Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Passkeys Make Passwords a Thing of the Past
Facebook   X   LinkedIn   Email

Passkeys Make Passwords a Thing of the Past

September 22, 2024

Tired of creating and remembering passwords? Well, now there’s an easier option to do away with all those pesky passwords. They’re called “passkeys”, and the best part is, they’re easier to use and more secure (you can now jump for joy).

What Is A Passkey?

Passkeys are a type of authentication technology doing away with the risks of traditional logins. Using a passkey means no more logging-in with a password or username. It’s a kind of digital handshake between two forms of identity authentication.

The first authentication key uses your “biometric password” like facial or fingerprint recognition, called your “private key.” The second step uses a “public key” generated and stored by the website you’re logging onto. The private and public keys combine to create your passkey, assuring you are really you. The two keys “shake hands” to create a secure login.

Passkey Benefits

The following points to the ease and security of using passkeys.

  • Passkeys are convenient, with most systems syncing keys across all of your devices. No more guessing where your password is stored, using the same from phone to laptop.
  • Passkeys are site-specific. Hackers can’t trick you into using your passkey on a fraudulent website.
  • In a data breach, a hacker can’t steal the passkey to your account, keeping your data safer.

Not all websites use passkeys yet. You’ll still have to go the traditional password route, but more websites are signing up every day. However, cybercriminals love finding ways around password safeguards, and passkeys are not immune. Cookie hijacking is trending at the moment, so here’s what you need to know.

Cybercriminals use malware to hijack a user’s valid browser cookies and get past a passkey. Always choose for cookies to expire after a short time, or periodically delete them from your browser. It’s a small price to pay for using passkeys and the strong security they provide. So, say goodbye to passwords and hello to passkeys!


How To Create A Strong And Unique  Password For Every Account

Education

How To Create A Strong And Unique Password For Every Account

Most of us know by now not to use the same passwords for different accounts; yet some of us still do. But users who continue to use passwords they know have been exposed in a hack are truly flirting with danger. In a recent study, Google found 1.5% of passwords are still being used despite those users knowing they’ve been compromised. A security researcher discovered more than 22 million unique passwords and over 770 million email addresses were made public on a popular hacker forum earlier this year. READ FULL STORY

AI-Generated Phishing — The Security Landscape Changes

Scams & Phishing

AI-Generated Phishing — The Security Landscape Changes

Phishing scams, the scourge of businesses everywhere, are getting a facelift thanks to generative AI. Already the reason for 90% of all data breaches, phishing is getting much more difficult to spot thanks to generative AI. Traditional ways of identifying phishing scams are becoming obsolete and businesses are in the crosshairs of this new generation of phishing attacks. That's why creating a more effective response is in the best interest of every organization. READ FULL STORY

Your Data For Sale On The Dark Web And What You Can Do About It

Identity Theft

Your Data For Sale On The Dark Web And What You Can Do About It

As much as we love the convenience of our digital world, we know a hefty price tag can come with it. The world is full of bad actors whose goal is to get their hands on our sensitive, personally identifiable information, or PII. Should you find your PII is for sale on the dark web, it helps to know there are options for doing something about it, even if you think it’s too late. Just some of that hijacked PII can include passwords, email and physical addresses, Social Security numbers, financial accounts, and much more. READ FULL STORY

Why Business Social Media Accounts Need Strong Passwords, Too

Corporate Security

Why Business Social Media Accounts Need Strong Passwords, Too

Business leaders and those responsible for their corporate social media accounts can use this reminder about the importance of secure passwords – you’re only one weak password away from a breach. It’s a truth that’s too easily forgotten, especially when it has to do with securing a company’s social media websites. Whether a company’s oversight is internal or done by a third-party provider, breached social media sites start with a compromised password and can end with damage to a company’s brand and worse. READ FULL STORY

Credential Stuffers Compromise More Than 100K Accounts

Your Security

Credential Stuffers Compromise More Than 100K Accounts

Credential stuffing is a cyber-attack in which stolen user credentials and corresponding passwords are used with brute force to make automated login requests. The stolen user credentials are typically from data breaches that could have happened recently, but also may have occurred long ago. These types of attacks are particularly effective when the same username and password combination is used across multiple websites or services. New York’s attorney general announced that an investigation into credential stuffing had uncovered 1.1 million compromised customer accounts linked to 17 well-known companies. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...