Printed from http://www.electronista.com

Evernote adds two-step authentication, access management to accounts

updated 02:18 pm EDT, Thu May 30, 2013

Bolstered security follows large-scale attack on Evernote servers

Evernote has added three new security features to help its users keep their accounts safe. The inclusion of two-step authentication, access history, and authorized app management comes two months after the note-taking service suffered an attack by hackers, which forced the company to reset all passwords for its near 50-million user base.

The authorized applications list in the account settings will list all applications that have access to the Evernote account, and will allow the user to revoke access at any time, forcing the account password to be re-entered the next time it is used. The access history page will show a running list of all times the Evernote account has been accessed in the last 30 days, including IP addresses and estimated location, which the company blog states will help prove if an account is accessed without the account holder's knowledge.

The third item, two-step verification, is available to Evernote Premium and Evernote Business users at the moment, and will not be usable by free Evernote users until the service feels "comfortable with our ability to support a wide audience." Users can choose to have a six-digit code sent to their mobile phone over SMS, or use an app such as Google Authenticator, which must be entered in order to log in. Third-party applications that connect to the Evernote account will still be able to access once an Application Password has been created specifically for it within the account management system.

The additional account security measures by Evernote is the latest in a long line of similar maneuvers by tech companies. Microsoft, Twitter, and Apple have all activated two-step authentication in recent months, and it is likely that other large services will bolster their security processes in the future.



By Electronista Staff
Post tools:

TAGS :

toggle

Comments

  1. daqman

    Junior Member

    Joined: 09-15-00

    It's "Two Factor" not two step. Depending on which method you chose there can be many steps, for example launching google authenticator and copying the code from one device to another. It sounds pedantic but "two step" makes it sound a bit easier than it really is.

    There was a "Catch 22" in the setup of Google authenticator. I was reading the setup webpage on my iPhone and the instructions included a QR code and the text "scan this code with your iPhone, a bit tricky that. Maybe I could use two mirrors?

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

Sponsor

Recent Reviews

Linksys EA6900 AC Router

As AC networking begins to makes its way into more and more devices you may find yourself considering an upgrade for your home network ...

D-Link DIR-510L 802.11AC travel router

Having Internet access in hotels and other similar locations used to be a miasma of connectivity issues. If Wi-Fi was available, it wa ...

Ooma Office small business VoIP

Voice over IP (VoIP) services have been around for a very long time. Only recently has the implementation become a bit more robust, al ...

Sponsor

toggle

Most Commented

 
toggle

Popular News