DEV Community

Avi Kapoor profile picture

Avi Kapoor

NodeJs and Golang Lover

Education

University of California, Berkeley

Four Year Club
Writing Debut
Three Year Club
Two Year Club
One Year Club
Hacktoberfest 2020
4 Week Writing Streak
🚀 Implement Passwordless Auth with MojoAuth in 10 Minutes (Yes, Really!)

🚀 Implement Passwordless Auth with MojoAuth in 10 Minutes (Yes, Really!)

Comments
2 min read
Secure iOS Login & Registration with Swift & UIKit Guide

Secure iOS Login & Registration with Swift & UIKit Guide

Comments
3 min read
Account Takeover: The Silent Threat to Businesses and Consumers

Account Takeover: The Silent Threat to Businesses and Consumers

1
Comments
7 min read
Understanding Bitwise XOR: A Deep Dive

Understanding Bitwise XOR: A Deep Dive

Comments
3 min read
Passwordless Authentication Streamlines Cyber Insurance and Bolsters Security

Passwordless Authentication Streamlines Cyber Insurance and Bolsters Security

Comments
5 min read
Frictionless Authentication for Devoted Fans: How MojoAuth Empowers Customer-Centric Brands

Frictionless Authentication for Devoted Fans: How MojoAuth Empowers Customer-Centric Brands

Comments
5 min read
The Future of Login is Here: A Frictionless and Secure Authentication Flow for Everyone

The Future of Login is Here: A Frictionless and Secure Authentication Flow for Everyone

Comments
2 min read
Powering Seamless Growth: MojoAuth's Role in Supercharging Authentication for Scaling Companies

Powering Seamless Growth: MojoAuth's Role in Supercharging Authentication for Scaling Companies

Comments
6 min read
MojoAuth: Leveling Up Security and User Experience for Social Media and Gaming Giants

MojoAuth: Leveling Up Security and User Experience for Social Media and Gaming Giants

Comments
6 min read
The Rise of Generative AI: Exciting Possibilities and Mounting Security Threats

The Rise of Generative AI: Exciting Possibilities and Mounting Security Threats

Comments
5 min read
Safeguarding Health and Wellness in the Digital Age

Safeguarding Health and Wellness in the Digital Age

Comments
5 min read
MojoAuth vs. ForgeRock for Cloud-Centric Security and Scalability

MojoAuth vs. ForgeRock for Cloud-Centric Security and Scalability

Comments
3 min read
Protecting Marketplaces and Gig Platforms from Account Takeovers

Protecting Marketplaces and Gig Platforms from Account Takeovers

Comments
7 min read
Passwordless Powerhouse: MojoAuth vs. Auth0 for E-commerce and Travel

Passwordless Powerhouse: MojoAuth vs. Auth0 for E-commerce and Travel

Comments
3 min read
Safeguarding Financial Fortresses: How MojoAuth Transforms Authentication

Safeguarding Financial Fortresses: How MojoAuth Transforms Authentication

Comments
6 min read
The Love-Hate Relationship with Password Policies: A Business vs. Consumer Tug-of-War

The Love-Hate Relationship with Password Policies: A Business vs. Consumer Tug-of-War

Comments
6 min read
MojoAuth: Seamless Authentication for a Smooth Travel and Hospitality Experience

MojoAuth: Seamless Authentication for a Smooth Travel and Hospitality Experience

Comments
6 min read
The End of Passwords: Why Your Business Needs a Passwordless Future

The End of Passwords: Why Your Business Needs a Passwordless Future

Comments
5 min read
Bulletproof Your E-commerce Platform with MojoAuth: Passwordless Security for a Seamless Customer Experience

Bulletproof Your E-commerce Platform with MojoAuth: Passwordless Security for a Seamless Customer Experience

Comments
6 min read
Adaptive Authentication: Balancing Security and User Experience in B2C with MojoAuth

Adaptive Authentication: Balancing Security and User Experience in B2C with MojoAuth

Comments
6 min read
The Era of Passkeys: Revolutionizing B2C Authentication with MojoAuth

The Era of Passkeys: Revolutionizing B2C Authentication with MojoAuth

Comments
5 min read
Case Study: Best Buy's Journey to Passwordless Consumer Login

Case Study: Best Buy's Journey to Passwordless Consumer Login

Comments
4 min read
Session Management 101: A Beginner's Guide for Web Developers

Session Management 101: A Beginner's Guide for Web Developers

Comments
3 min read
Incident Response for B2C E-commerce: Are You Prepared for a Data Breach?

Incident Response for B2C E-commerce: Are You Prepared for a Data Breach?

