By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Three key aspects for the passwords of the future
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Three key aspects for the passwords of the future
Mobile

Three key aspects for the passwords of the future

News Room
Last updated: 2025/05/02 at 6:07 AM
News Room Published 2 May 2025
Share
SHARE

The technology industry celebrated World password day, an event proposed by cybersecurity professionals for raise users and companies of the need to promote best practices in the creation and maintenance of passwords. The event is celebrated on the first Thursday of the month of May and the data indicates that it remains necessary.

And it is that the compromised credentials represent the main cause of cyber attack for the second consecutive year (41% of the cases), as indicated in the 2025 edition of the Active Adversary of Sofos report. In addition, according to this study, the sophisticated techniques, tactics and procedures (TTP) of cyberators in 2025 will allow them to easily mock traditional authentication methods. For this reason, it is essential that users and companies adopt more solid methods to protect their data against the theft of credentials.

On the occasion of World password, the specialized firm in computer security underlines the limits of the password and knowledge -based authentication methods, paying attention to three key aspects to take into account:

The limits of knowledge -based protection

Double or multifactor (2FA/MFA) authentication solutions are widespread. However, like the password, these additional protection layers are often based on secret codes based on knowledge that is shared through SMS or authentication applications. Unfortunately, many of these methods remain vulnerable. Cybercriminals now have tools that, such as Evilginx2, facilitate to avoid these protections through the automation of identity impersonation or stealing session cookies.

This means that the path of constantly postponing the moment in which passwords are obsolete, by fragile accessories, it seems plagued with dangers. The reality of the cyberamean panorama should push companies towards a paradigm shift that abandons the password model and shared secrets based on knowledge.

Webauthn and access keys. Towards a stronger multifactor authentication?

To protect against phishing, the webauthn protocol (which uses, in particular, access keys or passkeys) has the support of cybersecurity experts. With this method, when an account is created, a unique, public/private pair is generated, of encrypted keys. Next, these are stored locally: on the website server for the public key and at the user’s terminal for the private key, together with the name of the site and the user identifier.

To connect, the user no longer needs to enter a password or a secret code shared by SMS or an authentication application. Instead, the server sends a digital authentication application that can only be resolved if the user is in physical possession of a device and can demonstrate that he is the owner of the private key (by biometric verification, for example). Therefore, authentication continues to be based on two factors, but these do not depend on the user’s knowledge, but on the physical possession of the device and the biometric characteristics of the user himself. In principle, therefore, they cannot be stolen through conventional impersonation methods.

In addition, the authentication process includes a bidirectional check that allows the user to verify the identity of the service by domaining the website, sent when the server requests authentication. Unlike the methods that use passwords and secret knowledge -based codes, the user is no longer the only one who must demonstrate their legitimacy.

Precautions that must be taken to guarantee a robust and simplified authentication

This new sector standard, based on the FIDO2 standard, seems to offer proven protection against phishing (the main cause of threat to the theft of credentials), while simplifying authentication for users. However, although webauthn represents a great step forward, several vulnerabilities persist, so surveillance is imposed:

  • It is essential to ensure that the device or cloud where the keys are stored is safe.
  • The satisfactory transition to Webauthn requires acceptance and adoption by companies and departments.
  • The theft of session cookies remains a form of attack that would allow cybercriminals to avoid this protection

It is important to keep in mind that criminals constantly improve their cyber attack methods. Therefore, adopting these technologies should be today a strategic cybersecurity priority for companies.

According to Chester Wisniewski, director, Global Field Ciso de Sopos: «We have to stop depending on passwords and shared secrets. The access keys or passkeys today represent the strongest solution to build a future without passwords, phishing and, with luck, large -scale commitment ».

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Check it out – You can digitize your childhood film photos with this kodak scanner
Next Article What Is a Domain Backorder? (And How to Properly Place One)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Arch Linux Moving To WoW64 Wine & Wine-Staging
Computing
Apple Intelligence transcription is twice as fast as OpenAI’s Whisper
News
Stop waiting around for Prime Day — score AirPods 4 at their best-ever price
News
What is Spotify Tap? The music shortcut explained
Gadget

You Might also Like

Mobile

Mivi Unveils Self-Developed Human-Like AI With Emotional Intelligence

3 Min Read
Mobile

Israel’s great goal in his war against Iran is to destroy Fordow. And you can only get it with a bomb that has USA

11 Min Read
Mobile

This is a first, Netflix will join the TF1 catalog

5 Min Read
Mobile

Intel will fire up to 20% of its Intel Foundry division

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?