Similar Articles

Articles similar to the selected content.

Domain: blog.danielh.cc Added: 2025-08-13 Status: βœ“ Success
blog.danielh.cc
We replaced passwords with something worse Too many services have been using the following login method: - Enter an email address or phone number - The website will send a 6-digit code - Use the 6-dig...
Similar Articles (10 found)
πŸ” 57.0% similar
There is no longer any such thing as Computer Security
https://blog.codinghorror.com/there-is-no-longer-any-such-thing-as-computer-security/
There is no longer any such thing as Computer Security Remember β€œcybersecurity”? Mysterious hooded computer guys doing mysterious hooded computer guy....
πŸ” View Similar Articles 🟠 HN
πŸ” 47.0% similar
Making user logins more forgiving
http://mcottondesign3.appspot.com/post/ahRzfm1jb3R0b25kZXNpZ24zLWhyZHIMCxIEQmxvZxjCzwsM
Making user logins more forgiving We are currently working on making our login system more forgiving. We started by creating usernames, and then peopl...
πŸ” View Similar Articles
πŸ” 43.0% similar
We all dodged a bullet
https://xeiaso.net/notes/2025/we-dodged-a-bullet/
We all dodged a bullet Published on , 971 words, 4 minutes to read That NPM attack could have been so much worse. Yesterday one of the biggest package...
πŸ” View Similar Articles 🟠 HN
πŸ” 42.9% similar
The MCP Security Survival Guide: Best Practices, Pitfalls, and Real-World Lessons
https://towardsdatascience.com/the-mcp-security-survival-guide-best-practices-pitfalls-and-real-world-lessons/
At the time, I was swept up by how elegant and powerful MCP felt. It was like discovering a universal adapter for AI agents (it is!)β€”finally, I could ...
πŸ” View Similar Articles
πŸ” 40.4% similar
https://bobdahacker.com/blog/rbi-hacked-drive-thrus/
https://bobdahacker.com/blog/rbi-hacked-drive-thrus/
The Setup Picture this: Restaurant Brands International (RBI) – the corporate overlords behind Burger King, Tim Hortons, and Popeyes – control over 30...
πŸ” View Similar Articles 🟠 HN
πŸ” 39.4% similar
Keeping a secure password list
http://mcottondesign3.appspot.com/post/ahRzfm1jb3R0b25kZXNpZ24zLWhyZHIMCxIEQmxvZxiKuAsM
Keeping a secure password list Keeping a secure password list should be an easy task but it isn't. This is the solution I am trying out. - Download ke...
πŸ” View Similar Articles
πŸ” 39.0% similar
Why you should not use JWT - API Bakery
https://apibakery.com/blog/tech/no-jwt/
Technology Why you should not use JWT October 26th, 2021 In this article: How do you handle user authentication in your web app or API? When it comes ...
πŸ” View Similar Articles 🟠 HN
πŸ” 37.7% similar
Hello, I'm 1074018628
https://longform.asmartbear.com/hello-support/
Hello, I’m 1074018628 I just received this email: Yahoo! is committed to the success of account 1074018628 and we believe there is an opportunity to p...
πŸ” View Similar Articles
πŸ” 35.5% similar
Exposed MCP servers across the internet (knostic.ai)
https://news.ycombinator.com/item?id=44604453
Sure, but I was expecting more details on what was available. At least some analysis (perhaps using embeddings) on common function names, types, etc. ...
πŸ” View Similar Articles
πŸ” 35.4% similar
Exposing the Unseen: Mapping MCP Servers Across the Internet
https://www.knostic.ai/blog/mapping-mcp-servers-study
Knostic’s research team conducted a systematic study to locate exposed MCP servers on the internet. Leveraging Shodan and custom Python tools, we fing...
πŸ” View Similar Articles 🟠 HN