Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Authentication + Mobile Phone = Password Killer
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
J_Brandt
J_Brandt,
User Rank: Apprentice
11/29/2013 | 3:19:21 PM
Re: Smartphones as passwords
SecurID and others created soft tokens for smartphones so you wouldn't have to carry around a physical token.  But there are lots of other ways a smart phone can create adaptive security measures.  Using the GPS, it knows where you are and so geolocation can be added as a double check.  You're in your office?  No need to enhance security.  Trying to access material from outside the country?  Hmm maybe we need to challenge you some more.
Alex Kane Rudansky
Alex Kane Rudansky,
User Rank: Apprentice
11/19/2013 | 4:43:35 PM
Healthcare
The password dilemma is seen in every industry, and has been growing in the healthcare industry with the rapid adoption of electronic health records and other technologies that deal with sensitive data and patient information. There's pushback from physicians who don't want to be required to enter multiple passwords for different systems. I can see the touch ID method as a viable option in the healthcare industry as so many docs move from desktops to mobile platforms (BYOD, etc.).
LarsA400
LarsA400,
User Rank: Apprentice
11/19/2013 | 5:24:30 AM
Dream is realized!
This is of course the route to go, using the mobile device as the "password killer".

Here is an example of very good implementation.

A year ago mobile bankID was launched in Sweden and it's already a big success. More and more services, especially financial (like mobile banking/insurance) and governmental/municipal services (like tax services) are using mobile bankID for authentication.

Success factors: it's very easy to use (easier than banks hardware tokens), it's very fast and it's of course very secure, banks in Sweden says it's even more secure than the special hardware tokens...

....and it's maybe the most cost effective authentication solution our there (compared with hardware tokens, OTP's via text message/special scratch cards, PC certificates, etc.).
devinlk
devinlk,
User Rank: Apprentice
11/18/2013 | 5:59:35 PM
Re: Smartphones as passwords
LaunchKey (a member of FIDO along with Nok Nok) has this technology avaialble today. Multi-factor authentication utilizing our smartphones is already here: https://launchkey.com/app/demo

You can log in to any site that supports OpenID or has integrated LaunchKey directly with our plugins and SDKs (like our Dashboard). Let me know if you have any quetsions.

P.S. Nice articl!e Phil!
Laurianne
Laurianne,
User Rank: Apprentice
11/18/2013 | 4:17:22 PM
Re: Smartphones as passwords
I love the idea of smartphone as password too, except the GPS bit scares me a bit. We already get those calls from the bank when we travel and try to do debit card purchases in an unusual locale. That's a tricky balance: you don't want someone raiding your account but you want the ATM card to work on that quick trip. Are password / ID calls next?
dblake950
dblake950,
User Rank: Apprentice
11/18/2013 | 11:28:58 AM
Re: Smartphones as passwords
Wow, we were just discussing the problem with passwords over the weekend around the Facebook story (http://is.gd/h1gYOb), and voila, info on another approach!
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/18/2013 | 11:26:16 AM
Re: Smartphones as passwords -Woof Woof (FIDO)
Thanks for calling FIDO to our attention, Dave! Here's more on the standards and how they work
dak3
dak3,
User Rank: Moderator
11/18/2013 | 11:20:01 AM
Re: Smartphones as passwords
This is a real dog of an idea. Well, FIDO, to be precise. The FIDO Alliance wants to eliminate passwords thru mobile/smartphone technology. With members like Google, MasterCard, PayPal and dozens more they've got a good chance of pulling this off.

 

But Phil knows this :), Nok Nok was a founding member.
Jamescon
Jamescon,
User Rank: Apprentice
11/18/2013 | 9:53:44 AM
Re: Smartphones as passwords
Killing passwords is a dream for me. All of us use dozens of websites and apps every week, each requiring its own password and user name. I don't consider the stack of legal sheets and scrap paper covered with my various user names and passwords (of course with the site name) to meet even the basic standard for infosecurity. So, anything that the mobile phone can do to eliminate passwords gets my vote.
macsgreg
macsgreg,
User Rank: Apprentice
11/18/2013 | 9:50:34 AM
Yes, passwords blow
Finding a way to use a mobile phone for authentication is a great idea. Users are almost always the weakest link in the security chain because users hate passwords....period.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...