As smartphone capabilities evolve, the balance between “IT friend” and “IT foe” must be constantly re-evaluated.
By using two-factor authentication, sites reduce the value of a stolen password because an attacker would also need access to the “second factor” in order to successfully access the victim’s account.
Several password replacement schemes have been suggested that use a visual code to log in.
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon Bergen 2013.
A group of researchers from Carnegie Mellon University's School of Computer Science believe they might have solved the problem of choosing and, above all, remembering complex and diverse passwords that are simultaneously difficult to crack by attackers.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.