Passwords have been unbiquitosis to online activities since the internet invention, but experts said They neiss that may be not true for much longer.
The developments in artificial intelligence and new security systems are quickly update or replaced with biometric security-something that cannot be replicated.
Why do you care
Most of the exquises of most people fall aside as to the security experts say it must be. In the United States, the most common password length is eight to 10 characters, and a significant part that contains only uppercase letters, making the attacks of the brute attacks.
Because of this, and access to the password are the most desfables information you use, the mile of scammmee techniques to the scamms, or even beat.
The future of password
For many users, enter the password manually is already one thing of the past, with the level of the level passwords that demonstrate a safe mode to keep the passwords automatically.
However, Subho HATERE, the co-founder and the CEO of the firm security applox They neiss that password managers have important problems of their multi-factor authentication (mfa) was one of the most reliable ways to promote the force of any password security.
“Password managers become more advanced but even more exposed,” Halder said.
“Now use zero-knowledge criticism and images to hardware
Photo-illustration from Newsweek / Getty / Coy
“Users must protect the password of the same business of businesses the jeweler jewelry: with MFA, cripation and a password door, it’s always turning.”
KURY KURDDICOLEK, the Vice President on Data Maid Date, Required this feeling, saying They neiss that password managers were reliable but also subject to traditional hack methods.
“The password managers will get more secure with now with a strong encryption, advention zero, and zera security checks, and zera security checks.
“But as any instrument, I am only secure as people around them will not see the tricks are realized or when violating in the program.
“The best way to protect a password manager and authentication multi-factor, and held often. Also convenient to the password code, or collaboration.
Biometric security
Both experts said biometrics, physical data as the factual fingerprints that cannot be easily separated by its owner, it was one of the most likely ways in the near future.
“We are at a point of infomisons, not in terms of technology but in trust and consistency,” Homder said. “Passkeys, Biomistic authentication and tribeli-based authentication. But Adoption is fractured less than 15 for sensings that descend the seat of the apple and google.
“To the appellox, we will consistently that the applications can offer” passwords of “Passwords, often implement, exposure or repacks.
“So we are not just replacing password, we are Rebuild the idea of access from the ground. Until to make sure, password authentication becomes interoperable and by seasoning the platforms, passwords persists as a bond fake. ‘
KURDISIOLIOIOGAIC’S AFTER THINGS, but said industry I will need to have special care that the adoption process does not include damage or defects in the technology.
“There’s a real moment to the technologies that may replace traditionally, like the chopers, mfa and did not take place for a notice of no quality, for many years, it is the years
“Replacement passwords is just part of the solution, secret, and keys, and the keys, and organizing the ranges that they can warm up risky and enriched.”
Artificially intellially
As with any space in technique now, the greatest question is how you impact the future.
When it comes to password, consent is that you are a double-cut sword; Provide users and detection methods detection for the security points but give criminal and hack those same to follows.
“It’s helping both users, but now, attackers are fastest climb,” Halder said They neiss. I am
“AI isn’t just speeding brute attacks; their password models, generating a phishing content and simulate the most convincing human behavior that ever.
“In the Flip Side, you help defenders, also – from credential credentials in real to alert that their passwords are weak. But we cannot be a helpful band.
“The real jump we will come when we get back to you on continuous authentication toward continuous, contextual, editing behavior, not only secrets.”
The Kurdicole was simple of the AI, and said the criminals use for crack password faster and faster.
“You will breathe the password landscape from the two sides of the equation. For everyday users, you AIDDENDS TENDER POWER AND POWER POWER PERFARE
“But attackers are using ai to crack password faster for automated brute and artigger attacks more persuading phishing phishing schemes that focus on the first place.
“At the end, you make the password protection of passwords heavy or supplement the password and authentication of the multi and it is equal to discover the attackers may explode.”