#ephemeral-credentials

[ follow ]
#identity-management
Information security
fromThe Hacker News
3 weeks ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
SF politics
fromWIRED
1 day ago

A DOGE Affiliate Is Now in Charge of the US Government's ID Platform

Greg Hogan will oversee Login.gov, aiming to grow its userbase and establish it as a world-class identity platform.
Privacy technologies
fromCNET
1 day ago

The Tools That Convinced Me to Take Browser Security More Seriously

Online platforms collect extensive data about users, often through cookies, which can lead to targeted advertising and privacy concerns.
#bitcoin
Cryptocurrency
fromBitcoin Magazine
1 day ago

Blockstream Launches Jade Core To Simplify Bitcoin Self-Custody Without Sacrificing Security

Blockstream's Jade Core hardware wallet simplifies Bitcoin self-custody for a broader user base with enhanced security features.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin's Quantum Problem Is Really A Governance Crisis In Disguise: UTXO

Bitcoin faces a quantum computing threat that requires urgent political consensus for effective protocol changes to ensure security.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
Cryptocurrency
fromBitcoin Magazine
1 day ago

Blockstream Launches Jade Core To Simplify Bitcoin Self-Custody Without Sacrificing Security

Blockstream's Jade Core hardware wallet simplifies Bitcoin self-custody for a broader user base with enhanced security features.
Cryptocurrency
fromBitcoin Magazine
5 days ago

Bitcoin's Quantum Problem Is Really A Governance Crisis In Disguise: UTXO

Bitcoin faces a quantum computing threat that requires urgent political consensus for effective protocol changes to ensure security.
Cryptocurrency
fromnews.bitcoin.com
2 weeks ago

Bitcoin Developer Unveils Quantum-Resistant Wallet Rescue Prototype

A prototype by Lightning Labs enables bitcoin users to recover funds from wallets threatened by quantum computing.
#remote-work
Remote teams
fromFast Company
6 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
6 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
6 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
6 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
Remote teams
fromFast Company
6 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require careful management.
Remote teams
fromFast Company
6 days ago

4 tips for remote workers to safeguard data and privacy

Remote work in public spaces offers convenience but poses privacy and security risks that require precautions.
fromNextgov.com
1 day ago

GSA taps Greg Hogan as head of government's identity proofing service, Login.gov

[Hogan] will be focused on expanding the number of people and agencies successfully using Login.gov, enhancing the user experience, and improving the cost-effectiveness while continuing to meet the highest expectations for security, privacy and reliability.
Privacy professionals
#cybersecurity
Careers
fromEntrepreneur
4 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
fromSecurityWeek
5 days ago
Information security

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Information security
fromInfoWorld
6 days ago

UK's NCSC calls passkeys the default, says passwords are no longer fit for the purpose

Passkeys are recommended as the primary authentication method due to their security and user-friendliness compared to traditional passwords.
Careers
fromEntrepreneur
4 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromSecurityWeek
5 days ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
Privacy technologies
fromMail Online
5 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Information security
fromInfoWorld
6 days ago

UK's NCSC calls passkeys the default, says passwords are no longer fit for the purpose

Passkeys are recommended as the primary authentication method due to their security and user-friendliness compared to traditional passwords.
Deliverability
fromSecurityWeek
6 days ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
DevOps
fromInfoQ
5 days ago

HashiCorp Vault 2.0 Marks Shift to IBM Lifecycle with New Identity Federation

HashiCorp Vault 2.0 introduces significant updates, including a refined security model and Workload Identity Federation for improved secret management across cloud environments.
Digital life
fromThe New Yorker
6 days ago

The Anguish of Data Loss

Data preservation is crucial, yet digital devices are fragile and often treated carelessly, leading to significant loss when data is not backed up.
#ai
fromnews.bitcoin.com
6 days ago
Information security

From Scripts to Swarms: Why AI Is Breaking Traditional Sybil Defenses

AI agents will centralize identity management, enhancing security against Sybil attacks through advanced automation and dynamic behavior.
Privacy technologies
fromComputerWeekly.com
3 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromSecurityWeek
6 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Information security
fromnews.bitcoin.com
6 days ago

From Scripts to Swarms: Why AI Is Breaking Traditional Sybil Defenses

AI agents will centralize identity management, enhancing security against Sybil attacks through advanced automation and dynamic behavior.
Privacy technologies
fromComputerWeekly.com
3 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Privacy technologies
fromFuturism
2 days ago

Tinder Scanning Users' Eyeballs to Prove They Aren't Creeps

Tinder partners with World project for biometric verification using iris scans to combat scams on dating apps.
EU data protection
fromwww.independent.co.uk
1 week ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
fromwww.housingwire.com
1 week ago

Disconnected systems fueling title, wire fraud risks

Disconnected systems, inconsistent definitions of data, and the manual nature of data movement create ongoing challenges in the title industry, according to FundingShield President Adam Chaudhary.
Real estate
#email-authentication
Deliverability
fromWordtothewise
5 days ago

DKIM2: What it means for the future of email

DKIM2 is a new email authentication protocol in development, improving security and reliability over DKIM and addressing issues from previous methods.
Deliverability
fromWordtothewise
5 days ago

