#authentication

[ follow ]
fromESPN.com
6 days ago

Sneakers from Kobe's first start sell for $240K

An autographed pair of Adidas EQT Top 10 shoes worn by Kobe Bryant during his first Lakers start sold for $240,000, making it the second highest price ever for his sneakers.
LA Lakers
fromThe Hacker News
1 week ago

Kerberoasting Detections: A New Approach to a Decade-Old Challenge

Kerberoasting attacks utilize weaknesses in the Kerberos authentication process, evading detection due to brittle mechanisms.
#data-security
fromZDNET
3 weeks ago
Privacy professionals

How passkeys work: Do your favorite sites even support passkeys?

fromZDNET
3 weeks ago
Privacy professionals

How passkeys work: Do your favorite sites even support passkeys?

#cybersecurity
fromIT Pro
1 month ago
Privacy technologies

The NCSC wants you to start using password managers and passkeys - here's how to choose the best options

fromZDNET
1 month ago
Privacy technologies

Facebook's new passkey support could let you ditch your password once and for all

fromZDNET
2 months ago
Information security

A whopping 94% of leaked passwords are not unique - will you people ever learn?

fromHackernoon
4 months ago
Privacy professionals

Revolutionizing Enterprise Security: Sasibhushana Matcha's FIDO Implementation | HackerNoon

fromIT Pro
1 month ago
Privacy technologies

The NCSC wants you to start using password managers and passkeys - here's how to choose the best options

fromZDNET
1 month ago
Privacy technologies

Facebook's new passkey support could let you ditch your password once and for all

fromZDNET
2 months ago
Information security

A whopping 94% of leaked passwords are not unique - will you people ever learn?

fromHackernoon
4 months ago
Privacy professionals

Revolutionizing Enterprise Security: Sasibhushana Matcha's FIDO Implementation | HackerNoon

#passkeys
fromZDNET
3 weeks ago
Privacy technologies

How passkeys work: The complete guide to your inevitable passwordless future

fromTechCrunch
1 month ago
Privacy technologies

Facebook will soon roll out support for passkeys on Android and iOS | TechCrunch

fromZDNET
3 months ago
Privacy technologies

If we want a passwordless future, let's get our passkey story straight

fromZDNET
3 months ago
Privacy technologies

Why the road from passwords to passkeys is long, bumpy, and worth it - probably

fromZDNET
3 weeks ago
Privacy technologies

How passkeys work: The complete guide to your inevitable passwordless future

fromTechCrunch
1 month ago
Privacy technologies

Facebook will soon roll out support for passkeys on Android and iOS | TechCrunch

Privacy technologies
fromZDNET
3 months ago

If we want a passwordless future, let's get our passkey story straight

Passkeys provide a seamless, memory-free authentication method intended to replace traditional passwords.
Privacy technologies
fromZDNET
3 months ago

Why the road from passwords to passkeys is long, bumpy, and worth it - probably

Passkeys are being adopted to replace passwords but face barriers to user understanding and seamless implementation.
Transitioning to passkeys necessitates a strategic approach due to existing complications.
E-Commerce
fromstupidDOPE | Est. 2008
1 month ago

Bezel Redefines How to Buy and Sell Luxury Watches with Confidence and Speed | stupidDOPE | Est. 2008

Bezel revolutionizes luxury watch transactions through expert authentication, transparency, and a curated marketplace experience.
fromTechCrunch
1 month ago

Better Auth, an authentication tool by a self-taught Ethiopian dev, raises $5M from Peak XV, YC | TechCrunch

I remember needing an organization feature. It's a very common use case for most SaaS applications, but it wasn't available from these providers. So I had to build it from scratch.
European startups
Ruby on Rails
fromRubyflow
1 month ago

Introducing Veri - Minimal Cookie-Based Authentication for Rails

Veri is a minimalistic Rails authentication framework prioritizing granular session management and customization.
#facebook
fromHackernoon
1 year ago

6 Login Methods Every Developer Should Know | HackerNoon

Understanding different authentication methods is crucial for web app security and user verification.
fromPythonbytes
1 month ago

Slow tests go last

In episode 436 of Python Bytes, the hosts discuss the importance of social media engagement, live streaming, and the benefits of using PropelAuth for app authentication.
Python
Apple
fromArs Technica
1 month ago

Coming to Apple OSes: A seamless, secure way to import and export passkeys

Apple's new feature aims to enhance passkeys' transferability across devices, addressing a significant limitation of current passkey systems.
#password-management
fromRaymondcamden
1 month ago

Working with the Mastodon API in BoxLang

Using the Mastodon API for social media automation is straightforward, requiring just an access token and server information.
fromRaymondcamden
1 month ago

Working with the Bluesky API in BoxLang

To authenticate with Bluesky, use your username and password via environment variables, validating them before sending a POST request to the createSession endpoint.
Node JS
#security
fromHackernoon
2 months ago
Information security

