#authentication

[ follow ]
#cybersecurity
fromIT Pro
1 month ago
Privacy technologies

The NCSC wants you to start using password managers and passkeys - here's how to choose the best options

fromZDNET
1 month ago
Privacy technologies

Facebook's new passkey support could let you ditch your password once and for all

fromIT Pro
1 month ago
Privacy technologies

The NCSC wants you to start using password managers and passkeys - here's how to choose the best options

fromZDNET
1 month ago
Privacy technologies

Facebook's new passkey support could let you ditch your password once and for all

#passkeys
fromZDNET
1 week ago
Privacy technologies

Syncable vs. non-syncable passkeys: Are roaming authenticators the best of both worlds?

fromZDNET
1 month ago
Privacy technologies

How passkeys work: The complete guide to your inevitable passwordless future

fromTechCrunch
1 month ago
Privacy technologies

Facebook will soon roll out support for passkeys on Android and iOS | TechCrunch

Privacy technologies
fromZDNET
3 months ago

If we want a passwordless future, let's get our passkey story straight

Passkeys provide a seamless, memory-free authentication method intended to replace traditional passwords.
Privacy technologies
fromZDNET
3 months ago

Why the road from passwords to passkeys is long, bumpy, and worth it - probably

Passkeys are being adopted to replace passwords but face barriers to user understanding and seamless implementation.
Transitioning to passkeys necessitates a strategic approach due to existing complications.
fromZDNET
1 week ago
Privacy technologies

Syncable vs. non-syncable passkeys: Are roaming authenticators the best of both worlds?

fromZDNET
1 month ago
Privacy technologies

How passkeys work: The complete guide to your inevitable passwordless future

fromTechCrunch
1 month ago
Privacy technologies

Facebook will soon roll out support for passkeys on Android and iOS | TechCrunch

Privacy technologies
fromZDNET
3 months ago

If we want a passwordless future, let's get our passkey story straight

Passkeys provide a seamless, memory-free authentication method intended to replace traditional passwords.
Privacy technologies
fromZDNET
3 months ago

Why the road from passwords to passkeys is long, bumpy, and worth it - probably

Passkeys are being adopted to replace passwords but face barriers to user understanding and seamless implementation.
Transitioning to passkeys necessitates a strategic approach due to existing complications.
fromTheregister
1 week ago

Antivirus vendors fail to spot persistent Linux backdoor

The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system authentication and gain persistent SSH access.
Information security
fromESPN.com
2 weeks ago

Sneakers from Kobe's first start sell for $240K

An autographed pair of Adidas EQT Top 10 shoes worn by Kobe Bryant during his first Lakers start sold for $240,000, making it the second highest price ever for his sneakers.
LA Lakers
fromThe Hacker News
3 weeks ago

Kerberoasting Detections: A New Approach to a Decade-Old Challenge

Kerberoasting attacks utilize weaknesses in the Kerberos authentication process, evading detection due to brittle mechanisms.
#data-security
fromZDNET
1 month ago
Privacy professionals

How passkeys work: Do your favorite sites even support passkeys?

fromZDNET
1 month ago
Privacy professionals

How passkeys work: Do your favorite sites even support passkeys?

E-Commerce
fromstupidDOPE | Est. 2008
1 month ago

Bezel Redefines How to Buy and Sell Luxury Watches with Confidence and Speed | stupidDOPE | Est. 2008

Bezel revolutionizes luxury watch transactions through expert authentication, transparency, and a curated marketplace experience.
fromTechCrunch
1 month ago

Better Auth, an authentication tool by a self-taught Ethiopian dev, raises $5M from Peak XV, YC | TechCrunch

I remember needing an organization feature. It's a very common use case for most SaaS applications, but it wasn't available from these providers. So I had to build it from scratch.
European startups
Ruby on Rails
fromRubyflow
1 month ago

Introducing Veri - Minimal Cookie-Based Authentication for Rails

Veri is a minimalistic Rails authentication framework prioritizing granular session management and customization.
#facebook
fromHackernoon
1 year ago

6 Login Methods Every Developer Should Know | HackerNoon

Understanding different authentication methods is crucial for web app security and user verification.
fromPythonbytes
1 month ago

Slow tests go last

In episode 436 of Python Bytes, the hosts discuss the importance of social media engagement, live streaming, and the benefits of using PropelAuth for app authentication.
Python
Apple
fromArs Technica
2 months ago

Coming to Apple OSes: A seamless, secure way to import and export passkeys

Apple's new feature aims to enhance passkeys' transferability across devices, addressing a significant limitation of current passkey systems.
fromRaymondcamden
2 months ago

Working with the Mastodon API in BoxLang

Using the Mastodon API for social media automation is straightforward, requiring just an access token and server information.
fromRaymondcamden
2 months ago

Working with the Bluesky API in BoxLang

To authenticate with Bluesky, use your username and password via environment variables, validating them before sending a POST request to the createSession endpoint.
Node JS
fromHackernoon
2 months ago

Encrypted Key Recovery via Social Trust Models | HackerNoon

The proposed backup method incorporates the roles of chosen trustees who assist in recovering the owner's private key, enhancing the security against adversarial threats.
Information security
fromZDNET
2 months ago

A security key for every employee? Yubikey-as-a-Service goes global

Yubico's Yubikey-as-a-Service expands access to secure authentication, now available in 175 countries, enhancing logistical support for enterprises globally.
European startups
fromRubyflow
2 months ago
Ruby on Rails

Sign in with Apple for Rails apps

OAuth reduces account creation friction; implementing Sign in with Apple is crucial for app compliance and user experience.
Startup companies
fromHackernoon
3 months ago

Tesseral Raises $3.3M Seed to Bring Open Source Auth to B2B Software | HackerNoon

AI accelerates B2B software development, yet security requirements are rising, prompting the need for robust authentication solutions like those offered by Tesseral.
fromComputerWeekly.com
3 months ago

UK government websites to replace passwords with secure passkeys

Passkey technology will replace traditional passwords for UK government digital services, enhancing security and user experience.
fromLogRocket Blog
3 months ago

Authentication and authorization in Astro - LogRocket Blog

Astro's architecture presents unique authentication challenges compared to traditional frameworks, requiring manual handling for static and dynamic interactions.
fromThe Hacker News
3 months ago

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Identity systems face vulnerabilities beyond traditional authentication methods, necessitating comprehensive lifecycle protection.
Attackers increasingly use social engineering and advanced technologies, like deepfakes, to compromise identity systems.
fromThe Hacker News
3 months ago

Why NHIs Are Security's Most Dangerous Blind Spot

Non-Human Identities (NHIs) present a significant and neglected threat in cybersecurity beyond traditional user credentials.
fromEngadget
3 months ago

Bluesky is getting blue checkmarks and an official verification system

Bluesky is adopting an official verification system, granting blue checkmarks to "authentic and notable" accounts, a significant shift from its previous stance on verification.
Chelsea
[ Load more ]