Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
T1red of P@sswords? Y0u @re N*t @lone!
T1red of P@sswords? Y0u @re N*t @lone!

By Martha Irvine
June 30, 2014 9:28AM

Bookmark and Share
Are passwords destined to go the way of the floppy disc and dial-up Internet? Already, there are multiple services that generate and store your passwords so you don't have to remember them. Beyond that, biometric technology is emerging in many arenas, using thumbprints and face recognition to help us get into our accounts and our devices.
 



Good thing she doesn't need a password to get into heaven. That's what Donna Spinner often mutters when she tries to remember the growing list of letter-number-and-symbol codes she's had to create to access her various online accounts.

"At my age, it just gets too confusing," says the 72-year-old grandmother who lives outside Decatur, Illinois.

But this is far from just a senior moment. Frustration over passwords is as common across the age brackets as the little reminder notes on which people often write them.

"We are in the midst of an era I call the 'tyranny of the password,'" says Thomas Way, a computer science professor at Villanova University.

"We're due for a revolution."

One could argue that the revolution is already well underway, with passwords destined to go the way of the floppy disc and dial-up Internet. Already, there are multiple services that generate and store your passwords so you don't have to remember them. Beyond that, biometric technology is emerging, using thumbprints and face recognition to help us get into our accounts and our devices. Some new iPhones use the technology, for instance, as do a few retailers, whose employees log into work computers with a touch of the hand.

Still, many people cling to the password, the devil we know -- even though the passwords we end up creating, the ones we CAN remember, often aren't very secure at all. Look at any list of the most common passwords making the rounds on the Internet and you'll find anything from "abc123," ''letmein" and "iloveyou" to --" you guessed it -- use of the word "password" as a password.

Bill Lidinsky, director of security and forensics at the School of Applied Technology at the Illinois Institute of Technology, has seen it all -- and often demonstrates in his college classes just how easy it is to use readily available software to figure out many passwords.

"I crack my students' passwords all the time," Lidinsky says, "sometimes in seconds."

Even so, a good password doesn't necessarily have to be maddeningly complicated, says Keith Palmgren, a cybersecurity expert in Texas.

"Whoever coined the phrase 'complex password' did us a disservice," says Palmgren, an instructor at the SANS Institute, a research and education organization that focuses on high-tech security.

He's teaching a course on passwords to other tech professionals later this summer and plans to tell them that the focus should be on unpredictability and length -- the more characters, the better. (continued...)

1  |  2  |  3  |  Next Page >

 


© 2014 Associated Press under contract with NewsEdge. All rights reserved.
 

Tell Us What You Think
Comment:

Name:

Stephen Kahn:

Posted: 2014-07-06 @ 12:58pm PT
I am getting to the age where it is difficult to remember my own name. So please remember it for me. Here is my password. tHIS dOG gETS yOU iNTO eVERY tHING I oWN aS wELL AS THE nSA.

Steve:

Posted: 2014-07-06 @ 10:07am PT
Inventing passwords poisoning. Fortunately, there are password managers and password generators. I also use Sticky Password and I can recommend it.

Luke:

Posted: 2014-07-01 @ 1:52am PT
Luckily I am not tired anymore, I have been using Sticky Password manager for couple years now, but I can imagine people struggling with dealing with passwords.



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Network Security
1.   Tor Working To Fix Security Exploit
2.   Wall Street Journal Hacked Again
3.   Dropbox for Business Boosts Security
4.   Hackers Breached StubHub Accounts
5.   Banks Hit by Android-Skirting Malware


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
New Technology Defeats Privacy Efforts
Study identifies 3 browser techniques.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 
Seagate Unveils Networked Drives for Small Businesses
Seagate is out with five new networked attached storage products aimed at small businesses. The drives are for companies with up to 50 workers, and range in capacity from two to 20 terabytes.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.