DEV Community

MojoAuth profile picture
Four Year Club
Writing Debut
Three Year Club
Two Year Club
One Year Club
Hacktoberfest 2020
4 Week Writing Streak
Secure iOS Login & Registration with Swift & UIKit Guide

Secure iOS Login & Registration with Swift & UIKit Guide

Comments
3 min read
Account Takeover: The Silent Threat to Businesses and Consumers

Account Takeover: The Silent Threat to Businesses and Consumers

1
Comments
7 min read
Understanding Bitwise XOR: A Deep Dive

Understanding Bitwise XOR: A Deep Dive

Comments
3 min read
Passwordless Authentication Streamlines Cyber Insurance and Bolsters Security

Passwordless Authentication Streamlines Cyber Insurance and Bolsters Security

Comments
5 min read
Frictionless Authentication for Devoted Fans: How MojoAuth Empowers Customer-Centric Brands

Frictionless Authentication for Devoted Fans: How MojoAuth Empowers Customer-Centric Brands

Comments
5 min read
The Future of Login is Here: A Frictionless and Secure Authentication Flow for Everyone

The Future of Login is Here: A Frictionless and Secure Authentication Flow for Everyone

Comments
2 min read
Powering Seamless Growth: MojoAuth's Role in Supercharging Authentication for Scaling Companies

Powering Seamless Growth: MojoAuth's Role in Supercharging Authentication for Scaling Companies

Comments
6 min read
MojoAuth: Leveling Up Security and User Experience for Social Media and Gaming Giants

MojoAuth: Leveling Up Security and User Experience for Social Media and Gaming Giants

Comments
6 min read
The Rise of Generative AI: Exciting Possibilities and Mounting Security Threats

The Rise of Generative AI: Exciting Possibilities and Mounting Security Threats

Comments
5 min read
Safeguarding Health and Wellness in the Digital Age

Safeguarding Health and Wellness in the Digital Age

Comments
5 min read
MojoAuth vs. ForgeRock for Cloud-Centric Security and Scalability

MojoAuth vs. ForgeRock for Cloud-Centric Security and Scalability

Comments
3 min read
Protecting Marketplaces and Gig Platforms from Account Takeovers

Protecting Marketplaces and Gig Platforms from Account Takeovers

Comments
7 min read
Passwordless Powerhouse: MojoAuth vs. Auth0 for E-commerce and Travel

Passwordless Powerhouse: MojoAuth vs. Auth0 for E-commerce and Travel

Comments
3 min read
Safeguarding Financial Fortresses: How MojoAuth Transforms Authentication

Safeguarding Financial Fortresses: How MojoAuth Transforms Authentication

Comments
6 min read
The Love-Hate Relationship with Password Policies: A Business vs. Consumer Tug-of-War

The Love-Hate Relationship with Password Policies: A Business vs. Consumer Tug-of-War

Comments
6 min read
MojoAuth: Seamless Authentication for a Smooth Travel and Hospitality Experience

MojoAuth: Seamless Authentication for a Smooth Travel and Hospitality Experience

Comments
6 min read
The End of Passwords: Why Your Business Needs a Passwordless Future

The End of Passwords: Why Your Business Needs a Passwordless Future

Comments
5 min read
Bulletproof Your E-commerce Platform with MojoAuth: Passwordless Security for a Seamless Customer Experience

Bulletproof Your E-commerce Platform with MojoAuth: Passwordless Security for a Seamless Customer Experience

Comments
6 min read
Adaptive Authentication: Balancing Security and User Experience in B2C with MojoAuth

Adaptive Authentication: Balancing Security and User Experience in B2C with MojoAuth

Comments
6 min read
The Era of Passkeys: Revolutionizing B2C Authentication with MojoAuth

The Era of Passkeys: Revolutionizing B2C Authentication with MojoAuth

Comments
5 min read
Case Study: Best Buy's Journey to Passwordless Consumer Login

Case Study: Best Buy's Journey to Passwordless Consumer Login

Comments
4 min read
Session Management 101: A Beginner's Guide for Web Developers

Session Management 101: A Beginner's Guide for Web Developers

Comments
3 min read
Incident Response for B2C E-commerce: Are You Prepared for a Data Breach?

Incident Response for B2C E-commerce: Are You Prepared for a Data Breach?

