dfm covers
 
 

Yahoo announces innovative authentication mechanism

Print PDF
Monday, 23 March 2015 14:48 Written by . .

Yahoo announces innovative authentication mechanism
Yahoo announced recently, a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user's mobile phone number.
This is not two-factor authentication (which Yahoo already had), but rather single-factor authentication where the single factor is the user's mobile phone.


Yahoo announced recently, a new method of authentication for its services that relies solely on an on-demand generated password that is sent to the user's mobile phone number. This is not two-factor authentication (which Yahoo already had), but rather single-factor authentication where the single factor is the user's mobile phone. It seems that if someone obtains temporary access to a user's unlocked phone they could generate a Yahoo one-time password that allows them to log in. CNET also reports that the temporary password is 4-characters long, though since it's temporary and Yahoo likely has anti-brute force protections that might not be a problem.

*TK Keanini, CTO at Lancope advises that; "We need more innovation like this with authentication.  Passwords are just pieces of information and in all these strategies, we want to make it useful for the shortest amount of time but not be an administrative burden.  Yahoo knows that the most personal device on a person these days is their mobile phone and let's not stop here, let's keep innovating even more techniques to raise the cost to our attackers.

While only leveraging a single factor (something you have - your phone), the 
security of the system will depend on how secure that device remains over time. 
We will see a major shift by the attacker to target malware on these mobile 
platforms because of their larger role in the overall security of the 
individual.  It is also important these days to ensure that the mobile account 
is secure because you don't want attackers changing features like call 
forwarding and other features that can put them in the middle of this 
communication stream."

*Jared DeMott, principal security researcher at Bromium provided further ndorsements to this type of innovation, commenting that, "Passwords have been the weak link in many security incidents.  Recall the celebrity pictures stolen a while back due to password resets.  Even so, users have not rushed to the more secure two-factor authentication, because it is an extra step that they must do (or even know about, and know how to enable). Also, some users have expressed concern about providing a personal mobile number to ad companies like Yahoo!, Google, Facebook, etc.

Either way, it seems most users will do only what is required by default.  So if  companies are serious about better login security, the default choice will need  to be modified.  In light of that, it is good to see Yahoo! trying to address 
the password problem.  Potential drawbacks are of course: users without a  txt/data mobile, lost phones, etc - could now cause new grief.  But in  engineering, it’s about balancing the gains against the losses.  Time will tell 
if this is a better choice.

Certainly when Yahoo! first started offering email, many users would not have  had a mobile to do two-factor with.  Now, many will.  Times change.  So must 
appropriate login measures.  But balancing privacy, easy-of-use and recovery,  against security is always the trick."

 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Scott C. Zimmerman

Scott C. Zimmerman is a CISSP qualified Information Security consultant and presenter

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 31 on sale from May 2017:


DDOS Attacks on Mobile Devices

Denial of service attacks (DoS), distributed denial of service attacks (DDoS) and reflector attacks (DRDoS) are well known and documented. More recently however we have seen that these attacks have been directed at mobile communication devices.  Read More »

Advancements in Windows Hibernation File Forensics

Brian Gerdon looks at how the windows hibernation files can be a valuable source of information for digital forensic investigators. Read More »

Subscribe today


Testing Damage Sustainability on SD Cards

A growing number of companies and agencies are now specializing in repair and recovery of data and not on the forensic examination of the data. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue