minus-squareGrumpydaddy@lemmy.worldtoCybersecurity@sh.itjust.works•Authy Users' Phone Numbers Compromised via Twilio API VulnerabilitylinkfedilinkEnglisharrow-up3·2 days agoSo for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites? linkfedilink
minus-squareGrumpydaddy@lemmy.worldtolinuxmemes@lemmy.world•Windows updating just before thesis defenselinkfedilinkarrow-up49·27 days agoCool ceiling tile linkfedilink
minus-squareGrumpydaddy@lemmy.worldtoAsklemmy@lemmy.ml•It's movie night. You don't know who's coming but you have to pick a movie everyone vibes with. What do you choose?linkfedilinkarrow-up2·2 months agoBingo! linkfedilink
minus-squareGrumpydaddy@lemmy.worldtoAsklemmy@lemmy.ml•It's movie night. You don't know who's coming but you have to pick a movie everyone vibes with. What do you choose?linkfedilinkarrow-up6·2 months agoYou’re out if your element, Donny linkfedilink
So for common folk like myself, what do I need to do? I used Authy for a few sites. Can a bad actor pretending to be me now get access to those sites?