Encrypted Key Recovery via Social Trust Models | HackerNoon

The proposed secret backup methods utilize social authentication to enhance security in private key recovery.
Ruby on Rails
fromThe Hacker News
4 months ago

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

High-severity security flaws in ruby-saml library could allow authentication bypass.
Updating to versions 1.12.4 and 1.18.0 is essential for security.
Ruby on Rails
fromThe Hacker News
4 months ago

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

High-severity security flaws in ruby-saml library could allow authentication bypass.
Updating to versions 1.12.4 and 1.18.0 is essential for security.
fromZDNET
2 months ago

A security key for every employee? Yubikey-as-a-Service goes global

Yubico's Yubikey-as-a-Service expands access to secure authentication, now available in 175 countries, enhancing logistical support for enterprises globally.
European startups
#oauth
fromGitHub
10 months ago
JavaScript

GitHub - ValueMelody/melody-auth: A turnkey OAuth & authentication system, designed for both Cloudflare Workers and Node.js

fromGitHub
10 months ago
JavaScript

GitHub - ValueMelody/melody-auth: A turnkey OAuth & authentication system, designed for both Cloudflare Workers and Node.js

Startup companies
fromHackernoon
3 months ago

Tesseral Raises $3.3M Seed to Bring Open Source Auth to B2B Software | HackerNoon

AI accelerates B2B software development, yet security requirements are rising, prompting the need for robust authentication solutions like those offered by Tesseral.
fromComputerWeekly.com
2 months ago

UK government websites to replace passwords with secure passkeys

Passkey technology will replace traditional passwords for UK government digital services, enhancing security and user experience.
fromLogRocket Blog
2 months ago

Authentication and authorization in Astro - LogRocket Blog

Astro's architecture presents unique authentication challenges compared to traditional frameworks, requiring manual handling for static and dynamic interactions.
fromThe Hacker News
3 months ago

[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats

Identity systems face vulnerabilities beyond traditional authentication methods, necessitating comprehensive lifecycle protection.
Attackers increasingly use social engineering and advanced technologies, like deepfakes, to compromise identity systems.
fromThe Hacker News
3 months ago

Why NHIs Are Security's Most Dangerous Blind Spot

Non-Human Identities (NHIs) present a significant and neglected threat in cybersecurity beyond traditional user credentials.
fromEngadget
3 months ago

Bluesky is getting blue checkmarks and an official verification system

Bluesky is adopting an official verification system, granting blue checkmarks to "authentic and notable" accounts, a significant shift from its previous stance on verification.
Chelsea
Deliverability
fromLitmus
3 months ago

Email Deliverability Rules: How to Make Sure You Reach Your Gmail and Yahoo Subscribers

Gmail and Yahoo's February 2024 rules require email authentication, easy unsubscribes, and monitoring spam complaints to ensure deliverability.
fromHackernoon
4 months ago

StorX Introduces Seamless And Secure Web3-Based Authentication | HackerNoon

StorX Network is transitioning to Web3-based authentication, which enhances security and usability while providing users with more control over their data, effective April 1st, 2025.
Privacy technologies
Mobile UX
fromZDNET
4 months ago

Microsoft's passwordless future is here for Outlook, Xbox, 365, and more

Microsoft is enhancing sign-in screens to prioritize passwordless authentication, improving UX and security for billions of users.
Information security
fromThe Hacker News
5 months ago

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Xerox VersaLink printers have serious security vulnerabilities that can lead to credential theft.
The vulnerabilities can allow attackers to redirect authentication information to rogue servers.
Effective exploitation of these vulnerabilities requires specific conditions, including access to MFP configuration and user address books.
Information security
fromAmazic
7 months ago

How Zero Trust redefines traditional authentication and authorization practices

Zero Trust requires constant verification of user identities and access rights, significantly enhancing security in modern network environments.
JavaScript
fromwww.sitepoint.com
7 months ago

About sending emails

Ensure correct SMTP server and authentication settings are used to avoid authentication failures.
Double-check credentials and use recommended security protocols as specified by the server documentation.
fromHackernoon
2 years ago

How to Implement Multi-Device Authentication System with FastAPI, Redis, and JWT | HackerNoon

Implementing a stateless authentication system using Redis and JWT allows users to manage multiple device sessions effectively.
JavaScript
fromLogRocket Blog
10 months ago

Auth.js adoption guide: Overview, examples, and alternatives - LogRocket Blog

Authentication is crucial for protecting web applications from unauthorized access.
Auth.js provides a comprehensive solution for implementing secure authentication in web apps.
JavaScript
fromLogRocket Blog
10 months ago

Lucia Auth: An Auth.js alternative for Next.js authentication - LogRocket Blog

Choosing the right authentication library in Next.js can impact development, with Auth.js emphasizing simplicity and quick setup, while Lucia offers more flexibility and control.
[ Load more ]