article thumbnail

Building Password Purgatory with Cloudflare Pages and Workers

Troy Hunt

Last month as part of my blog post on How Everything We're Told About Website Identity Assurance is Wrong , I spun up a Cloudflare Pages website for the first time and hosted digicert-secured.com there (the page has a seal on it so you know you can trust it). All they have to do first is create a password.

Passwords 348
article thumbnail

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Krebs on Security

government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. PASSIVE DNS. That changed on Jan.

DNS 271
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generated Passwords, UX and Security Absolutism

Troy Hunt

So why doesn't every site take away the ability for people to choose their own passwords? Why not just generate the password for them thus completely eradicating password reuse? It doesn't matter who generated the password. passwords ?? But how relevant is this criticism when the passwords are system-generated?

Passwords 161
article thumbnail

The Life and Death of Passwords: Driving Passwordless Forward With WebAuthn

Duo's Security Blog

Our documentary, “ The Life and Death of Passwords ,” explores with industry experts the history of passwords, why passwords have become less effective over time, and how trust is established in a passwordless future. The problems with passwords Chrysta: Why was passwordless needed in the first place?

article thumbnail

GUEST ESSAY: A full checklist on how to spot pharming attacks — and avoid becoming a victim

The Last Watchdog

The Pharming attacks are carried out by modifying the settings on the victim’s system or compromising the DNS server. Manipulating the Domain Name Service (DNS) protocol and rerouting the victim from its intended web address to the fake web address can be done in the following two ways: •Changing the Local Host file.

DNS 214
article thumbnail

April’s Patch Tuesday Brings Record Number of Fixes

Krebs on Security

Microsoft today released updates to address 147 security holes in Windows, Office , Azure ,NET Framework , Visual Studio , SQL Server , DNS Server , Windows Defender , Bitlocker , and Windows Secure Boot. Yes, you read that right. “As far as I can tell, it’s the largest Patch Tuesday release from Microsoft of all time.”

DNS 250
article thumbnail

Seamless A/B Testing, Deployment Slots and DNS Rollover with Azure Functions and Cloudflare Workers

Troy Hunt

If you have an efficient function that executes quickly it can be extremely cost effective as I recently demonstrated with the Pwned Passwords figures : So here's the hard facts - I'm dipping into my pocket every week to the tune of. for you guys to do 54M searches against a repository of half a billion passwords ??

DNS 129