#authentication

[ follow ]
#cybersecurity
Information security
fromThe Hacker News
3 months ago

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Xerox VersaLink printers have serious security vulnerabilities that can lead to credential theft.
The vulnerabilities can allow attackers to redirect authentication information to rogue servers.
Effective exploitation of these vulnerabilities requires specific conditions, including access to MFP configuration and user address books.
Privacy technologies
fromZDNET
3 weeks ago

If we want a passwordless future, let's get our passkey story straight

Passkeys provide a seamless, memory-free authentication method intended to replace traditional passwords.
fromITPro
2 months ago
Information security

Forget MFA fatigue, attackers are exploiting 'click tolerance' to trick users into infecting themselves with malware

fromZDNET
2 weeks ago
Information security

A whopping 94% of leaked passwords are not unique - will you people ever learn?

Information security
fromThe Hacker News
3 months ago

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Xerox VersaLink printers have serious security vulnerabilities that can lead to credential theft.
The vulnerabilities can allow attackers to redirect authentication information to rogue servers.
Effective exploitation of these vulnerabilities requires specific conditions, including access to MFP configuration and user address books.
Privacy technologies
fromZDNET
3 weeks ago

If we want a passwordless future, let's get our passkey story straight

Passkeys provide a seamless, memory-free authentication method intended to replace traditional passwords.
fromITPro
2 months ago
Information security

Forget MFA fatigue, attackers are exploiting 'click tolerance' to trick users into infecting themselves with malware

fromZDNET
2 weeks ago
Information security

A whopping 94% of leaked passwords are not unique - will you people ever learn?

#oauth
fromGitHub
7 months ago
JavaScript

GitHub - ValueMelody/melody-auth: A turnkey OAuth & authentication system, designed for both Cloudflare Workers and Node.js

fromGitHub
7 months ago
JavaScript

GitHub - ValueMelody/melody-auth: A turnkey OAuth & authentication system, designed for both Cloudflare Workers and Node.js

#security
Ruby on Rails
fromThe Hacker News
2 months ago

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

High-severity security flaws in ruby-saml library could allow authentication bypass.
Updating to versions 1.12.4 and 1.18.0 is essential for security.
fromZDNET
1 month ago
Mobile UX

Microsoft's passwordless future is here for Outlook, Xbox, 365, and more

Ruby on Rails
fromThe Hacker News
2 months ago

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

High-severity security flaws in ruby-saml library could allow authentication bypass.
Updating to versions 1.12.4 and 1.18.0 is essential for security.
Mobile UX
fromZDNET
1 month ago

Microsoft's passwordless future is here for Outlook, Xbox, 365, and more

Microsoft is enhancing sign-in screens to prioritize passwordless authentication, improving UX and security for billions of users.
Startup companies
fromHackernoon
3 weeks ago

Tesseral Raises $3.3M Seed to Bring Open Source Auth to B2B Software | HackerNoon

AI accelerates B2B software development, yet security requirements are rising, prompting the need for robust authentication solutions like those offered by Tesseral.
#jwt
fromHackernoon
2 years ago
JavaScript

How to Implement Multi-Device Authentication System with FastAPI, Redis, and JWT | HackerNoon

fromHackernoon
2 years ago
JavaScript

How to Implement Multi-Device Authentication System with FastAPI, Redis, and JWT | HackerNoon

Privacy professionals
fromThe Hacker News
3 weeks ago

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Identity systems face vulnerabilities beyond traditional authentication methods, necessitating comprehensive lifecycle protection.
Attackers increasingly use social engineering and advanced technologies, like deepfakes, to compromise identity systems.
Privacy technologies
fromZDNET
4 weeks ago

Why the road from passwords to passkeys is long, bumpy, and worth it - probably

Passkeys are being adopted to replace passwords but face barriers to user understanding and seamless implementation.
Transitioning to passkeys necessitates a strategic approach due to existing complications.
fromEngadget
1 month ago

Bluesky is getting blue checkmarks and an official verification system

Bluesky is adopting an official verification system, granting blue checkmarks to "authentic and notable" accounts, a significant shift from its previous stance on verification.
Chelsea
Deliverability
fromLitmus
1 month ago

Email Deliverability Rules: How to Make Sure You Reach Your Gmail and Yahoo Subscribers

Gmail and Yahoo's February 2024 rules require email authentication, easy unsubscribes, and monitoring spam complaints to ensure deliverability.
fromHackernoon
1 month ago

StorX Introduces Seamless And Secure Web3-Based Authentication | HackerNoon

StorX Network is transitioning to Web3-based authentication, which enhances security and usability while providing users with more control over their data, effective April 1st, 2025.
Privacy technologies
#error-handling
Information security
fromAmazic
5 months ago

How Zero Trust redefines traditional authentication and authorization practices

Zero Trust requires constant verification of user identities and access rights, significantly enhancing security in modern network environments.
fromLogRocket Blog
8 months ago

Lucia Auth: An Auth.js alternative for Next.js authentication - LogRocket Blog

When authenticating with a username and password, Auth.js does not support using database sessions, relying exclusively on JWTs, which can limit its flexibility in various setups.
JavaScript
[ Load more ]