Device Code Phishing

This isn’t new, but it’s increasingly popular:

The technique is known as device code phishing. It exploits “device code flow,” a form of authentication formalized in the industry-wide OAuth standard. Authentication through device code flow is designed for logging printers, smart TVs, and similar devices into accounts. These devices typically don’t support browsers, making it difficult to sign in using more standard forms of authentication, such as entering user names, passwords, and two-factor mechanisms.

Rather than authenticating the user directly, the input-constrained device displays an alphabetic or alphanumeric device code along with a link associated with the user account. The user opens the link on a computer or other device that’s easier to sign in with and enters the code. The remote server then sends a token to the input-constrained device that logs it into the account…

Read More >>

Sources: Alibaba and others approached DeepSeek about funding after its rise, but CEO Liang Wenfeng is cautious; High-Flyer is discussing a pivot from research (The Information)

The Information:
Sources: Alibaba and others approached DeepSeek about funding after its rise, but CEO Liang Wenfeng is cautious; High-Flyer is discussing a pivot from research  —  DeepSeek’s sudden rise to artificial intelligence sta…

Read More >>

RWPQC 2025 Unites Industry Leaders to Drive Cybersecurity and Quantum Innovation

SandboxAQ, MITRE, and The Linux Foundation are pleased to present RWPQC Real World Post Quantum Cryptography (RWPQC) 2025, the third annual conference dedicated to advancing cybersecurity in the post-quantum era. This year’s event will take place on March 24–25, 2025, at the National Palace of Culture in Sofia, Bulgaria. It will offer an essential platform […]

The post RWPQC 2025 Unites Industry Leaders to Drive Cybersecurity and Quantum Innovation appeared first on IT Security Guru.

Read More >>