Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Real Reasons Why Users Stink At Passwords
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
jfontana
jfontana,
User Rank: Author
9/7/2018 | 7:25:49 PM
Two-years on and this story still relevant
This is why authentication is getting a facelift.
RyanSepe
RyanSepe,
User Rank: Ninja
9/30/2016 | 3:17:52 PM
Re: Passwords and user behavior
I very much agree. I'm thinking this cost pertains more to the laptop, desktop, and server environments. Mobile phones have evolved to the point where touch is the major interface point, making fingerprinting a logical premise. Laptops and other devices outside of the handheld realm haven't been as quick to make that transition. Now with the laptops being touch screen on many of the newer models I can definitely see an integration in the near future. The main question is, on devices that don't have this consistent touch interface what is the cost to create a biometric interface?
T Sweeney
T Sweeney,
User Rank: Moderator
9/30/2016 | 12:31:18 PM
Re: Passwords and user behavior
I hear you on the issue of cost and multi-factor authentication, RyanSepe. Still, smartphone makers have been able to incorporate fingerprint technology into their gear without any apparent increase in the cost of the phones. So it leaves me wondering, how hard (okay, expensive) can it really be?
RyanSepe
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:24:11 AM
Re: Changing password often
I would think the potential benefit is random when changing passwords. Meaning if someone is trying to bruteforce it either via dictionary or rainbow tables if you change to a password that was previously attempted then the security principle of changes passwords benefited you. If not, then your password is just a new password that has yet to be attempted.

Can you elaborate to how changing passwords would have a negative effect? Not sure how that plays out. Thanks,
RyanSepe
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:21:54 AM
Re: Passwords and user behavior
Yes depending on your method of biometrics privacy concerns are relevant. IE retina scans can identify potential health issues which is private information.
RyanSepe
RyanSepe,
User Rank: Ninja
9/30/2016 | 9:19:47 AM
Re: Passwords and user behavior
Yes there needs to be consistency. I believe there are laptops that open via fingerprint I am just not sure as to the efficacy of that mechanism for laptops.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:12:29 PM
Re: Passwords and user behavior
"... fingerprint ..." For some reason fingerprints do not pickup on other devices other than mobile phones. I always use it on my iPhone but not on my laptop. It needs to be stable and easy to use across devices.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:09:34 PM
Re: Passwords and user behavior
"... additional parameter is cost ..." Agree. There is cost and there is privacy issues in the alternative solutions. Our DNA clearly indnetifies us uniquelly, of course we are not allowed to use it.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:06:39 PM
Re: Passwords and user behavior
"... the human factor ..." Agree. We want things that are simple and not forcing us to remember things in our busy daily lives.
Dr.T
Dr.T,
User Rank: Ninja
9/29/2016 | 6:04:33 PM
Re: Passwords and user behavior
"... Awareness and training will help marginally, ..." Mainly agree but password being the credentialing is a main problem. Not secure by nature.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42247
PUBLISHED: 2022-10-03
pfSense v2.5.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the browser.php component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a file name.
CVE-2022-41443
PUBLISHED: 2022-10-03
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php.
CVE-2022-33882
PUBLISHED: 2022-10-03
Under certain conditions, an attacker could create an unintended sphere of control through a vulnerability present in file delete operation in Autodesk desktop app (ADA). An attacker could leverage this vulnerability to escalate privileges and execute arbitrary code.
CVE-2022-42306
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can send a crafted packet to pbx_exchange during registration and cause a NULL pointer exception, effectively crashing the pbx_exchange process.
CVE-2022-42307
PUBLISHED: 2022-10-03
An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) Injection attack through the DiscoveryService service.