Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Real Reasons Why Users Stink At Passwords
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
jfontana
50%
50%
jfontana,
User Rank: Author
9/7/2018 | 7:25:49 PM
Two-years on and this story still relevant
This is why authentication is getting a facelift.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/30/2016 | 3:17:52 PM
Re: Passwords and user behavior
I very much agree. I'm thinking this cost pertains more to the laptop, desktop, and server environments. Mobile phones have evolved to the point where touch is the major interface point, making fingerprinting a logical premise. Laptops and other devices outside of the handheld realm haven't been as quick to make that transition. Now with the laptops being touch screen on many of the newer models I can definitely see an integration in the near future. The main question is, on devices that don't have this consistent touch interface what is the cost to create a biometric interface?
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
9/30/2016 | 12:31:18 PM
Re: Passwords and user behavior
I hear you on the issue of cost and multi-factor authentication, RyanSepe. Still, smartphone makers have been able to incorporate fingerprint technology into their gear without any apparent increase in the cost of the phones. So it leaves me wondering, how hard (okay, expensive) can it really be?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:24:11 AM
Re: Changing password often
I would think the potential benefit is random when changing passwords. Meaning if someone is trying to bruteforce it either via dictionary or rainbow tables if you change to a password that was previously attempted then the security principle of changes passwords benefited you. If not, then your password is just a new password that has yet to be attempted.

Can you elaborate to how changing passwords would have a negative effect? Not sure how that plays out. Thanks,
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:21:54 AM
Re: Passwords and user behavior
Yes depending on your method of biometrics privacy concerns are relevant. IE retina scans can identify potential health issues which is private information.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:19:47 AM
Re: Passwords and user behavior
Yes there needs to be consistency. I believe there are laptops that open via fingerprint I am just not sure as to the efficacy of that mechanism for laptops.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/29/2016 | 6:12:29 PM
Re: Passwords and user behavior
"... fingerprint ..." For some reason fingerprints do not pickup on other devices other than mobile phones. I always use it on my iPhone but not on my laptop. It needs to be stable and easy to use across devices.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/29/2016 | 6:09:34 PM
Re: Passwords and user behavior
"... additional parameter is cost ..." Agree. There is cost and there is privacy issues in the alternative solutions. Our DNA clearly indnetifies us uniquelly, of course we are not allowed to use it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/29/2016 | 6:06:39 PM
Re: Passwords and user behavior
"... the human factor ..." Agree. We want things that are simple and not forcing us to remember things in our busy daily lives.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/29/2016 | 6:04:33 PM
Re: Passwords and user behavior
"... Awareness and training will help marginally, ..." Mainly agree but password being the credentialing is a main problem. Not secure by nature.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.