Mobile Devices Key To Facebook’s New Log-In Approval Feature

Facebook is implementing a new opt-in, two-factor verification security feature they are calling log-in approval.

Facebook is implementing a new opt-in, two-factor verification security feature they are calling log-in approval.

The new feature will require users to enter a unique, one time code, which Facebook will send via SMS whenever a user tries to access his or her account from a new and/or unrecognized computer. After entering the code, Facebook account holders will have the option of establishing that device as a trusted log-in location so that they won’t have to endure two-factor verification every time they log-in.

This is the social networking behemoth’s latest move to bolster security as it faces an increasing threat from online scammers. It follows an announcement in April of a raft of new strong authentication features, including an opt-in https feature to prevent snooping on Facebook sessions.

Still, the wildly popular social network has continued to be inundated with various spam and click-jacking scams whenever anything even remotely significant occurs, whether it is a natural disaster, royal wedding, or the deaths and/or assassinations of a high profile individuals.

The new, two-factor authentication feature will provide warnings to users In the event that there is a log-in attempt from an unrecognized device, helping to prevent account hijacking. Users who lose or do not have access to their mobile device will be unable to access  their Facebook account until they return to a recognized computer and disable the two-factor feature.

Google implemented a similar secure authentication feature for users of Gmail in February, 2011. 

Suggested articles


  • Anonymous on

    what defines new/un-recognised computer - a new MAC, IP, etc ?

    hopefully not just an IP - VPN and a buggy dynamic home connection would drive me insane each login...

  • Anonymous on

    Rustock operators can create a similar botnet by retaking control of those infected computers, but according to Kaspersky Lab research, this has yet to occur. protocol on Windows  officials and industry leaders.mostly in China and the U.S., but Cheap Air Max also in Hong Kong and Singapore as well. The  Air Max 2011 victims include the gaming sites and online stores Air Max Tailwind common targets of DDOS attacks, which are used to knock the sites offline and extract protection payments from site operators.Air Max 24-7 But JKDDOS is also targeting large investment firms,

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.