Tagged With authentication

0

Dropbox has jumped on the two-factor authentication (2FA) bandwagon with changes to their mobile app. Now, when an attempt is made to log into your Dropbox account, a notification is sent to your mobile device where you can tap a button to authenticate your identity. There's no code to enter.

1

Uppercase, lowercase, number, symbol - it's the mantra repeated over and over by IT admins when they set password rules. Throw in the requirement to change those passwords every 30 days or so, and not repeat an old password or even have characters in the same place over some arbitrary cycle and you suddenly have a complex set of rules that makes life really hard for users. And the guy who penned many of these rules, Bill Burr from NIST, says he screwed up.

2

Authentication and identity are still, despite more than six decades of computing, a serious challenge for those designing secure systems. Over recent years, fingerprint scanners have become far better to the point where the TouchID scanner on my iPhone works flawlessly. But if the rumours are right, the next iPhone will use facial recognition.

1

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the security processes and tools in the world are circumvented when someone has your username and password. That's where two-factor authentication (2FA) comes into play. 2FA works by adding another authentication challenge to the equation. It's not just about what you know - your password, it's also about something you have. That's where the authenticator apps from Microsoft and Google come into play.

0

A new piece of research from Data 61, the digital research arm of CSIRO, has found the energy patterns we generate when we walk can be used to power mobile devices and to authenticate our identity. It turns out we have, in Star Trek parlance, unique energy signatures.