Comments
6 min read
The Security vs. Convenience Conundrum: Striking a Balance in B2C E-commerce

The Security vs. Convenience Conundrum: Striking a Balance in B2C E-commerce

Comments
5 min read
The Silent Thief: E-commerce Fraud and Strategies to Safeguard Your Bottom Line

The Silent Thief: E-commerce Fraud and Strategies to Safeguard Your Bottom Line

Comments
5 min read
Beyond Passwords: How to Protect Your Customers (and Your Business) from Account Takeover

Beyond Passwords: How to Protect Your Customers (and Your Business) from Account Takeover

Comments
6 min read
The Silent Profit Killer: How Credential Stuffing Threatens B2C E-commerce

The Silent Profit Killer: How Credential Stuffing Threatens B2C E-commerce

Comments
5 min read
ID Verification In 2023: What's New And What You Need To Know

ID Verification In 2023: What's New And What You Need To Know

Comments
4 min read
Your Passwords Are Not Safe: AI Can Crack Them in Minutes

Your Passwords Are Not Safe: AI Can Crack Them in Minutes

Comments
2 min read
Understanding the Difference: Authentication vs. Authorization

Understanding the Difference: Authentication vs. Authorization

Comments
4 min read
The Ultimate Guide to Password Security: Boost Your Online Protection

The Ultimate Guide to Password Security: Boost Your Online Protection

Comments
3 min read
5 Ways to Improve User Trust and Confidence with Secure Authentication Methods

5 Ways to Improve User Trust and Confidence with Secure Authentication Methods

Comments
7 min read
Passkeys vs Passwords: The Future of Digital Authentication

Passkeys vs Passwords: The Future of Digital Authentication

Comments
3 min read
Passwordless Authentication: The Key to Preventing Credential Stuffing

Passwordless Authentication: The Key to Preventing Credential Stuffing

Comments
4 min read
Top 5 Passwordless Providers for Retail and E-commerce

Top 5 Passwordless Providers for Retail and E-commerce

Comments
5 min read
Experience Effortless Security with Affirm's Passwordless Login System

Experience Effortless Security with Affirm's Passwordless Login System

Comments
1 min read
What Is Credential Stuffing? How To Prevent Credential Stuffing Attacks

What Is Credential Stuffing? How To Prevent Credential Stuffing Attacks

Comments
1 min read
Password Hashing 101: All About Password Hashing and How it Works

Password Hashing 101: All About Password Hashing and How it Works

Comments
1 min read
Industry trends and developments in passwordless authentication

Industry trends and developments in passwordless authentication

Comments
1 min read
The Complete Guide to Angular User Authentication with Passkeys

The Complete Guide to Angular User Authentication with Passkeys

Comments
1 min read
MFA vs. SSO: What is the Difference?

MFA vs. SSO: What is the Difference?

Comments
1 min read
Most Used REST API Authentication Methods & Strategies

Most Used REST API Authentication Methods & Strategies

Comments
1 min read
What is Credential Stuffing? 10 Ways of Prevention

What is Credential Stuffing? 10 Ways of Prevention

Comments
1 min read
Authentication vs. Authorization – What's the Difference?

Authentication vs. Authorization – What's the Difference?

Comments
1 min read
7 Tips for Low-Friction Authentication

7 Tips for Low-Friction Authentication

Comments
9 min read
What Is Password Salting & How It Improves Security?

What Is Password Salting & How It Improves Security?

Comments
1 min read
9 Best Practices for Multi-factor Authentication (MFA)

9 Best Practices for Multi-factor Authentication (MFA)

Comments
1 min read
Email/MagicLink Authentication in SolidJS

Email/MagicLink Authentication in SolidJS

Comments
1 min read
Top 15 Password Alternatives with Pros and Cons

Top 15 Password Alternatives with Pros and Cons

Comments
1 min read
9 Most Common Types of Password Attacks and How to Stop Them

9 Most Common Types of Password Attacks and How to Stop Them

Comments
1 min read
Medium, Slack and Notion provide a better alternative for Social Logins to their users.

Medium, Slack and Notion provide a better alternative for Social Logins to their users.

Comments
1 min read
What is passkey?

What is passkey?

Comments
1 min read
Top 10 Biggest Data Breaches of 2022 and Learnings From Them

Top 10 Biggest Data Breaches of 2022 and Learnings From Them

Comments
1 min read
Passkeys: FIDO’s new mission to completely remove passwords

Passkeys: FIDO’s new mission to completely remove passwords

Comments
6 min read
20+ Best SaaS Black Friday Deals For 2022

20+ Best SaaS Black Friday Deals For 2022

Comments
1 min read
How to Implement Passwordless Authentication in Next.js

How to Implement Passwordless Authentication in Next.js

1
Comments
1 min read
How Secure Is Passwordless Authentication for Businesses?

How Secure Is Passwordless Authentication for Businesses?

1
Comments
1 min read
Passwords, No more pain

Passwords, No more pain

1
Comments
1 min read
Passwordless Authentication with React and MojoAuth

Passwordless Authentication with React and MojoAuth

Comments
1 min read
Google Chatbot Setup With Golang

Google Chatbot Setup With Golang

Comments
1 min read
loading...