How to use Google 2-step verification with an older smartphone?
delia25 1 year ago
I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo. Apparently, you can only use 2-step verification with Android devices that are after 2.3 Gingerbread. I use the old phone as a WiFi only device and not as my main phone, but it will be pretty useless if I can't log on to Google accounts. Is there a way to use the old 2.2 phone with 2-step authentication?
Topic: SecurityAnswer this Question
Ask a question
The cybersecurity profession and its role in keeping the Internet safe is lost among young adults, who are therefore less likely to pursue a career in the field, a survey shows.
Don't think for an instant that once POS malware is defeated the first time, it's gone for good. These attacks have a habit of resurrecting themselves, with a lot of help from criminal hackers.
Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.
McAfee issues its annual list of the most dangerous people to search for online -- as in, you might get a virus if you do.
FireEye has detected Shellshock attacks against network-attached storage devices made by Taipei-based QNAP and used by universities and research institutes in Korea, Japan and the U.S.
The leader of the now-disbanded LulzSec hacking group directed members to attack targets in dozens of countries, including the U.K., Turkey, Brazil and Australia, even as he was serving as an FBI informant, according to a news report.
The Xen Project has revealed the details of a serious vulnerability in the Xen hypervisor that could put the security of many virtualized servers at risk.
The Joomla project pushed out new updates for its popular content management system Wednesday after a glitch was found in the high-priority security patches it released a day before.
Virtual private network servers based on OpenVPN might be vulnerable to remote code execution attacks through Shellshock and other recent flaws that affect the Bash Unix shell.
Günther Oettinger, the European Union's proposed Commissioner for the Digital Economy and Society, gave a disappointing performance at his confirmation hearing, dodging questions and calling the victims of a recent data breach "dumb."