Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Authentication + Mobile Phone = Password Killer
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
J_Brandt
J_Brandt,
User Rank: Apprentice
11/29/2013 | 3:19:21 PM
Re: Smartphones as passwords
SecurID and others created soft tokens for smartphones so you wouldn't have to carry around a physical token.  But there are lots of other ways a smart phone can create adaptive security measures.  Using the GPS, it knows where you are and so geolocation can be added as a double check.  You're in your office?  No need to enhance security.  Trying to access material from outside the country?  Hmm maybe we need to challenge you some more.
Alex Kane Rudansky
Alex Kane Rudansky,
User Rank: Apprentice
11/19/2013 | 4:43:35 PM
Healthcare
The password dilemma is seen in every industry, and has been growing in the healthcare industry with the rapid adoption of electronic health records and other technologies that deal with sensitive data and patient information. There's pushback from physicians who don't want to be required to enter multiple passwords for different systems. I can see the touch ID method as a viable option in the healthcare industry as so many docs move from desktops to mobile platforms (BYOD, etc.).
LarsA400
LarsA400,
User Rank: Apprentice
11/19/2013 | 5:24:30 AM
Dream is realized!
This is of course the route to go, using the mobile device as the "password killer".

Here is an example of very good implementation.

A year ago mobile bankID was launched in Sweden and it's already a big success. More and more services, especially financial (like mobile banking/insurance) and governmental/municipal services (like tax services) are using mobile bankID for authentication.

Success factors: it's very easy to use (easier than banks hardware tokens), it's very fast and it's of course very secure, banks in Sweden says it's even more secure than the special hardware tokens...

....and it's maybe the most cost effective authentication solution our there (compared with hardware tokens, OTP's via text message/special scratch cards, PC certificates, etc.).
devinlk
devinlk,
User Rank: Apprentice
11/18/2013 | 5:59:35 PM
Re: Smartphones as passwords
LaunchKey (a member of FIDO along with Nok Nok) has this technology avaialble today. Multi-factor authentication utilizing our smartphones is already here: https://launchkey.com/app/demo

You can log in to any site that supports OpenID or has integrated LaunchKey directly with our plugins and SDKs (like our Dashboard). Let me know if you have any quetsions.

P.S. Nice articl!e Phil!
Laurianne
Laurianne,
User Rank: Apprentice
11/18/2013 | 4:17:22 PM
Re: Smartphones as passwords
I love the idea of smartphone as password too, except the GPS bit scares me a bit. We already get those calls from the bank when we travel and try to do debit card purchases in an unusual locale. That's a tricky balance: you don't want someone raiding your account but you want the ATM card to work on that quick trip. Are password / ID calls next?
dblake950
dblake950,
User Rank: Apprentice
11/18/2013 | 11:28:58 AM
Re: Smartphones as passwords
Wow, we were just discussing the problem with passwords over the weekend around the Facebook story (http://is.gd/h1gYOb), and voila, info on another approach!
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/18/2013 | 11:26:16 AM
Re: Smartphones as passwords -Woof Woof (FIDO)
Thanks for calling FIDO to our attention, Dave! Here's more on the standards and how they work
dak3
dak3,
User Rank: Moderator
11/18/2013 | 11:20:01 AM
Re: Smartphones as passwords
This is a real dog of an idea. Well, FIDO, to be precise. The FIDO Alliance wants to eliminate passwords thru mobile/smartphone technology. With members like Google, MasterCard, PayPal and dozens more they've got a good chance of pulling this off.

 

But Phil knows this :), Nok Nok was a founding member.
Jamescon
Jamescon,
User Rank: Apprentice
11/18/2013 | 9:53:44 AM
Re: Smartphones as passwords
Killing passwords is a dream for me. All of us use dozens of websites and apps every week, each requiring its own password and user name. I don't consider the stack of legal sheets and scrap paper covered with my various user names and passwords (of course with the site name) to meet even the basic standard for infosecurity. So, anything that the mobile phone can do to eliminate passwords gets my vote.
macsgreg
macsgreg,
User Rank: Apprentice
11/18/2013 | 9:50:34 AM
Yes, passwords blow
Finding a way to use a mobile phone for authentication is a great idea. Users are almost always the weakest link in the security chain because users hate passwords....period.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42585
PUBLISHED: 2022-05-23
A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
CVE-2021-42586
PUBLISHED: 2022-05-23
A heap buffer overflow was discovered in copy_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
CVE-2022-1825
PUBLISHED: 2022-05-23
Cross-site Scripting (XSS) - Reflected in GitHub repository collectiveaccess/providence prior to 1.8.
CVE-2022-28874
PUBLISHED: 2022-05-23
Multiple Denial-of-Service vulnerabilities was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed PE32-bit files cause memory corruption and heap buffer overflow which eventually can crash the scanning engine. The exploit can be triggered remotely by an attack...
CVE-2022-29599
PUBLISHED: 2022-05-23
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.