Brdsnest Lemmy
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 hours ago

60% of MD5 password hashes are crackable in under an hour

www.theregister.com

external-link
message-square
37
fedilink
128
external-link

60% of MD5 password hashes are crackable in under an hour

www.theregister.com

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 11 hours ago
message-square
37
fedilink
Happy World Password Day! Maybe it's finally time to kill this holiday in favor of World No-More-Passwords Day?
  • t҉̠̙ǵ̣̞̄ͪ͜x̸̱͚̳ͫ͐̑̈ͯͣ̚n̒͌҉͉̦̜̝ͅ@lemmy.tgxn.net
    link
    fedilink
    English
    arrow-up
    6
    ·
    9 hours ago

    Yubikeys are still not biometric unless you’re buying the super-super expensive one. They are just very secure MFA. (in that it’s extremely hard to read the secrets from them even with physical access)

    • fascicle@leminal.space
      link
      fedilink
      English
      arrow-up
      2
      ·
      8 hours ago

      Don’t they just spit out the long password when you press them, I’d figure it would be easy to just plug it into your phone and copy the output if you had physical access

      • t҉̠̙ǵ̣̞̄ͪ͜x̸̱͚̳ͫ͐̑̈ͯͣ̚n̒͌҉͉̦̜̝ͅ@lemmy.tgxn.net
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 hours ago

        That is but one method of Yubikey. They also support cryptographic passkeys and can store TOTP secrets as well as PGP crypto keys.

        The “touch key random key” is a OTP code that can be used for legacy software, Passkey and/or other functions are more valuable to me. Can read more about OTP security here.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 407 users / day
  • 866 users / week
  • 1.92K users / month
  • 3.79K users / 6 months
  • 1 local subscriber
  • 9.93K subscribers
  • 4.96K Posts
  • 7.63K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.5
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org