article thumbnail

Lucky MVP 13

Troy Hunt

In last year's MVP announcement blog post , I talked about one of my favourite contributions of all that year being the Pwned Passwords ingestion pipeline for the FBI. Reading my posts, watching my videos, turning up to my talks and consuming services like HIBP and Pwned Passwords.

article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

Securing their home Wi-Fi network by using state of the art encryption (WPA2 or WPA3 with a long and complex password), turning off the WPS function and deleting the Guest Wi-Fi. Guidance for Employers. More generally, employees should not do at home what they are not permitted to do in the workplace.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. So what’s stopping us from getting rid of passwords altogether? Passwords may have been very effective securing Roman roads.

Passwords 129
article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

This community places a special premium on accounts with short “OG” usernames, and some of its most successful and notorious members were known to use all of the methods Microsoft attributed to LAPSUS$ in the service of hijacking prized OG accounts. In fact, the group often announces its hacks on social media.

Phishing 231
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Four and a half years ago now, I rolled out version 2 of HIBP's Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. Actually, the multiple problems, the first of which is that it's just way too fast for storing user passwords in an online system.

Passwords 123
article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

The study also revealed that 94% of IT professionals say their organizations’ security policies around access management was influenced by breaches of consumer services in the last 12 months. Perhaps someday, password fatigue, frustration and password resets can truly be a thing of the past.

Cloud 115
article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

They need to maintain an easy user management access for cloud-based applications and services, without compromising on security. Password-based app access: convenient but risky. But using one or two-factor logins such as email and password leaves enterprises vulnerable to security risks and data breaches. FIDO Authentication.

Cloud 62