Tag Archive for: Replace

IDG Contributor Network: How keystroking style could replace passwords for authentication

The username and password mix that we’ve been using for authentication is on its way out, some people think.

As we all know, problems include outright theft, the loss of password, phishing, and bots.

Alternatives that have proven a bit more successful have included adding an extra element of authentication — such as an object that has to be in the possession of the user. A bank card at an ATM is an example of this. That’s called two-factor authentication.

But a new biometric typing keystroke algorithm that knows how you type could be a better authentication method, some scientists say.

Biometrics

Biometrics promise the most security, experts say. A fingerprint, or a voice print, is unique — it’s theoretically inseparable, unlike the easily copied magnetic card.

To read this article in full or to leave a comment, please click here

Network World Security

Apple Pay won’t replace your wallet any time soon

Today is Apple Pay day, finally extending to iOS users a capability that Google and several others have already tried, unsuccessfully, to make mainstream.

For several reasons, Apple’s foray into mobile payments appears to have a good shot at succeeding where others have fallen short. Some point to the iPhone’s massive market share. Although more Android devices may be in the hands of consumers overall, everyday Android users who don’t read technology news and reviews obsessively might not know if their phones have an NFC chip or even how to set up Google Wallet. But with the homogeneity of iOS, everyone with an iPhone 6 or 6 Plus will have that capability.

To read this article in full or to leave a comment, please click here

Network World Colin Neagle

We should replace the word ‘cloud’ with ‘somebody else’s computer’, says … – Computing

We should replace the word 'cloud' with 'somebody else's computer', says
Computing
Cloud Computing Security. Replacing all instances of the word "cloud" with "somebody else's computer" might make organisations stop and think about the security implications of cloud computing. That's according to computer security expert Graham Cluley.

“computer security” – read more

Could A Crypto-Computer In Your Pocket Replace All Passwords? – Forbes

That advice can be summarized, as security researcher Mikko Hypponen recently twittered: ”Pick something you can’t remember, then don’t write it down.” Frank Stajano thinks he has a solution. At the Usenix conference, the Cambridge computer …
Read more