#tokenless-oidc

[ follow ]
#cybersecurity
fromSecurityWeek
2 days ago
Information security

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Information security
fromSecurityWeek
2 days ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Deliverability
fromSecurityWeek
3 days ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
#vpn
Cryptocurrency
fromThe Village Voice
3 days ago

Which VPN makes sense for crypto traders in 2026? - The Village Voice

Crypto traders must choose VPNs based on technical fundamentals like protocol choices, logging policies, and security features to protect their activities.
Privacy professionals
fromSecuritymagazine
5 days ago

The Privacy-Security Partnership: How We Bend Risk in a Resource Crunch

Fewer privacy practitioners feel confident in meeting laws, while resource shortages and compliance challenges increase stress in the field.
Mental health
fromSmashing Magazine
1 week ago

Session Timeouts: The Overlooked Accessibility Barrier In Authentication Design - Smashing Magazine

Poor session timeouts create significant accessibility barriers for users with disabilities, impacting their online experiences and tasks.
EU data protection
fromwww.independent.co.uk
1 week ago

What are EU digital identity wallets? The benefits and risks explained

The Independent provides accessible journalism on critical issues like reproductive rights and digital identity, emphasizing the importance of on-the-ground reporting.
fromNature
1 week ago

Researchers: here's how to audit your fragmented digital identity

A search for 'Guo Wei' in ORCID returned 616 profiles, none affiliated with the Jiangsu University of Science and Technology, highlighting the difficulty in verifying academic identities.
Higher education
Privacy professionals
fromZDNET
6 days ago

I tried to wipe my digital footprint without paying for a data removal service - 5 free ways

Most sensitive information online is legally collected and aggregated by brokers, but removal is possible with effort and available tools.
#meta
#ai
Privacy technologies
fromComputerWeekly.com
3 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromSecurityWeek
4 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Privacy technologies
fromComputerWeekly.com
3 weeks ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
#ai-governance
UX design
fromEntrepreneur
2 weeks ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
#mastodon
fromEngadget
6 days ago
Information security

Mastodon was hit by a 'major' DDoS attack that briefly took down parts of the service

Social media marketing
fromTechCrunch
1 month ago

Mastodon is making its decentralized social network easier to use with its latest revamp | TechCrunch

Mastodon is redesigning user profiles to attract mainstream users and simplify the platform's usability.
fromEngadget
6 days ago
Information security

Mastodon was hit by a 'major' DDoS attack that briefly took down parts of the service

Social media marketing
fromTechCrunch
1 month ago

Mastodon is making its decentralized social network easier to use with its latest revamp | TechCrunch

Mastodon is redesigning user profiles to attract mainstream users and simplify the platform's usability.
#generative-ai
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
3 weeks ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
1 month ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Cryptocurrency
fromnews.bitcoin.com
3 weeks ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
Information security
fromBusiness Matters
1 week ago

Why Trust and Verification Are Critical for Modern Online Platform Businesses

Trust is essential yet fragile in the digital economy, with platforms facing increasing challenges from sophisticated online scams.
Privacy technologies
fromTechCrunch
1 week ago

Zoom teams up with World to verify humans in meeting | TechCrunch

Zoom partners with World to combat deepfake fraud in video meetings using advanced human verification technology.
#age-verification
Privacy technologies
fromThe Verge
1 week ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
fromThe Verge
2 months ago
Privacy technologies

Discord's age verification mandate is a leap toward a gated internet

Discord will restrict features for unverified users, requiring face scans, government IDs, or an age-inference model to access age-restricted servers and content.
fromPrivacy International
1 month ago
Privacy technologies

Discord pushes back age verification after security risks revealed

Age verification systems create significant privacy risks by collecting sensitive biometric and identity data that cannot be recovered if compromised, and normalizing pervasive digital identity checks across the internet.
Privacy technologies
fromThe Verge
1 week ago

Age verification is a mess but we're doing it anyway

Age verification methods on the internet are flawed, leading to challenges in effectively preventing underage access to inappropriate content.
#identity-management
Information security
fromThe Hacker News
2 weeks ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
#identity-verification
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
Privacy technologies
fromFast Company
1 month ago

This crypto ring certifies your digital self with real-life handshakes

Quartz is a speculative ring concept using biometric verification and physical handshakes to authenticate identity and prevent AI-driven spoofing scams targeting older adults.
#whatsapp
Privacy technologies
fromTechRepublic
1 week ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy technologies
fromTechRepublic
1 week ago

