Thursday, August 14, 2025
HomeTechnologyComputer security: this is why the era of passwords "touch its end"

Computer security: this is why the era of passwords “touch its end”

Therefore,

Computer security: this why era new: Moreover,

Computer security: this why era:

Digital imprints. Moreover. For example. Therefore, access keys, facial recognition: while alternatives to passwords are multiplying, the end of this connection mode, often announced, comes up against the habits of the general public.

“The era of passwords is coming to an end. Therefore, ” two Microsoft giant officials wrote in December in an online blog note.

Highlighting an evolution towards “safer” solutions, the American giant has been preparing for several years for this scenario.

Since May, the accounts of the new users offer by default a connection with alternatives to passwords, more sophisticated.

In France. In addition. In addition, the tax site has recently strengthened its IT security policy. forcing users to validate their connection with an email code, in addition to their password.

“Passwords are often weak and reused,” recalls Benoît computer security: this why era new Grünemwald, cybersecurity expert at ESET, interviewed by AFP. In addition. computer security: this why era Below computer security: this why era eight characters. they can be deciphered in a few minutes, or even a few seconds during malicious acts.

And they are also the frequent target of data leaks. Furthermore, “when they are poorly stored by those who are supposed to protect them, save them,” adds Mr. Grünemwald.

Proof of the magnitude of hacking: a gigantic database containing some 16 billion identifiers. passwords, from hay files, was discovered in June by researchers from the Cybernews media.

So many flaws that led to a coordinated movement of several tech giants.

Delicate transition

The Fido Alliance (Fast Identity Online Alliance). which is among its members Google. Microsoft. Apple, Amazon, and more recently Tiktok, works to create and encourage the adoption of connections without password and promote the use of access keys.

These computer security: this why era new digital identifiers use a third -party device as a phone to allow connections via a computer security: this. why era PIN code. a biometric connection (digital computer security: this why era imprint, facial recognition), instead of the password.

A system that protects Internet users, underlines Troy Hunt, the host of the Haveibeenpwned site (“Did I have been trapped?”, Editor’s note): “With the access keys, you cannot accidentally give your key to a malicious site”.

But for the Australian expert, it does not sign the end of the password.

“10 years ago, we asked ourselves the same question (…), people said +will we still have passwords in 10 years? +, And reality now is that we have more passwords than ever before,” said Troy Hunt.

If many large platforms strengthen connections safety, many sites continue to operate with simple passwords. And for users, the transition can be delicate.

The access keys, computer security: this why era new less intuitive to use, require a first installation phase. And their reset. in the event of forgetting the PIN code. computer security: this why era loss of a phone recorded as a “trust device”. is computer security: this why era more difficult than a simple password recovery.

“What passwords have as an advantage. and the reason why we still use them is that everyone knows how to use them,” said Troy Hunt.

For Benoît Grünemwald, the transition to access keys requires new reflexes. “You have to take care of the safety of your smartphone. its devices, because they are the most targeted,” he warns.

Computer security: this why era new

Computer security: this why era

Computer security: this why era

Further reading: Portraits to alert climate changeSamsung Galaxy S25: The July 2025 update is there, but still no trace of one UI 8See the planet computer security: this why era new breathe from space, or how to measure satellite greenhouse gasesPluto Labs&#8217. “Effective Strategic Efficient Strategic” surpasses the models of Google and Anthropic at a significantly lower cost computer security: this why era – The date of the Apple keynote confirmed by a leak?.

Further reading: Ten titles in the running for the Rosny elder prize 2025: a map of the future&#8220. We have just created a ghost particle”: the PA-Ton, almost partial discovery in Vienna, could boost quantum computers and change techPS Plus August 2025: The games offered revealed – Lies of PNo one understands how this supplier can offer their VPN at such a price (-73%)Apple is interested in Mistral Ai and Deezer chases the songs generated by the AI.

Further reading: The next iPad Pro could simplify your calls in VisioThe Russian space agency and the American NASA agrees to exploit the ISS until 2028This free game on Steam mixes Stardew Valley and Final FantasyA legendary subwoofer at reduced price: Klipsch RP-1400SW on saleWith 300 € less, this excellent 4K video projector, HDR10 and 240 Hz compatible will please gamers.

rowan.tate
rowan.tate
Rowan breaks down Wall Street earnings with Lego-brick diagrams and plain-English subtitles.
Facebook
Twitter
Instagram
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

Recent Comments