Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Five New Ways to Prove It’s Really You Logging into Personal Accounts

    Written by

    Robert Lemos
    Published March 2, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Proving you are “you” has always been tricky. In the past, when personal information was not generally put online, asking a few personal questions was enough. Where did you live when you were 10 years old? What was the amount of your last mortgage payment? 

      Anyone could answer these questions and get access to sensitive information about another person. 

      Unfortunately, last year’s breach of credit-information firm Equifax resulted in sensitive information on more than half of all U.S. adults being exposed, further undermining the utility of static information as a security measure. 

      “Those days of providing static information to establish identity have been over for a long time, but we, as an industry, have been in denial,” said Robert Capps, vice president and authentication strategist for NuData Security. 

      “It used to be that we would look at Social Security number and mother’s maiden name, and then it was more detailed, such as what color your first car was or your mortgage payment. Now all that information is the in hands of fraudsters.” 

      Because many of these questions are also used in account recovery, finding better ways to confirm that a user is authorized has become a critical area of research. 

      While the use of sensitive personal information—and by extension, passwords—for user authentication has resisted elimination by other technologies, security companies and researchers are increasingly trying to make reliance on such information unnecessary. 

      Here are five technologies that could change how you log in to sensitive sites and prove you are ‘you’. 

      1. Using devices as keys 

      The first technology is not new, but has become much more popular as Apple Watch and other wearables become widespread. From using the device as a method of payment to automatically logging onto sites, a second device is increasingly the way that services secure against fraud. 

      Turning a device into a key can be as simple as using push technology to send a security message to the user. While using SMS text messaging as the second channel is increasingly considered insecure, other push technology has become popular. 

      “You are authenticating to the device, which is performing the cryptographic authentication, or just using the phone as the second factor itself,” said Rich Smith, director of research and development for authentication-provider Duo Security. “No one is really pushing the idea of a stronger more complex password anymore.” 

      2. Telltale user activity tells a story 

      While the way you type and the way you use your mouse are not enough to identify you uniquely, bringing together a variety of different telltales of how a user browses the Web or uses their computer does create a strong digital fingerprint, Nu Data’s Capps said. 

      Using different aspects of behavior—such as keystroke rate, navigational habits, whether the user uses the mouse or the tab key and the speed at which a user reads the page—algorithms can decide whether the user is likely the authorized individual, a robot or an imposter.   

      “Those sorts of data points are all brought together to give you a pretty good approximation of whether it is the consumer or not,” Capps said. “And once you have made that determination, you can do some really cool things like step up the authentication mechanism for that user … you have the ability to challenge them a little bit more, making it more difficult to bypass the authentication.” 

      3. Enabling the browser 

      A world without passwords may not be too far away, at least for signing onto your favorite web services. The FIDO Alliance, a group of vendors establishing standards for authentication on the web, has created a new standard known as Web Authn. The specification is less about determining whether a user is who they say they are and more about establishing a way for devices to pass on authentication information. 

      When a user logs into a web site, for example, they can put in their user name, and then the web site can request an out-of-band authentication—for example, through their phone. Web Authn, along with integration on the part of the developer, makes the handoff happen seamlessly in the background. 

      “Passwords are not the greatest way to authenticate,” said Duo Security’s Smith. “Web Authn is taking the next step forward and asking—if there was no password—can we actually build a situation where we don’t have to ask for a password anymore?” 

      4. Facial recognition with a twist 

      Soon after Apple announced latest phone, Apple X, attackers broke its Face ID facial recognition technology with a $200 3D printed mask

      ,

      makeup and specially structured areas. While Face ID looks for movement, the attack showed the danger in relying on a fairly static image for identifying the user. 

      A group of researchers from the Georgia Institute of Technology have created an improved technology—called real-time CAPTCHA—that adds a random challenge to the process. The authentication mechanism asks the user to take some action, such as smile or say hello, and gives them a short time window to complete the action. 

      The researchers found that the fastest computer took upwards of 10 seconds to translate the command and modify a computer-generated image, while humans responded in about a second. 

      “If a system uses a static face, that is not good—the challenge has to be random,” said Wenke Lee, professor of computer science for Georgia Tech. “Humans are naturally better than machines at doing this, and that’s what you want—a challenge where the user is always better than the machine.” 

      The development mirrors other trends in authentication of using a collection of inputs to make the technology harder to fool. 

      5. Better authentication information using blockchain? 

      It seems every trend in technology now has a blockchain component and authentication is no different. Companies are looking at blockchain, the cryptographic data storage technology, as a way to secure authentication information for public-facing systems. 

      “I think that we will see blockchain technology, because there are some real attractive attributes of blockchain that lends itself to identity and authentication,” said Will Gragido, director of advanced threat protection for Digital Guardian. “It is distributed from a database perspective. It utilizes peer-to-peer communications, so there is never a single point of failure. It has transparency and pseudo anonymity and is irreversible so transactions cannot be deleted once they are there.” 

      These sorts of attributes are all assets in authentication.

      While few of these trends are significant departures from what we have today, authenticating users has always been about small steps. Passwords—the original way to authenticate a user—continues to be the most popular authentication mechanism. 

      Yet, the future may finally kill off passwords, replacing them with a more comprehensive combination of attributes to identify the user.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×