Brute-Forcing a Fingerprint Reader

It’s neither hard nor expensive: Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint authentication determines a match using a reference threshold ...

Passwords Are Terrible (Surprising No One)

This is the result of a security audit: More than a fifth of the passwords protecting network accounts at the US Department of the Interior—including Password1234, Password1234!, and ChangeItN0w!—were weak enough to ...
Basic Tech-y Article on Password Hacking

Basic Tech-y Article on Password Hacking

Here’s an article from last year’s Scientific American: The Mathematics of (Hacking) Passwords. If you remember your logarithms, it’s a decent read. If you don’t, you can skip the math and read ...
State of the Art Password Cracking

State of the Art Password Cracking

| | cracking, passwords, security
While researching my next edition of Elementary Information Security I came a this posting from last January. It comes from the “netmux” web site and describes a $5,000 design for a password ...

Secure Guardrails