Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Authentication + Mobile Phone = Password Killer
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/18/2013 | 9:44:36 AM
Smartphones as passwords
Phil, I love the idea of smartphones as a password killer and the idea using existing functions like cameras and GPS in the authentication processes is very exciting. Do you have examples where this is already being implemented or piloted? 
macsgreg
macsgreg,
User Rank: Apprentice
11/18/2013 | 9:50:34 AM
Yes, passwords blow
Finding a way to use a mobile phone for authentication is a great idea. Users are almost always the weakest link in the security chain because users hate passwords....period.
Jamescon
Jamescon,
User Rank: Apprentice
11/18/2013 | 9:53:44 AM
Re: Smartphones as passwords
Killing passwords is a dream for me. All of us use dozens of websites and apps every week, each requiring its own password and user name. I don't consider the stack of legal sheets and scrap paper covered with my various user names and passwords (of course with the site name) to meet even the basic standard for infosecurity. So, anything that the mobile phone can do to eliminate passwords gets my vote.
dak3
dak3,
User Rank: Moderator
11/18/2013 | 11:20:01 AM
Re: Smartphones as passwords
This is a real dog of an idea. Well, FIDO, to be precise. The FIDO Alliance wants to eliminate passwords thru mobile/smartphone technology. With members like Google, MasterCard, PayPal and dozens more they've got a good chance of pulling this off.

 

But Phil knows this :), Nok Nok was a founding member.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/18/2013 | 11:26:16 AM
Re: Smartphones as passwords -Woof Woof (FIDO)
Thanks for calling FIDO to our attention, Dave! Here's more on the standards and how they work
dblake950
dblake950,
User Rank: Apprentice
11/18/2013 | 11:28:58 AM
Re: Smartphones as passwords
Wow, we were just discussing the problem with passwords over the weekend around the Facebook story (http://is.gd/h1gYOb), and voila, info on another approach!
Laurianne
Laurianne,
User Rank: Apprentice
11/18/2013 | 4:17:22 PM
Re: Smartphones as passwords
I love the idea of smartphone as password too, except the GPS bit scares me a bit. We already get those calls from the bank when we travel and try to do debit card purchases in an unusual locale. That's a tricky balance: you don't want someone raiding your account but you want the ATM card to work on that quick trip. Are password / ID calls next?
devinlk
devinlk,
User Rank: Apprentice
11/18/2013 | 5:59:35 PM
Re: Smartphones as passwords
LaunchKey (a member of FIDO along with Nok Nok) has this technology avaialble today. Multi-factor authentication utilizing our smartphones is already here: https://launchkey.com/app/demo

You can log in to any site that supports OpenID or has integrated LaunchKey directly with our plugins and SDKs (like our Dashboard). Let me know if you have any quetsions.

P.S. Nice articl!e Phil!
LarsA400
LarsA400,
User Rank: Apprentice
11/19/2013 | 5:24:30 AM
Dream is realized!
This is of course the route to go, using the mobile device as the "password killer".

Here is an example of very good implementation.

A year ago mobile bankID was launched in Sweden and it's already a big success. More and more services, especially financial (like mobile banking/insurance) and governmental/municipal services (like tax services) are using mobile bankID for authentication.

Success factors: it's very easy to use (easier than banks hardware tokens), it's very fast and it's of course very secure, banks in Sweden says it's even more secure than the special hardware tokens...

....and it's maybe the most cost effective authentication solution our there (compared with hardware tokens, OTP's via text message/special scratch cards, PC certificates, etc.).
Alex Kane Rudansky
Alex Kane Rudansky,
User Rank: Apprentice
11/19/2013 | 4:43:35 PM
Healthcare
The password dilemma is seen in every industry, and has been growing in the healthcare industry with the rapid adoption of electronic health records and other technologies that deal with sensitive data and patient information. There's pushback from physicians who don't want to be required to enter multiple passwords for different systems. I can see the touch ID method as a viable option in the healthcare industry as so many docs move from desktops to mobile platforms (BYOD, etc.).
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-38777
PUBLISHED: 2023-02-08
An issue was discovered in the rollback feature of Elastic Endpoint Security for Windows, which could allow unprivileged users to elevate their privileges to those of the LocalSystem account.
CVE-2022-38778
PUBLISHED: 2023-02-08
A flaw (CVE-2022-38900) was discovered in one of Kibana’s third party dependencies, that could allow an authenticated user to perform a request that crashes the Kibana server process.
CVE-2022-45982
PUBLISHED: 2023-02-08
thinkphp 6.0.0~6.0.13 and 6.1.0~6.1.1 contains a deserialization vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
CVE-2022-47648
PUBLISHED: 2023-02-08
Bosch Security Systems B420 firmware 02.02.0001 employs IP based authorization in its authentication mechanism, allowing attackers to access the device as long as they are on the same network as a legitimate user.
CVE-2023-25163
PUBLISHED: 2023-02-08
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message...