A Security/Usability Review of Wordpress 2FA Plugins
Practical Application Whitelisting Evasion
The story of L0phtCrack
The Internet of ... Mainframes?! WTF?
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
What's New Pussycat: Recent Improvements to Powercat
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
Breachego
Hacking Our Way Into Hacking
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
Stress, Burnout, Rinse, Repeat
Poppin' (Digital) Locks
Privileges in the Real World: Securing Password Management
All You Need Is One: A ClickOnce Love Story
Security Questions Considered Harmful
I Forgot My Password
Bio-Hacking: Implantable chip attack vector
Harvesting Passwords from Source Code, Scripts, and Code Repositories
Towards Standardizing Comparisons of Password Guessability
Stronger Password-Based Encryption Using I/O Hardness
Fishing To Phishing - It’s all about slimy creatures.
Auth for Encrypted Services with Server Side APT
Blind Hashing
Insider Tricks for Bug Bounty Success
PBKDF2: Performance Matters
Password Alert by Google
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
No More Graphical Passwords
Ask the EFF
How Secure Are Multi-Word Random Passphrases?
Are You Sure That You Still Need Passwords?