84% Support Eliminating Passwords

LaunchKey, the leading mobile authentication platform, today released findings from a recent survey which found that password-based authentication is no longer capable of meeting the demands of modern information security. According to survey data, an overwhelming 84% of respondents would support eliminating passwords all together.

Additionally, more than three-fourths of those surveyed (76%) feel their data would be more secure with an alternative form of verification, with 59% preferring fingerprint scans over passwords.

READ MORE

Advertisements

6 Password Tips to Protect Against Business and Identity Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network and, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Add those to the ones that you have for your home Internet, your banking and other websites that require passwords, and before you know it you have a nightmare on your hands in trying to manage them. How easy a target are you for business and identity theft?

Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. Some need a combination of alpha and numeric characters and…

READ MORE

How to Avoid the Surprising Risks of Password Security Questions

Your favorite pet’s name can be hazardous to your online security. That’s the message security expert Jim Fenton delivered in a talk I recently attended at PasswordsCon.

What makes a question like, “What is your favorite sports team?” a security risk? Isn’t answering it supposed to enhance your security? Actually, says Fenton, such questions aren’t intended primarily to enhance your security. On the contrary, Websites make you answer them because it gives them a cheap way to be able to reset your account when you forget your password.

And don’t mistake a security question for a strong security-enhancing technique like two-factor authentication, which is growing in popularity. In two-factor authentication, besides your password, the second component you supply to prove your identity must be something entirely different, such as a fingerprint or a code that the site sends to your mobile phone….

READ MORE

Attackers can access Dropbox, Google Drive, OneDrive files without a user’s password

Hackers don’t even need your password anymore to get access to your cloud data.

Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a “man-in-the-cloud” attack can grab cloud-based files — as well as infecting users with malware — without users even noticing.

READ MORE

Identity Theft Boom Should Spell the End of the Password

Following the news the identity theft is on the rise in Britain, please find below comment from Richard Parris, CEO of cybersecurity company Intercede.

“The sharp rise in identity theft in the UK over the last year is a direct result of the widespread lax security procedures seen as consumers and companies alike persevere with outdated username and password-based authentication. This already porous level of security is then made even less effective by the continued use of basic password combinations, which are then used for multiple logins.”

READ MORE

Giant hack may be first step in pursuit of bigger US secrets

WASHINGTON (AP) — A giant hack of millions of government personnel files is being treated as the work of foreign spies who could use the information to fake their way into more-secure computers and plunder U.S. secrets.

Federal employees were told in a video Friday to change all their passwords, put fraud alerts on their credit reports and watch for attempts by foreign intelligence services to exploit them. That message came from Dan Payne, a senior counterintelligence official for the Director of National Intelligence.

“Some of you may think that you are not of interest because you don’t have access to classified information,” he said. “You are mistaken.”

READ MORE

Starbucks customers who use mobile app targeted in hacking scheme

A warning to Starbucks customers to change their passwords: The coffee chain’s app and gift cards that are linked to credit cards are particularly at risk.

Starbucks says hackers get access by entering the correct password and draining the balance by transferring the money to another Starbucks gift card. When the balance hits zero, it automatically reloads because it’s attached to customers’ credit cards. And then it’s drained again….

READ MORE

Want to Create a Really Strong Password? Don’t Do This!

We all have a favorite password. Maybe it’s based on your pet’s name, a birth date, your sports team, or your street number. However, according to the Wall Street Journal and a recent study, odds are you’ve used “123456” and “password”: the most common, and worst passwords of last year.

Research firm SplashData compiled the most popular passwords for the fifth year running, from around 3.3 million passwords posted publicly online by hackers. When you create a new password, don’t use one of these top 10 of 2014:

1. 123456
2. password ….

READ MORE