Comments
6 min read
The Security vs. Convenience Conundrum: Striking a Balance in B2C E-commerce

The Security vs. Convenience Conundrum: Striking a Balance in B2C E-commerce

Comments
5 min read
The Silent Thief: E-commerce Fraud and Strategies to Safeguard Your Bottom Line

The Silent Thief: E-commerce Fraud and Strategies to Safeguard Your Bottom Line

Comments
5 min read
Beyond Passwords: How to Protect Your Customers (and Your Business) from Account Takeover

Beyond Passwords: How to Protect Your Customers (and Your Business) from Account Takeover

Comments
6 min read
The Silent Profit Killer: How Credential Stuffing Threatens B2C E-commerce

The Silent Profit Killer: How Credential Stuffing Threatens B2C E-commerce

Comments
5 min read
ID Verification In 2023: What's New And What You Need To Know

ID Verification In 2023: What's New And What You Need To Know

Comments
4 min read
Your Passwords Are Not Safe: AI Can Crack Them in Minutes

Your Passwords Are Not Safe: AI Can Crack Them in Minutes

Comments
2 min read
Understanding the Difference: Authentication vs. Authorization

Understanding the Difference: Authentication vs. Authorization

Comments
4 min read
The Ultimate Guide to Password Security: Boost Your Online Protection

The Ultimate Guide to Password Security: Boost Your Online Protection

Comments
3 min read
5 Ways to Improve User Trust and Confidence with Secure Authentication Methods

5 Ways to Improve User Trust and Confidence with Secure Authentication Methods

Comments
7 min read
Passkeys vs Passwords: The Future of Digital Authentication

Passkeys vs Passwords: The Future of Digital Authentication

Comments
3 min read
Passwordless Authentication: The Key to Preventing Credential Stuffing

Passwordless Authentication: The Key to Preventing Credential Stuffing

Comments
4 min read
Top 5 Passwordless Providers for Retail and E-commerce

Top 5 Passwordless Providers for Retail and E-commerce

Comments
5 min read
Experience Effortless Security with Affirm's Passwordless Login System

Experience Effortless Security with Affirm's Passwordless Login System

Comments
1 min read
What Is Credential Stuffing? How To Prevent Credential Stuffing Attacks

What Is Credential Stuffing? How To Prevent Credential Stuffing Attacks

Comments
1 min read
Password Hashing 101: All About Password Hashing and How it Works

Password Hashing 101: All About Password Hashing and How it Works

Comments
1 min read
Industry trends and developments in passwordless authentication

Industry trends and developments in passwordless authentication

Comments
1 min read
The Complete Guide to Angular User Authentication with Passkeys

The Complete Guide to Angular User Authentication with Passkeys

Comments
1 min read
MFA vs. SSO: What is the Difference?

MFA vs. SSO: What is the Difference?

Comments
1 min read
Most Used REST API Authentication Methods & Strategies

Most Used REST API Authentication Methods & Strategies

Comments
1 min read
What is Credential Stuffing? 10 Ways of Prevention

What is Credential Stuffing? 10 Ways of Prevention

Comments
1 min read
Authentication vs. Authorization – What's the Difference?

Authentication vs. Authorization – What's the Difference?

Comments
1 min read
7 Tips for Low-Friction Authentication

7 Tips for Low-Friction Authentication

Comments
9 min read
What Is Password Salting & How It Improves Security?

What Is Password Salting & How It Improves Security?

Comments
1 min read
9 Best Practices for Multi-factor Authentication (MFA)

9 Best Practices for Multi-factor Authentication (MFA)

Comments
1 min read
Email/MagicLink Authentication in SolidJS

Email/MagicLink Authentication in SolidJS

Comments
1 min read
Top 15 Password Alternatives with Pros and Cons

Top 15 Password Alternatives with Pros and Cons

Comments
1 min read
9 Most Common Types of Password Attacks and How to Stop Them

9 Most Common Types of Password Attacks and How to Stop Them

Comments
1 min read
Medium, Slack and Notion provide a better alternative for Social Logins to their users.

Medium, Slack and Notion provide a better alternative for Social Logins to their users.

Comments
1 min read
What is passkey?

What is passkey?

Comments
1 min read
Top 10 Biggest Data Breaches of 2022 and Learnings From Them

Top 10 Biggest Data Breaches of 2022 and Learnings From Them

Comments
1 min read
Passkeys: FIDO’s new mission to completely remove passwords

Passkeys: FIDO’s new mission to completely remove passwords

Comments
6 min read
20+ Best SaaS Black Friday Deals For 2022

20+ Best SaaS Black Friday Deals For 2022

Comments
1 min read
How to Implement Passwordless Authentication in Next.js

How to Implement Passwordless Authentication in Next.js

1
Comments
1 min read
How Secure Is Passwordless Authentication for Businesses?

How Secure Is Passwordless Authentication for Businesses?

1
Comments
1 min read
Passwords, No more pain

Passwords, No more pain

1
Comments
1 min read
Passwordless Authentication with React and MojoAuth

Passwordless Authentication with React and MojoAuth

Comments
1 min read
loading...