Rezultati pretraživanja
  1. 5. velj
  2. 3. velj

    UPDATE: We've added the videos from 2010 to 2019 to our archives!

  3. 10. sij

    The YouTube Playlist is updated, now with all but 2 talks remaining. Enjoy!

  4. 10. sij

    To the video editor: Yes, this is really me! Find out more about the Risk-based Authentication practices of big online services in the talk: Spoiler: Don't hassle the

  5. 2. pro 2019.

    Anyway, I really enjoyed this talk from that’s about reasoning about guess numbers and a lot more. “Reasoning Analytically About Password-Cracking Software” by , Blase Ur, and work from their colleagues.

    Prikaži ovu nit
  6. 30. stu 2019.

    I conducted a study (N=1) on Risk-based auth & SMS auth at . After hearing talk about SMS (day 3) & on RBA, I had both my c-cards and phone stolen. Plus I was in an unusual location for logging into my banks. Not how I wanted to study this.

    Prikaži ovu nit
  7. 28. stu 2019.

    A followup for the people. I had hoped to have this validated before the FTW! presentation. Anyways, here's the latest I know on that embedded browser constraint.

  8. 28. stu 2019.
  9. 28. stu 2019.

    Thank you for making happen and for gathering all of us from all around everywhere. Great conference!

  10. 27. stu 2019.

    I’m really enjoying the bonus track of

  11. 27. stu 2019.
  12. 27. stu 2019.

    Many thanks to for hosting the third day of in their offices!

  13. 26. stu 2019.

    Getting ready for day 3 of which will focus on offensive talks. Looking forward on presenting on the new version of the PCFG toolset. Really excited to get it in front of experts and get feedback.

    Prikaži ovu nit
  14. 26. stu 2019.

    So today is the third day of . As there is no such thing, don’t expect any new tweets. I would love to share this stuff presented here today, but there is a strict no photos/videos/recordings rule. 🤫

  15. 26. stu 2019.

    Oh the fucking irony is strong. Logging into the account I use for Youtube to comment on 's stream (contains talk about this). FUCK risk-based authentication.

  16. 26. stu 2019.

    Je viens de voir une entreprise survivre à une tentative d'intrusion informatique vis brute force ce weekend. La tentative avait commencé avec un password à 4 lettres. Le password du serveur en question est "a" 😭😭😭

  17. 26. stu 2019.

    Följ dag två av PasswordsCon på Youtube här:

  18. 25. stu 2019.

    Completely forgot that is this week as part of - great hashtag to follow for password research, authentication security analysis, etc.

  19. 25. stu 2019.

    Following my talks at and , I'm proud to announce the open sourcing of 's password reuse checking tool to protect our customers against password reuse attacks:

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.