup process has also been refined to make bolstering security a simpler experience.