Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Authentication + Mobile Phone = Password Killer
Threaded  |  Newest First  |  Oldest First
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
11/18/2013 | 9:44:36 AM
Smartphones as passwords
Phil, I love the idea of smartphones as a password killer and the idea using existing functions like cameras and GPS in the authentication processes is very exciting. Do you have examples where this is already being implemented or piloted? 
Jamescon
50%
50%
Jamescon,
User Rank: Apprentice
11/18/2013 | 9:53:44 AM
Re: Smartphones as passwords
Killing passwords is a dream for me. All of us use dozens of websites and apps every week, each requiring its own password and user name. I don't consider the stack of legal sheets and scrap paper covered with my various user names and passwords (of course with the site name) to meet even the basic standard for infosecurity. So, anything that the mobile phone can do to eliminate passwords gets my vote.
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
11/18/2013 | 4:17:22 PM
Re: Smartphones as passwords
I love the idea of smartphone as password too, except the GPS bit scares me a bit. We already get those calls from the bank when we travel and try to do debit card purchases in an unusual locale. That's a tricky balance: you don't want someone raiding your account but you want the ATM card to work on that quick trip. Are password / ID calls next?
dak3
50%
50%
dak3,
User Rank: Moderator
11/18/2013 | 11:20:01 AM
Re: Smartphones as passwords
This is a real dog of an idea. Well, FIDO, to be precise. The FIDO Alliance wants to eliminate passwords thru mobile/smartphone technology. With members like Google, MasterCard, PayPal and dozens more they've got a good chance of pulling this off.

 

But Phil knows this :), Nok Nok was a founding member.
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
11/18/2013 | 11:26:16 AM
Re: Smartphones as passwords -Woof Woof (FIDO)
Thanks for calling FIDO to our attention, Dave! Here's more on the standards and how they work
dblake950
50%
50%
dblake950,
User Rank: Apprentice
11/18/2013 | 11:28:58 AM
Re: Smartphones as passwords
Wow, we were just discussing the problem with passwords over the weekend around the Facebook story (http://is.gd/h1gYOb), and voila, info on another approach!
devinlk
50%
50%
devinlk,
User Rank: Apprentice
11/18/2013 | 5:59:35 PM
Re: Smartphones as passwords
LaunchKey (a member of FIDO along with Nok Nok) has this technology avaialble today. Multi-factor authentication utilizing our smartphones is already here: https://launchkey.com/app/demo

You can log in to any site that supports OpenID or has integrated LaunchKey directly with our plugins and SDKs (like our Dashboard). Let me know if you have any quetsions.

P.S. Nice articl!e Phil!
J_Brandt
50%
50%
J_Brandt,
User Rank: Apprentice
11/29/2013 | 3:19:21 PM
Re: Smartphones as passwords
SecurID and others created soft tokens for smartphones so you wouldn't have to carry around a physical token.  But there are lots of other ways a smart phone can create adaptive security measures.  Using the GPS, it knows where you are and so geolocation can be added as a double check.  You're in your office?  No need to enhance security.  Trying to access material from outside the country?  Hmm maybe we need to challenge you some more.
macsgreg
50%
50%
macsgreg,
User Rank: Apprentice
11/18/2013 | 9:50:34 AM
Yes, passwords blow
Finding a way to use a mobile phone for authentication is a great idea. Users are almost always the weakest link in the security chain because users hate passwords....period.
LarsA400
50%
50%
LarsA400,
User Rank: Apprentice
11/19/2013 | 5:24:30 AM
Dream is realized!
This is of course the route to go, using the mobile device as the "password killer".

Here is an example of very good implementation.

A year ago mobile bankID was launched in Sweden and it's already a big success. More and more services, especially financial (like mobile banking/insurance) and governmental/municipal services (like tax services) are using mobile bankID for authentication.

Success factors: it's very easy to use (easier than banks hardware tokens), it's very fast and it's of course very secure, banks in Sweden says it's even more secure than the special hardware tokens...

....and it's maybe the most cost effective authentication solution our there (compared with hardware tokens, OTP's via text message/special scratch cards, PC certificates, etc.).
Alex Kane Rudansky
50%
50%
Alex Kane Rudansky,
User Rank: Apprentice
11/19/2013 | 4:43:35 PM
Healthcare
The password dilemma is seen in every industry, and has been growing in the healthcare industry with the rapid adoption of electronic health records and other technologies that deal with sensitive data and patient information. There's pushback from physicians who don't want to be required to enter multiple passwords for different systems. I can see the touch ID method as a viable option in the healthcare industry as so many docs move from desktops to mobile platforms (BYOD, etc.).


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-23599
PUBLISHED: 2022-01-28
Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscree...
CVE-2022-0395
PUBLISHED: 2022-01-28
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
CVE-2022-21721
PUBLISHED: 2022-01-28
Next.js is a React framework. Starting with version 12.0.0 and prior to version 12.0.9, vulnerable code could allow a bad actor to trigger a denial of service attack for anyone using i18n functionality. In order to be affected by this CVE, one must use next start or a custom server and the built-in ...
CVE-2022-23598
PUBLISHED: 2022-01-28
laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value w...
CVE-2021-4160
PUBLISHED: 2022-01-28
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis sug...