Kaspersky Lab Retools Password Security

Kaspersky Lab is giving a new spin to new password security by introducing a technology that allows users to develop their own special input methods to secure their accounts. The idea has merit, but if history is any indication, getting users to adopt the solution open arms might be easier said than done.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  

Passwords. We all struggle to remember them. And we can’t write them down either. Most of the time, we end up using the same one over and over, or something that's ridiculously easy to guess. And without fail, the pneumonic devices also seem to work for hackers.

To be fair, in other cases, hackers also resort to specialized malware designed to launch brute force password attacks or execute keyloggers that record login keystrokes.

Related articles

The conundrum compelled Kaspersky Lab ZAO to develop new technology to protect passwords and secure data on a wide range of applications and devices.

Here’s the way it will work: Essentially, the technology allows users to configure their own password system at their discretion.

But don't they already do that? Yes, but this time, the technology allows them to develop their own special input methods--such as time lapse between insertion of two password symbols, pressing the mouse buttons at a certain point while entering the password, or overlapping keystrokes--in order to secure their accounts.

By relying on non-standard input techniques, users can then insert a predefined combination into the password to make the credential completely unique. If a 10-digit password is required, for example, ostensibly four could be “typed” by clicking the mouse at any given time.  A user could in theory enter three symbols, click four, and then type the remaining three. Hackers who intercept a password—even with keylogger malware—would only be able to determine six of the symbols, keeping the entire password secure.

Additionally, Kaspersky Lab’s new technology is compatible with any application that requires password insertion, and can also be applied to electronic devices and mobile phones.

Meanwhile, passwords are by far the most common authentication technique. In fact, most users have dozens of them to secure various and sundry accounts.

And more often than not, they’re easily hackable. That was made evident earlier this summer with a high profile hack of Web and news service Yahoo, in which hackers nabbed 450,000 passwords. And professional social networking site LinkedIN suffered far worse consequences when an external hack resulted in the exposure of 64 million user passwords.

Meanwhile, in 2007, the typical Web user maintained around 25 separate accounts but used just 6.5 passwords to protect them, according to one Microsoft study. And five years later, its likely that users rely on more passwords than that.

So make no mistake, the need for foolproof authentication mechanisms is there. However, what remains to be seen is if Kaspersky Lab’s technology will do the trick.

Historically, more involved security mechanisms, such as two-factor authentication, have elicited a tepid response from the general public. The reason can often attributed complex and cumbersome solutions, compounded by tracking and management challenges with tokens easily lost or forgotten.

Now, granted passwords aren’t nearly as complicated as two-factor authentication. However, getting users to embrace any kind of change—especially when they’re eager to access their favorite Web applications—might be easier said than done.

Of course, there is always room for the channel to help change that paradigm shift, by retraining users and emphasizing the importance of password security in consulting and education services.

And the technology could even give security partners a bit of leg up in enterprise markets looking to better secure of sensitive information. The reality is though, that change does not come easily. And it might take more than a few tries to get users to put down their dictionary word login and get excited about a security solution that might actually be harder to remember.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  

Want more articles like this?

Subscribe to Channelnomics for a daily newsletter roundup direct to your inbox

More on Channel Business

VARs should focus on staying put, not selling out

Profit as an end goal stunts innovation and saps solution providers’ ability to create value for customers

Partners on globe

Microsoft, Lenovo make channel pleas

Microsoft talks up cloud, Lenovo boasts of diversity at Tech Data's TechSelect


Just say ‘no’ to nostalgia


Success = planning + growth

For the technology channel, growth is key to success, but that growth won’t happen by itself

Visitor comments
Add comments
blog comments powered by Disqus

VARs should focus on staying put, not selling out

Profit as an end goal stunts innovation and saps solution providers’ ability to create value for customers

Dell building

Dell swallows EMC in blockbuster deal

Speculation turns to reality as Dell announces bid to acquire storage giant EMC in a $67 billion deal that will transform the storage, virtualization and security markets, as well as send ripples through the channel


Vendor Q&A Series: Brian Hierholzer, Artisan Infrastructure

The latest channel exec to sit in the Channelnomics hotseat is Artisan Infrastructure's founder and CEO


Channelnomics' top five stories of the week - 9 October 2015

Check out which articles grabbed the most attention this week