Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission + - New UK password guidance says re-using OK, regular changing a waste (www.gov.uk) 1

isoloisti writes: New UK govt guidance on how to handle passwords "advocates a dramatic simplification of the current approach." "Unlike previous guidance, this doesn't focus on trying to get ever more entropy into passwords." For example: "Regular password changing harms rather than improves security, so avoid placing this burden on users." And "given the infeasibility of memorising multiple passwords, many are likely to be re-used. Users should only do this where the compromise of one password does not result in the compromise of more valuable data protected by the same password on a different system."

Blog launching the guidance: https://cesgdigital.blog.gov.u...
Main guidance doc: https://www.gov.uk/government/...

Security

Submission + - Everything you know about password-stealing is wrong (microsoft.com) 1

isoloisti writes: An article by some Microsofties in the latest issue of Computing Now magazine claims we have got passwords all wrong.

When money is stolen consumers are reimbursed for stolen funds and it is money mules, not banks or retail customers, who end up with the loss. Stealing passwords is easy, but getting money out is very hard. Passwords are not the bottleneck in cyber-crime and replacing them with something stronger won’t reduce losses. The article concludes that banks have no interest in shifting liability to consumers, and that the switch to financially-motivated cyber-crime is good news, not bad.

Article is online at computer.org site (hard-to-read multipage format)
http://www.computer.org/portal/web/computingnow/content?g=53319&type=article&urlTitle=is-everything-we-know-about-password-stealing-wrong-
or pdf at author’s site.
http://research.microsoft.com/pubs/161829/EverythingWeKnow.pdf

Submission + - Bank Robbing a terrible business (wsj.com)

isoloisti writes: "Three UK economists get access to national data on bank robberies. The conclusion is that robbing banks pays, but not very much. Average take is about $19k per person per robbery. But, there's a 20% chance of being caught per raid. To make a below average income a robber needs to do two jobs per year, and has greater than 50% chance to be in the slammer after 2 years."
Microsoft

Submission + - Passwords not going away. Not soon, not ever. (wired.com)

isoloisti writes: Hot on the heels of IBM's "no more passwords" prediction Wired has an article about provocative research saying that passwords are here to stay.
Researchers from Microsoft and Carleton U. take a harsh view of research on authentication saying “no progress has been made in the last twenty years.”
They dismiss biometrics, PKI, OpenID, and single-signon: “Not only have proposed alternatives failed, but we have learnt little from the failures.”
The problem is that the computer industry so thoroughly wrote off passwords about a decade ago, that not enough serious research has gone into improving them and understanding how they get compromised in the real world.

“It is time to admit that passwords will be with us for some time, and moreover, that in many instances they are the best-fit among currently known solutions.”

The MS/Carleton paper: http://research.microsoft.com/pubs/154077/Persistence-authorcopy.pdf

Comment Re:So this applies to the RIAA/MPAA as well? (Score 1) 69

Not sure this work really talks about RIAA. I don't think the RIAA estimates were done from self-report surveys, but they're still just made-up numbers. It seems to be the rule in anything related to cyber-foo that you make up loss estimates, and nobody questions them so long as a) they're big and b) bigger than last year's numbers and c) you use them to claim a "growing crisis."

Comment Re:outliers? (Score 1) 69

I think we might have a difference in understanding in what "outlier" means. An outlier isn't a data point that is shown to be incorrect; it's a data point that is numerically distant from the rest of the points in a set. The difficulty with this data set is that it's not just the extraordinarily high values that are incorrect, but that the statistically-average values are under suspicion as well. There might very well be one large company who actually did lose $30 million due to a security breach, and 100 small companies who reported losing $25,000 when they actually lost something closer to $2000. The problem is that the incorrect values aren't outliers; there's a whole bunch of them, so they don't look statistically different from the rest of the data.

No, I think we're on the same page as to what constitutes outlier. The point the paper makes is that for some surveys 75% of the average comes from an outlier or two. This is exactly the case with the 2007 ID theft survey they mention in the intro: the answers from 2 people (in a survey of over 4000) made a 3x difference in the average (and were found to be fabricated). It's quite possible that some of the non-outlier answers were fabricated also, but they don't have the same influence on the estimate.

Comment Re:outliers? (Score 1) 69

Cant you just exclude the outliers from the analysis?

It depends on whether the outlier data is correct. If you're surveying wealth and some guy claims to be worth $50 billion, you need to figure out if he's telling the truth or not. Outliers have a huge effect on the average, that's the point of the sex-survey. The average number of partners reported by men is 5x higher than reported by women. But if you throw out the outliers among the men the averages are almost the same. Point of the paper is that in cyber-crime surveys they never even examine outlier results carefully.

Comment Re:There's a difference (Score 1) 69

It's well enough established that men claim to have more female sexual partners in sex surveys than women claim male partners, a discrepancy that can't be explained by sampling error alone.

That can be explained by a few women I know. They can take on three men at a time. So unless you correct the survey for them, the numbers won't match.

No, it can't. Suppose one woman sleeps with 100 guys. One woman increased her count by 100, and 100 guys increased their count by 1 each. The average number of heterosexual sex-partners that men and women have had is the same. Do you need me to draw you a diagram?

Government

Submission + - Cybersecurity, Innovation and the Internet Economy (net-security.org)

Orome1 writes: Global online transactions are currently estimated by industry analysts at $10 trillion annually. As Internet business grows, so has the threat of cybersecurity attacks. The U.S. Department of Commerce today released a report that proposes voluntary codes of conduct to strengthen the cybersecurity of companies that increasingly rely on the Internet to do business, but are not part of the critical infrastructure sector. Commerce Secretary Gary Locke said: “By increasing the adoption of standards and best practices, we are working with the private sector to promote innovation and business growth, while at the same time better protecting companies and consumers from hackers and cyber theft.”

Comment Anyone think we'll dump passwords in 5 years? 10? (Score 1) 127

This topic of passwords keeps coming up. Different people keep piping in with "the REAL problem with passwords is........" and the solution is PKI/OpenID/keepass/1password/phone auth/securID etc etc etc. My impression is that we are making no progress whatever. We can't even agree on what the main problems are (keylogging, user forgetting, phishing, brute-forcing etc). With a 100 slashdotters posting you get 100 different offered solutions. So my guess is that 5 years from now, and probably 10 we're stuck exactly where we are today. Anyone disagree?

Comment .coms less stringent than .edus or .govs (Score 1) 563

Second part of the article is more interesting than scheme they talk about. ~~~~~~~~~ "Florencio and Herley found that the sites that had the most stringent password requirements were those where the users generally had no ability to shop around--sites like the U.S. Social Security Administration, the National Weather Service, and the webmail systems for several large universities. For these systems, the organizations have no monetary incentive to balance usability with security, or to find some other way of protecting user accounts."

Comment Re:good advice versus bad advice; costs to others (Score 2, Interesting) 389

That doesn't mean *nobody* pays the cost of the fraud. We all pay those costs, indirectly. But isn't that the point? Isn't it rational of users to shirk individual effort that reduces collective harm? For sure, Wellsfargo passes the cost to its customers. But that happens whether an individual user makes security effort or not. So might as well not.

Slashdot Top Deals

Everyone can be taught to sculpt: Michelangelo would have had to be taught how not to. So it is with the great programmers.

Working...