Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

DR Radio: A Grown-Up Conversation About Passwords
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
9/19/2014 | 8:51:12 PM
Re: Not only texts but also images
I wonderif you will have a look at the document posted by a Japanese company Mnemonic Security at

 " mneme.blog.eonet.jp/default/files/outline_of_mnemonic_security.pdf "  Add h t t p / /

and a blogsite

 " mnemonicguard.blogspot.jp/ " Add h t t p / /

 that I am following.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/19/2014 | 9:51:26 AM
Re: Not only texts but also images
HAnatomi -- What would be an example of a known versus unkown image? and how would that work as an authentication factor?
User Rank: Apprentice
9/19/2014 | 3:19:29 AM
Re: Not only texts but also images
It is perhaps impossible for anyone to remember 100 UNKNOWN images afresh.  The images to be used for passwords should be the KNOWN images of our episodic/autobiographic images, which are said to be the least vulerable to the cognitive phenomenon named "interference of memory".

Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/18/2014 | 9:58:50 AM
Re: Not only texts but also images
That's intereting about images. But is the human brain capable of remembering 100 images, one unique authenticator for each app or web site? Or won't that be necessary with images?
User Rank: Apprentice
9/18/2014 | 1:31:34 AM
Not only texts but also images
At the root of the password problem is the cognitive phenomena called "interference of memory", by which we cannot firmly remember more than 5 text passwords on average.  What worries us is not the password, but the textual password.  The textual memory is only a small part of what we remember.  We could think of making use of the larger part of our memory that is less subject to interference of memory.  More attention could be paid to the efforts of expanding the password system to include images, particularly KNOWN images, as well as conventional texts.


Most of the humans are thousands times better at dealing with image memories than text memories. The former dates back to hundreds of millions of years ago while the latter's history is less than a fraction of it.I wonder what merits we have in confining ourselves in the narrow corridor of text memories when CPUs are fast enough, bandwidth broad enough, memory storage cheap enough, and cameras built in mobile devices.
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
9/17/2014 | 3:15:04 PM
Re: No shortage of opinions on this topic!
Really great interview and discussion with Cormac, Sara. His provocative perspective on passwords really generated some great discussion and debate. And of course, there's no good answer for authentication. =)
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/16/2014 | 3:54:56 PM
No shortage of opinions on this topic!
This should be lively discussion, Sara. Everyone has an opinion on passwords - and we've had our share of them on Dark Reading! Andrey Dulkin of CyberArk Research Labs weighed in in July on "Weak Password Advice From Microsoft" (http://www.darkreading.com/operations/identity-and-access-management/weak-password-advice-from-microsoft/a/d-id/1297592) and today,  Corey Nachreiner, of WatchGuard Technologies, gave a qualified "Defense of Passwords" -- as long as you use them correctly along with something else (http://www.darkreading.com/operations/in-defense-of-passwords/a/d-id/1315719?). 

Let the debate begin! 

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-02-02
The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
PUBLISHED: 2023-02-01
In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.
PUBLISHED: 2023-02-01
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metas...
PUBLISHED: 2023-02-01
An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
PUBLISHED: 2023-02-01
An issue was discovered in Joomla! 4.0.0 through 4.2.4. A missing ACL check allows non super-admin users to access com_actionlogs.