How does it "allow a malicious website to obtain valid credentials." – WebAuthn

I’m not entirely convinced of the importance of verifying the authenticator attestation, and I’ve asked a question about it, I’m open to it, and if you want, you can post an answer at that question, but this one is specifically about &quot… Continue reading How does it "allow a malicious website to obtain valid credentials." – WebAuthn

Credential management for an app requiring multiple different logins within a single application [closed]

I created an app that requires users to make multiple different logins within the app. Is it possible to use Google’s Identity API to ensure that the different required login credentials are stored/retrieved by Google whenever they are nee… Continue reading Credential management for an app requiring multiple different logins within a single application [closed]

Does a password-derived public key authentication improve security over pure password-based authentication?

Despite best efforts it is pretty clear that most users reuse their credentials, especially for what they consider non-critical sites such as forums. While TFA does mitigate the potential damage of this a bit (aside from its other benefits… Continue reading Does a password-derived public key authentication improve security over pure password-based authentication?

Boots yanks loyalty card payouts after 150K accounts get stuffed

The UK pharmacy chain says it wasn’t hacked, its systems are fine. It’s all the password reusers mucking things up again! Continue reading Boots yanks loyalty card payouts after 150K accounts get stuffed

Orchestrating Network Security to Handle Cyberthreats

Unfortunately for companies, cybercriminals don’t need to invent the wheel when choosing a way to hack corporate networks. Black hat hackers have a choice of cyberthreats and attack methods on a silver platter. Nevertheless, certain types of cybercrim… Continue reading Orchestrating Network Security to Handle Cyberthreats