- Apple has finally embraced key-based 2FA. So should you https://arstechnica.com/information-technology/2020/07/apple-has-finally-embraced-key-based-2fa-so-should-you/ 171 comments apple
Linking pages
- Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA | Ars Technica https://arstechnica.com/information-technology/2022/03/lapsus-and-solar-winds-hackers-both-use-the-same-old-trick-to-bypass-mfa/ 140 comments
- Major cryptography blunder in Java enables “psychic paper” forgeries | Ars Technica https://arstechnica.com/information-technology/2022/04/major-crypto-blunder-in-java-enables-psychic-paper-forgeries 43 comments
- A Sinister Way to Beat Multifactor Authentication Is on the Rise | WIRED https://www.wired.com/story/multifactor-authentication-prompt-bombing-on-the-rise/#intcid=_wired-verso-hp-trending_e15a31bf-0824-4662-a6a2-635c248416dd_popular4-1 14 comments
- Iranian state hackers caught with their pants down in intercepted videos | Ars Technica https://arstechnica.com/information-technology/2020/07/iran-state-hackers-caught-with-their-pants-down-in-intercepted-videos/ 13 comments
- 2K warns users their info has been stolen following breach of its help desk | Ars Technica https://arstechnica.com/information-technology/2022/10/2k-warns-users-their-info-has-been-stolen-following-breach-of-its-help-desk/ 9 comments
- Software for sale is fueling a torrent of phishing attacks that bypass MFA | Ars Technica https://arstechnica.com/information-technology/2023/03/software-for-sale-is-fueling-a-torrent-of-phishing-attacks-that-bypass-mfa/ 1 comment
Linked pages
- Billions of devices imperiled by new clickless Bluetooth attack | Ars Technica https://arstechnica.com/information-technology/2017/09/bluetooth-bugs-open-billions-of-devices-to-attacks-no-clicking-required/ 123 comments
- Apple Developer Documentation https://developer.apple.com/documentation/corenfc 68 comments
- Client to Authenticator Protocol (CTAP) https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html 15 comments
- Iranian state hackers caught with their pants down in intercepted videos | Ars Technica https://arstechnica.com/information-technology/2020/07/iran-state-hackers-caught-with-their-pants-down-in-intercepted-videos/ 13 comments
- Man who stole $5M in cryptocurrency via SIM swap pleads guilty | Ars Technica https://arstechnica.com/tech-policy/2019/02/man-who-stole-5m-in-cryptocurrency-via-sim-swap-pleads-guilty/ 5 comments
- Choosing 2FA authenticator apps can be hard. Ars did it so you don’t have to | Ars Technica https://arstechnica.com/information-technology/2020/05/choosing-2fa-authenticator-apps-can-be-hard-ars-did-it-so-you-dont-have-to/ 2 comments
- Google warns Bluetooth Titan security keys can be hijacked by nearby hackers | Ars Technica https://arstechnica.com/information-technology/2019/05/google-warns-bluetooth-titan-security-keys-can-be-hijacked-by-nearby-hackers/ 2 comments
- Google Online Security Blog: Have an iPhone? Use it to protect your Google Account with the Advanced Protection Program https://security.googleblog.com/2020/01/have-iphone-use-it-to-protect-your.html 1 comment
- Bluetooth bugs bite millions of Wi-Fi APs from Cisco, Meraki, and Aruba | Ars Technica https://arstechnica.com/information-technology/2018/11/bluetooth-bugs-bite-millions-of-wi-fi-aps-from-cisco-meraki-and-aruba/ 0 comments
- Web Authentication: An API for accessing Public Key Credentials - Level 2 https://www.w3.org/TR/webauthn/ 0 comments
- I’ll be passing on Google’s new 2fa for logins on iPhones and iPads. Here’s why | Ars Technica https://arstechnica.com/information-technology/2019/06/ill-be-passing-on-googles-new-2fa-for-logins-on-iphones-and-ipads-heres-why/ 0 comments
- Decade-old Bluetooth flaw lets hackers steal data passing between devices | Ars Technica https://arstechnica.com/information-technology/2018/07/decade-old-bluetooth-flaw-lets-hackers-steal-data-passing-between-devices/ 0 comments
Related searches:
Search whole site: site:arstechnica.com
Search title: Apple has finally embraced key-based 2FA. So should you | Ars Technica
See how to search.