Sunday, September 14, 2025

Latest From Category

by Gill Bates

Many are aware that one-time password generation algorithms, such as HOTP, TOTP, and OCRA, have long been used in two-factor authentication systems. The use …

by Melon Ask

In the realm of cybersecurity, Time-Based One-Time Password (TOTP) tokens have become a popular method for adding an additional layer of security to online …

by John McHacker

What are OTPs and Why are They Important for Security?One-Time Password (OTP) is a …

latest blog posts

by Melon Ask

Battling MFA Fatigue Attacks with Hardware Security Keys for Phishing-Resistant MFA As a cybersecurity professional, I have witnessed how …

by Melon Ask

16 Billion Stolen Passwords — Why You Need to Act Now June 19, 2025 — The largest password breach …

by Melon Ask

As a cybersecurity professional, there is a serious vulnerability that I would like to bring to your attention; recently …

by Gill Bates

Passwords are something we deal with every day. They were invented many years ago, and we still rely on …

editor

John McHacker

John was a computer programmer and hacker known for his expertise in breaking into secure computer systems. He developed a reputation as a master of computer security and was often hired by companies to test the strength of their cybersecurity measures.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept