#odido nog even om te laten zien dat niet iedere klant van #ben 2FA kan inschakelen đ±
Mijn account kan dit, maar mijn vrouw niet?
Please stop using SMS for two-factor authentication
#2fa #authentication #passkey #sms
https://www.makeuseof.com/please-stop-using-sms-for-two-factor-authentication/
Retour sur l'alerte de Flickr concernant une fuite via un prestataire de mails
--> https://www.datasecuritybreach.fr/flickr-alerte-sur-une-fuite-via-un-prestataire-de-mails/
// Une faille chez un fournisseur tiers aurait pu exposer des donnĂ©es dâabonnĂ©s.
Flickr bloque lâaccĂšs en quelques heures et redoute une vague dâhameçonnage visant ses 35M dâutilisateurs mensuels.
#Flickr #fuiteDeDonnees #phishing #hameconnage #cybersecurite #privacy #2FA #zataz
đ§” âŠergĂ€nzend zum oberen Toot noch ein ErklĂ€rvideo vom @tuxwiz zum Thema @keepassxc und deren zusĂ€tzlichen Einsatz ĂŒber eine @nextcloud Instanz. Wenn dies fĂŒr euch nichts neues ist, dann ist dies sicherlich was fĂŒr eure Bekannte, Verwandte und Freunde als informative Quelle.
đș https://tube.sp-codes.de/w/ityGBZBMxP8jVWjiLeGFFC
#keepass #video #erklart #passwort #passwortmanager #itsicherheit #yt #it #peertube #nextcloud #datensicherheit #datenschutz #erklarvideo #2fa #totp #passkeys
Eigentlich wollte ich vom Google Authenticator zu Authy wechseln. Dann hab ich gelernt, dass das gar nicht mal so gut sein soll. Ich hab dann jetzt stattdessen den Authenticator von @ente gewÀhlt.
#did #dut #2fa #authenticator
Bahisvebahis, kullanıcı hesaplarını 2 faktörlĂŒ doÄrulama ile korur.
â Google Authenticator
â Zaman bazlı kod
â Ek gĂŒvenlik katmanı
Update Virgin Plus (#8538)
https://github.com/2factorauth/twofactorauth/commit/75765e06c58f9479f7b9828a9357e87fa3e312c5
GefÀhrliche Chrome-Erweiterung entwendet Zugangsdaten von Meta Business-Konten
Die Chrome-Erweiterung âCL Suite von @CLMastersâ gibt vor, ArbeitsablĂ€ufe im Meta Business Manager zu vereinfachen, leitet jedoch im Hintergrund sensible Unternehmensdaten an Server der Entwickler weiter
âïž little snowplow gang cuddling under a tree
âïž phone call because you are the chosen ear when someone is excited about a project they're working on
âïž magic code to access an account finally arrives via mail .. and surprise! despite dealing with different entities to get to this place, it opens all three of them - no need to wait weeks for the same again just because you won't provide biometric data
#snow #february #Valentinesday #construction #banking #biometrics #2fa
I was wondering why I was always failing my TOTP 2FA logins on the first attempt. Turns out I found a bug in the Authenticator app for GNOME, where it will always give you the wrong codes after resuming the computer from suspend (sometimes after unlocking the app's built-in lockscreen too, I think): https://gitlab.gnome.org/World/Authenticator/-/issues/481
In this small guid I want to show how to setup 2FA for your user(s) on your Ubuntu Desktop machine
Mein Test mit Passbolt entwickelt sich so langsam fĂŒr mich zu einem Game-Changer. Der Browser Quick Access in Verbindung mit TOTP - đ€Ż - Click - Copy - Paste ... đ Das heiĂt fĂŒr mich, am Wochenende das Ganze Projekt ausfallsicher inkl. Backup erstellen und irgendwie Dokumentieren. #Selfhosting #passbolt #2FA #totp
#Kleinanzeigen hat keine #2FA. Wie kann das denn 2026 noch sein?!
Password Security in 2026: A Practitionerâs View
After years in security, I can say one thing with confidence: most breaches still donât start with zero-days. They start with credentials.
Phishing, credential stuffing, password reuse â same story, different year.
From the offensive side, weak or reused passwords are still one of the cheapest ways in. From the defensive side, identity remains the most fragile layer in otherwise decent infrastructures.
What I keep seeing in real environments:
The same password reused across multiple services
âSeasonalâ patterns like Summer2026!
Credentials leaked in one breach and reused elsewhere
Missing MFA on systems that really should have it
This is why the basics still matter more than shiny tools:
Use a password manager and generate long, random, unique passwords
Use passphrases for master credentials
Enable MFA / 2FA everywhere itâs possible
Treat access reviews and account cleanup as a routine, not an incident response
Technology alone wonât save you, though. If policies are unclear or not enforced, people will always take shortcuts. And shortcuts in identity and access management are exactly what attackers love.
In 2026, this is not about âmaking life harder for usersâ. Itâs about:
Reducing breach probability
Limiting blast radius
Protecting business continuity
And not turning basic hygiene into an expensive incident
Strong authentication is no longer âadvanced securityâ. Itâs just digital hygiene.
And like any hygiene, it only works if itâs systematic and boringly consistent.
#infosec #cybersecurity #passwords #identity #MFA #2FA #bluesky #mastodon #securityengineering #digitalhygiene