DKIM2: What it means for the future of email

DKIM2 is a new email authentication protocol in development, improving security and reliability over DKIM and addressing issues from previous methods.
fromNature
2 weeks ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Privacy professionals
fromZDNET
1 week ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
#vpn
Cryptocurrency
fromThe Village Voice
5 days ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
Information security
fromnews.bitcoin.com
5 days ago

Beyond the Breach: Why rsETH's Depegging Demands a New Standard for Bridge Security

KelpDAO's rsETH depegged after a breach, highlighting the need for improved bridge security in collateral risk management.
#generative-ai
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
4 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
#age-verification
Privacy technologies
fromTheregister
6 days ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Privacy technologies
fromThe Verge
1 week ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Privacy technologies
fromTheregister
6 days ago

Proton CEO: Age checks turn internet into ID checkpoint

Age verification risks transforming the internet into a system requiring identification for all users, compromising anonymity and security.
Privacy technologies
fromThe Verge
1 week ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
Information security
fromSecuritymagazine
1 week ago

Unauthorized Users Accessed Claude Mythos, New Reports Suggest

Unauthorized access to Anthropic's AI model, Claude Mythos Preview, raises security concerns among experts due to its ability to identify digital vulnerabilities.
Information security
fromFast Company
6 days ago

1Password sees AI as both threat and tool

AI presents both risks and opportunities for password management, requiring firms to balance security with the potential for careless app development.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Information security
fromBusiness Matters
1 week ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Privacy technologies
fromComputerWeekly.com
1 week ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromSecurityWeek
1 month ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Privacy technologies
fromnews.bitcoin.com
1 week ago

Anthropic Adds ID Verification to Claude for Select AI Users

Anthropic implemented ID checks for Claude users in April 2026 to limit abuse and meet legal obligations, while not storing ID images on its systems.
#identity-verification
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Information security
fromThe Hacker News
3 weeks ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
Business
fromFortune
2 months ago

Crypto is facing an identity crisis-but it's hardly the first time | Fortune

A shirtless spectator's crypto ad stunt at the Super Bowl worsened public perception amid a major crypto sell-off and internal industry disillusionment.
Miscellaneous
fromBitcoin Magazine
2 months ago

The Core Issue: Libsecp256k1, Bitcoin's Cryptographic Heart

Libsecp256k1 evolved from a hobby project into essential consensus-critical software protecting Bitcoin's multi-trillion dollar network through secure elliptic curve cryptography implementation.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
fromnews.bitcoin.com
3 weeks ago

The Retroactive Decryption Trap: Why Post-Quantum Upgrades Can't Save Your Past Privacy

Guy Zyskind emphasized that the whitepaper reframes the conversation around quantum threats, stating that the traditional 10-year migration window now seems dangerously optimistic given Google's findings.
Information security
Information security
fromnews.bitcoin.com
3 weeks ago

Naoris Protocol Deploys Post-Quantum Mainnet to Secure Global Digital Infrastructure

Naoris Protocol launched its Layer 1 mainnet for decentralized post-quantum security, processing over 106 million transactions to combat quantum computing threats.
Information security
fromTheregister
1 month ago

Security boffins harvest bumper crop of API keys from web

Almost 2,000 API credentials were found exposed on 10,000 webpages, posing significant security risks to organizations and critical infrastructure.
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy technologies
fromBitcoin Magazine
1 month ago

Breez SDK Launches Passkey Login For Seedless Bitcoin Wallets

Breez SDK now enables self-custodial Bitcoin wallets using passkey authentication instead of seed phrases, reducing barriers to self-custody adoption.
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
fromWIRED
2 months ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
fromSilicon Canals
2 months ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Information security
fromSecuritymagazine
2 months ago

Privilege Disruption: The Key Choke Point for Cyber Deterrence

Privilege disruption early in the attack chain shifts adversary risk-benefit by imposing cost, risk, and uncertainty to deter and deny cyber operations.
Privacy technologies
fromCointelegraph
2 months ago

Why Privacy Coins Often Appear in Post-Hack Fund Flows

Privacy coins act as a temporary black box in a broader laundering pipeline after hacks, reducing traceability and delaying enforcement while facilitating cash-out attempts.
Information security
fromCointelegraph
2 months ago

Why Address Poisoning Works Without Stealing Private Keys

Address poisoning steals funds by manipulating transaction history and exploiting users copying lookalike addresses, not by stealing private keys.
Privacy technologies
fromZDNET
1 month ago

I switched password managers without losing a single login - here's how

Switching password managers involves exporting passwords to CSV and importing them into a new app, then reviewing settings before deleting the old manager.
Information security
fromSecurityWeek
1 month ago

SIM Swaps Expose a Critical Flaw in Identity Security

SIM swap attacks exploit structural weaknesses in mobile-based identity verification, allowing criminals to intercept authentication codes and take over accounts by transferring victims' phone numbers to attacker-controlled SIM cards.
Information security
fromTheregister
2 months ago

Password managers don't protect secrets if pwned

Bitwarden, LastPass, and Dashlane can fail to protect credentials under server-compromise scenarios, allowing disclosure or alteration of user passwords.
Information security
fromKotaku
2 months ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
[ Load more ]