WhatsApp New Update Lets You Chat Without Sharing Your Phone Number

WhatsApp is introducing usernames, allowing users to chat without sharing phone numbers, enhancing privacy and user experience.
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

Privacy professionals
fromZDNET
1 month ago

Incogni review: The easiest way to remove myself from the internet took just seconds

Incogni is a data removal service that helps reduce personal information exposure by targeting data brokers, with plans starting at $8/month and offering identity protection features.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
Artificial intelligence
fromTheregister
1 month ago

World pitch: scan eyeballs to tie identity to AI agents

World is launching AgentKit, a technology linking AI agents to verified human identities through iris-scanning orbs to prevent AI abuse and establish trust in agentic systems.
Privacy professionals
fromTheregister
1 month ago

Age verification isn't sage verification inside OSes

California's Digital Age Assurance Act attempts age verification for minors but is vague, incoherent, and creates liability risks without clearly defining compliance requirements or addressing practical implementation across diverse computing devices.
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
Business intelligence
fromBusiness Matters
1 month ago

The Growing Importance of Digital Identity in the Financial System

Clear business identity through standardized digital identifiers like LEI reduces financial risk, enables faster compliance checks, and supports trust across international commerce.
Marketing tech
fromMarTech
2 months ago

Navigating identity in a cookieless, compliant world | MarTech

Transition from third-party cookies to first-party data and consent-driven identity strategies enables compliant, scalable personalization while maintaining trust.
#agentic-commerce
fromThe Drum
2 months ago

The next generation of social networking

Whilst many of the tools of social media - blogs, ugc, forums - are now increasingly brought into new web design and development, there are companies, from British Airways to Lego who view social media as the starting point - not the added feature. Others, such as ruumz.com, are already operating the 'next generation' of social networks with a new blend of online and offline activity.
Gadgets
fromThe Verge
2 months ago

How to un-Big Tech your online life

Recommendations include a new Mario Tennis Switch game, a wild time-travel movie, Sony's top earbuds, a new AI model, Dot calendar app, and zine discount.
Deliverability
fromWIRED
1 month ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
fromTechzine Global
1 month ago

Okta launches platform to secure AI agents

Only 22 percent of organizations treat AI agents as independent, identity-bearing entities, while 88 percent have already dealt with suspected or confirmed security incidents involving AI agents. Ninety percent of AI usage occurs through unauthorized personal accounts, with an average of 223 shadow AI incidents per month.
Information security
#discord
fromZDNET
2 months ago
Privacy professionals

My 5 favorite Discord alternatives - no ID verification required

fromZDNET
2 months ago
Information security

Discord's age verification lockdown: What to know, and alternatives users are considering

fromZDNET
2 months ago
Privacy professionals

My 5 favorite Discord alternatives - no ID verification required

fromZDNET
2 months ago
Information security

Discord's age verification lockdown: What to know, and alternatives users are considering

Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
Privacy technologies
fromAzure DevOps Blog
1 month ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
Privacy technologies
fromArs Technica
1 month ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
Privacy technologies
fromArs Technica
1 month ago

After Discord fiasco, age-check tech promises privacy by running locally. Does it work?

Age-verification systems using on-device face scans and cross-platform age keys reduce privacy risks, but widespread distrust of vendors and past data breaches undermine user confidence in these technologies.
fromWIRED
2 months ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
Information security
fromTheregister
2 months ago

Every day in every way, passwords are getting worse

Passwords remain ubiquitous, aging and increasingly vulnerable due to implementation flaws, password manager weaknesses, and AI-related risks.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromKotaku
2 months ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
fromSilicon Canals
1 month ago

The global infrastructure of digital ID is being built right now - and nobody voted for it - Silicon Canals

What I walked through wasn't just an immigration gate. It was a node in a rapidly expanding global infrastructure of digital identity, one being constructed at extraordinary speed, across dozens of countries, by a mix of governments, multilateral organizations, and private technology vendors. The people building it believe they are solving real problems: fraud, statelessness, inefficient public services, financial exclusion.
Privacy technologies
Information security
fromTheregister
1 month ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
fromNieman Lab
1 month ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
Privacy technologies
fromTechCrunch
1 month ago

Let's explore the best alternatives to Discord | TechCrunch

Discord's planned age verification requirement by mid-2026 and past security breach prompt users to explore alternative platforms offering better privacy, security, and different communication experiences.
[ Load more ]