Tag

Two-Factor Authentication

1 views collected around this technical thread.

Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
IT Services Circle
IT Services Circle
Oct 21, 2024 · Information Security

Understanding Microsoft Account Fatigue Attacks and Security Recommendations

The article explains how fatigue attacks target Microsoft accounts by repeatedly sending login prompts, describes Microsoft's new numeric verification safeguard, and offers practical security measures such as changing passwords, using passkeys, switching to alternative authenticators, and updating the linked email to protect personal data.

Credential StuffingFatigue AttackMicrosoft
0 likes · 5 min read
Understanding Microsoft Account Fatigue Attacks and Security Recommendations
Selected Java Interview Questions
Selected Java Interview Questions
May 25, 2023 · Information Security

Implementing Two-Factor Authentication in Spring Security with Google Authenticator, Authy, and Custom TOTP

This article explains how to add two‑factor authentication to a Spring Security‑based Java web application by integrating Google Authenticator, Authy, or a custom TOTP module, covering required dependencies, service implementations, security configuration, and testing procedures.

AuthyGoogle AuthenticatorJava
0 likes · 29 min read
Implementing Two-Factor Authentication in Spring Security with Google Authenticator, Authy, and Custom TOTP
php中文网 Courses
php中文网 Courses
May 20, 2023 · Information Security

Preventing Brute‑Force Attacks in PHP Applications

This article explains what brute‑force attacks are, why they threaten PHP applications, and presents three practical defenses—two‑factor authentication, enforced password policies, and brute‑force mitigation techniques—along with complete PHP code examples for each method.

Brute ForceSecurityTwo-Factor Authentication
0 likes · 4 min read
Preventing Brute‑Force Attacks in PHP Applications
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

Brute ForceHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

Brute ForceHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
High Availability Architecture
High Availability Architecture
Jul 30, 2015 · Information Security

Web Application Security Threats and Mitigation Strategies

This article outlines the most common web application security threats—including XSS, SQL injection, CSRF, transmission hijacking, credential leaks, brute‑force attacks, and token theft—and provides practical mitigation techniques such as proper escaping, CSP, parameterized queries, CSRF tokens, HTTPS, HSTS, HPKP, encrypted password storage, two‑factor authentication, and robust token handling.

CSPCSRFHTTPS
0 likes · 26 min read
Web Application Security Threats and Mitigation Strategies
Baidu Tech Salon
Baidu Tech Salon
Oct 23, 2014 · Information Security

Designing Two-Factor Authentication Using WeChat: Balancing Security and User Experience

The article outlines a WeChat‑based two‑factor authentication design that binds user accounts via QR codes, leverages WeChat push messages to avoid SMS reliability issues, addresses daily‑message limits and mobile scanning constraints, and demonstrates how this approach can enhance security while preserving a seamless user experience.

SecurityTwo-Factor AuthenticationWeChat
0 likes · 13 min read
Designing Two-Factor Authentication Using WeChat: Balancing Security and User Experience