Fast forward to today, when Apple has included the M7 chip in the iPhone 5S, with its sole purpose being to track the movement of the device. Moves was recently updated to take advantage of this addition to the iOS hardware, and the price went from … Read more
To get a truly flexible phone, you'd need a flexible battery, right?
LG thinks so. That's why it's unveiling the first of its kind series of bendable or modifiable batteries. The company announced Tuesday that its LG Chem branch was successful in creating three new types of batteries -- curved, stepped, and cable.
The curved battery is said to be able to fit in smartphones, smartwatches, and smart glasses. LG Chem said it has patented a "stack and folding" technology, which is crucial for getting the batteries to power a curved screen or flexible design. … Read more
Two months after introducing two-factor verification to its Premium account users, Evernote has made it available for all users. With this security feature enabled, you will need to enter your password along with a verification code sent to your mobile phone in order to log in to your account. What this means is that if someone gets a hold of your Evernote password, this nefarious individual would also need to be in possession of your phone to access your data.
The M7 coprocessor in the iPhone 5S is a fancy name for a chip that counts your steps and motion all day, every day. In order to see how many steps you've been taking, you'll need to use an app specifically built for the iPhone 5S and the M7 chip.
While we wait for more developers to integrate the M7 and the stats it keeps into apps, there are currently five apps available that have already integrated with the motion tracker. Here they are in no particular order.
One of the annoyances with any iOS upgrade or new iPhone purchase is signing back into apps that require you to be logged in to work. Most of the time, this is a simple process of remembering or looking up a password, entering it, and going about your day. If you tried signing into your Gmail account via the Mail app, however, you may have encountered this screen:
And after you carefully re-entered your password, making sure it was keyed in correctly, you again were met with the above note.
And after throwing your hands up in frustration, hopefully you … Read more
Now users have the option to approve log-in requests more directly via their mobile device, instead of relying on a text message containing a short code.
After updating you'll need to launch the app and head to the Settings page. On iOS, … Read more
Two-step verification can help thwart malicious attacks against your online accounts. Anyone trying to break into your account would need both your password and the mobile device that authentication codes are sent to in order to gain access.
Google has done a splendid job of providing options for those who are interested in setting up this extra security measure: you can get text alerts, or you can use Google's authenticator app, available for Android, BlackBerry, and iOS.
When using the app as your method of authentication code delivery, you may wonder what happens when you want to retire an … Read more
A lot of companies on the Web are providing support for secondary authentication. Some do this with apps like Google Authenticator, while others just use SMS. Essentially, both methods provide you with a security code that you need to enter in order to log in.
LinkedIn has joined the two-step verification trend, using SMS as the delivery method for codes. Here's how you set it up:
Step 1: Log in to your LinkedIn profile. Click your user picture/avatar in the upper-right-hand corner and select Settings.
Step 2: On the tabs along the bottom-left-hand side, click Account. Then, click … Read more
Setting up a two-step verification (or authentication, depending on the site) service is more or less an imperative when it comes to keeping your online information secure. Services such as Google, Facebook, Twitter, Apple, Dropbox and more have rolled out two-step verification in one form or another.
During the setup process for these services, you are required to provide a phone number where you'll have the option to receive a six-digit code that is required to grant you access to your account. But, as a recent Forbes article pointed out, phones get lost, which can in turn lock you … Read more
Going a week without a major brand having its Twitter account compromised was starting to become a rare occurrence. Critics and users alike repeatedly called upon Twitter to release two-factor (or step) authentication. The added layer of security requires you to enter your password, and then a subsequent six-digit access anytime you try to log into Twitter. The short code is sent via text message to your cell phone, which means that any would-be hackers would need to not only crack your password, but to also have physical possession of your cell phone.