By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Ditch Your Passwords: Why Passkeys Are the Future of Online Security
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Ditch Your Passwords: Why Passkeys Are the Future of Online Security
News

Ditch Your Passwords: Why Passkeys Are the Future of Online Security

News Room
Last updated: 2025/09/30 at 5:16 AM
News Room Published 30 September 2025
Share
SHARE

There’s a reason everyone is working on a way to replace passwords. They’re often easy to guess, hard to remember, and changing them after every data breach is a pain, even if you do have a password manager. Thankfully, the Fast Identity Online (FIDO) Alliance developed passkeys, a new authentication technology that eliminates the need to enter your email address or a password into login fields around the web, and they’re gaining popularity. For example, Microsoft deleted passwords from its authenticator app in August, but left in support for passkeys.

Passkeys offer numerous benefits; for example, they cannot be guessed or shared. Also, passkeys resist some phishing attempts because they’re unique to the sites they’re created for, so they won’t work on fraudulent lookalikes. Most importantly, in the age of near-constant data breaches, your passkeys cannot be stolen by hacking into a company’s server or database, making the stolen data far less valuable to criminals.

You can now use passkeys on various apps and websites, but what are they? Should you use them? Are they really more secure than traditional login credentials? Let’s talk about it.


What Is a Passkey?

When a public key and a private key combine, they create a passkey that can unlock your account. Here’s how it works: Apps or websites store your unique public key. Your private key is stored on your device, in your password manager, or, if you’re an Apple user, in your iCloud keychain. After your device (or iCloud) authenticates your identity, the two keys combine to grant you access to your account.

(Credit: 1Password/PCMag)

To learn how to set up passkeys for your online accounts, check out our guide to setting up and using passkeys.


Are Passkeys Really More Secure Than Passwords?

Allowing users to login using a passkey isn’t the only update website owners need to ensure website security. To find out more about the risks, I spoke with Trevor Hilligoss, security researcher and vice president of SpyCloud Labs at SpyCloud. Hilligoss tells me that widespread passkey adoption is “fantastic,” but website owners must also fix other security holes. He noted that criminals can easily get around a passkey by stealing users’ validated browser cookies using malware.

“You can use a passkey, you can use a password manager, you can use ‘yourdog’sname2023,’ whatever. It doesn’t really matter because authentication has already happened by using that cookie,” Hilligoss says. “Criminals are emulating an already authenticated session. So from the perspective of the website, it just sees that it’s a valid cookie.”


Newsletter Icon

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Hilligoss says that once a website, like your email service, validates the cookie, the criminal doesn’t need to log in using your credentials or authenticate their identity. The validated cookie, which lasts on a person’s browser until it expires over a period of seconds or years, allows criminals to enter your accounts undetected and steal your data or money.

The onus is on website owners to find a solution for cookie hijacking. Hilligoss tells me that the rest of us can protect ourselves from the cookie hijacking threat by using passkeys or strong and unique passwords wherever we can. He adds that some websites allow users to choose when their session tokens expire.

You know the data privacy pop-up screens? Don’t immediately tap “Accept.” Instead, navigate to the “Cookies” or “User Data” sections and choose the shortest available session duration. That way, your cookies will expire automatically or whenever you close your browser window.

Recommended by Our Editors


Common Passkey Complaints

Passkeys are newer than passwords, so naturally, there have been some growing pains during the widespread adoption phase. Below, I’ll highlight some of the issues I’ve had when using passkeys and some complaints I’ve seen about passkeys around the web.

  1. Passkey terminology can be confusing. Because the technologies became popular around the same time, many people seem to believe that 2FA options like biometric authentication, authenticator apps, and hardware security keys are the same as passkeys.

    Passkeys perform multifactor authentication. You should be able to log into a website using only the passkey; there is no need for a password and username. Depending on your privacy and security settings, the iCloud account, device, or password manager where you’ve stored a passkey may require you to unlock it by using your face, fingerprint, or passcode.

  2. Passkeys may not be accessible on all computers or devices. What if you lose your phone? What if you need to log into an account on a public computer? I’ve been locked out of a TikTok account for a year due to a missing passkey. If you don’t have access to a device that’s connected to your iCloud account, or if you can’t get into the password manager you use to store passkeys, you won’t be able to log in without a lot of hassle.


How Can I Keep Track of My Passkeys?

Speaking of password managers, many of the services I’ve reviewed for PCMag, such as Editors’ Choice award winners NordPass and Proton Pass, can store and generate passkeys for you. Android and iOS users can store passkeys using the built-in Apple Passwords app or Google Password Manager.

The Best Password Managers With Passkey Storage

Microsoft is doing its part to eliminate passwords by encouraging its customers to use passkeys and making all new accounts password-less by default. The company even removed the password management functions from Microsoft Authenticator, but preserved the passkey storage options.

A password manager makes it easy to access both your old credentials and new passkeys when you log in. Check out this list of our top picks for password managers.

About Our Expert

Kim Key

Kim Key

Senior Writer, Security


Experience

I review privacy tools like hardware security keys, password managers, private messaging apps and ad-blocking software. I also report on online scams and offer advice to families and individuals about staying safe on the internet. Before joining PCMag, I wrote about tech and video games for CNN, Fanbyte, Mashable, The New York Times, and TechRadar. I also worked at CNN International, where I did field producing and reporting on sports that are popular with worldwide audiences.

In addition to the below categories, I also exclusively cover adblockers, authenticator apps, hardware security keys, and private messaging apps.

Read Full Bio

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Evolving Enterprise Defense to Secure the Modern AI Supply Chain
Next Article Opera launches its AI browser, but you’ll have to pay to try it
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The 23 Laws of Marketing – Law 23: Marketing Is Mind Control | HackerNoon
Computing
Is Your iPhone’s Camera Dirty? Here’s How To Safely Clean It – BGR
News
Inside Zap: Seattle-area company tries to build ‘a star in a jar’ to unlock abundant clean energy
Computing
The ASUS TUF T500 Is a Great Gaming PC for Beginners
Gadget

You Might also Like

News

Is Your iPhone’s Camera Dirty? Here’s How To Safely Clean It – BGR

4 Min Read
News

I watch live TV for free with an app you probably have never heard of

9 Min Read
News

UiPath expands agentic platform with orchestration, development and governance tools – News

6 Min Read
News

Bad news, Snapdragon fans: Exynos Galaxy S26 is this close to reality

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?