#2fa

2026-02-18

#odido nog even om te laten zien dat niet iedere klant van #ben 2FA kan inschakelen đŸ˜±

Mijn account kan dit, maar mijn vrouw niet?

#security #2FA #hack

đ˜Œđ™žđ™©đ™€đ™§wsa@rebel.ar
2026-02-18

Bueno, tal vez no hay popup lindo pero si hay presentaciĂłn y sincronizaciĂłn NTP.

Mañana coordino los menues y submenues, armo las funciones para crear los OTP. y estamos listos. Ya el resto es retocar :).

#ssd1306 #embedded #developer #security #infosec #2fa

Erik C. Thauvinethauvin
2026-02-17
ZATAZ - "\o/"zataz@mastox.eu
2026-02-17

Retour sur l'alerte de Flickr concernant une fuite via un prestataire de mails

--> datasecuritybreach.fr/flickr-a

// Une faille chez un fournisseur tiers aurait pu exposer des donnĂ©es d’abonnĂ©s.

Flickr bloque l’accùs en quelques heures et redoute une vague d’hameçonnage visant ses 35M d’utilisateurs mensuels.

#Flickr #fuiteDeDonnees #phishing #hameconnage #cybersecurite #privacy #2FA #zataz

𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕kubikpixel@chaos.social
2026-02-17

đŸ§” 
ergĂ€nzend zum oberen Toot noch ein ErklĂ€rvideo vom @tuxwiz zum Thema @keepassxc und deren zusĂ€tzlichen Einsatz ĂŒber eine @nextcloud Instanz. Wenn dies fĂŒr euch nichts neues ist, dann ist dies sicherlich was fĂŒr eure Bekannte, Verwandte und Freunde als informative Quelle.

đŸ“ș tube.sp-codes.de/w/ityGBZBMxP8

#keepass #video #erklart #passwort #passwortmanager #itsicherheit #yt #it #peertube #nextcloud #datensicherheit #datenschutz #erklarvideo #2fa #totp #passkeys

2026-02-17

Eigentlich wollte ich vom Google Authenticator zu Authy wechseln. Dann hab ich gelernt, dass das gar nicht mal so gut sein soll. Ich hab dann jetzt stattdessen den Authenticator von @ente gewÀhlt.
#did #dut #2fa #authenticator

Bahisvebahisbahisvebahis
2026-02-17

Bahisvebahis, kullanıcı hesaplarını 2 faktörlĂŒ doğrulama ile korur.

✔ Google Authenticator
✔ Zaman bazlı kod
✔ Ek gĂŒvenlik katmanı

bahisvebahis
AllAboutSecurityallaboutsecurity
2026-02-13

GefÀhrliche Chrome-Erweiterung entwendet Zugangsdaten von Meta Business-Konten

Die Chrome-Erweiterung „CL Suite von @CLMasters“ gibt vor, ArbeitsablĂ€ufe im Meta Business Manager zu vereinfachen, leitet jedoch im Hintergrund sensible Unternehmensdaten an Server der Entwickler weiter

all-about-security.de/gefaehrl

SameGirlieSameGirlie
2026-02-12

☀ little snowplow gang cuddling under a tree

☀ phone call because you are the chosen ear when someone is excited about a project they're working on

☀ magic code to access an account finally arrives via mail .. and surprise! despite dealing with different entities to get to this place, it opens all three of them - no need to wait weeks for the same again just because you won't provide biometric data

3 medium-small snowplows parked very closely together with mounds of snow and a large evergreen in the background. They are different sizes and shapes, one blue on left and the other two the typical yellow.
Jeff Fortin T. (鹚たćș­ćœ’たNekohayo)nekohayo
2026-02-12

I was wondering why I was always failing my TOTP 2FA logins on the first attempt. Turns out I found a bug in the Authenticator app for GNOME, where it will always give you the wrong codes after resuming the computer from suspend (sometimes after unlocking the app's built-in lockscreen too, I think): gitlab.gnome.org/World/Authent

SuitDeerSuitDeer
2026-02-11

In this small guid I want to show how to setup 2FA for your user(s) on your Ubuntu Desktop machine

hostlab.tech/blog/2fa-ubuntu-d

AtomicAllianceatomicalliance
2026-02-10

Mein Test mit Passbolt entwickelt sich so langsam fĂŒr mich zu einem Game-Changer. Der Browser Quick Access in Verbindung mit TOTP - đŸ€Ż - Click - Copy - Paste ... 😎 Das heißt fĂŒr mich, am Wochenende das Ganze Projekt ausfallsicher inkl. Backup erstellen und irgendwie Dokumentieren.

2026-02-10

#Kleinanzeigen hat keine #2FA. Wie kann das denn 2026 noch sein?!

2026-02-10

Password Security in 2026: A Practitioner’s View

After years in security, I can say one thing with confidence: most breaches still don’t start with zero-days. They start with credentials.

Phishing, credential stuffing, password reuse — same story, different year.

From the offensive side, weak or reused passwords are still one of the cheapest ways in. From the defensive side, identity remains the most fragile layer in otherwise decent infrastructures.

What I keep seeing in real environments:

The same password reused across multiple services

“Seasonal” patterns like Summer2026!

Credentials leaked in one breach and reused elsewhere

Missing MFA on systems that really should have it

This is why the basics still matter more than shiny tools:

Use a password manager and generate long, random, unique passwords

Use passphrases for master credentials

Enable MFA / 2FA everywhere it’s possible

Treat access reviews and account cleanup as a routine, not an incident response

Technology alone won’t save you, though. If policies are unclear or not enforced, people will always take shortcuts. And shortcuts in identity and access management are exactly what attackers love.

In 2026, this is not about “making life harder for users”. It’s about:

Reducing breach probability

Limiting blast radius

Protecting business continuity

And not turning basic hygiene into an expensive incident

Strong authentication is no longer “advanced security”. It’s just digital hygiene.
And like any hygiene, it only works if it’s systematic and boringly consistent.

#infosec #cybersecurity #passwords #identity #MFA #2FA #bluesky #mastodon #securityengineering #digitalhygiene

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst