Notice: amp_is_available was called incorrectly. `amp_is_available()` (or `amp_is_request()`, formerly `is_amp_endpoint()`) was called too early and so it will not work properly. WordPress is currently doing the `pre_get_posts` hook. Calling this function before the `wp` action means it will not have access to `WP_Query` and the queried object to determine if it is an AMP response, thus neither the `amp_skip_post()` filter nor the AMP enabled toggle will be considered. It appears the theme with slug `publisher` is responsible; please contact the author. Please see Debugging in WordPress for more information. (This message was added in version 2.0.0.) in /home/runcloud/webapps/techilive/wp-includes/functions.php on line 5313
Complex passwords aren't always best -

Complex passwords aren’t always best


Credit: Dan Nelson, Unsplash

Research from James Cook University shows increasingly complex website password restrictions often leave users frustrated and lead to poor password security.

Associate Professor Roberto Dillon investigated how users react to increasingly complex password requirements and whether those rules compromise password security.


“Our results confirm that the tougher the constraints of creating the passwords the safer users feel with their information,” he said. “However, the results show that a large number of restrictions can frustrate users.”

Dr. Dillon said this frustration led to 75% of participants using strategies to remember their passwords, including strategies that compromise their security.

“The most popular strategy was using the same password for multiple sites,” he said.


Dr. Dillon and his team conducted a survey where users were asked to create a password following an increasing number of restrictions, ranging from “passwords must contain at least eight characters” to “passwords must be different from the latest five passwords.”

Participants were also asked if they used any strategies to remember their passwords, as well as the situations where they would be tempted to use those strategies.

“Websites often require passwords that include a combination of special characters, numbers, upper- and lower-case letters, and more,” he said. “This makes passwords less likely to be compromised by hackers, but harder for users to invent a password and to remember it.”


While measures such as password managers and two-factor authentication protocols offer solutions to password management and securing privacy, Dr. Dillon said they still suffer from usability issues and demonstrate inconvenience to users.

He suggests a better approach was to ask users to create a long but meaningful password phrase.

“This is easy to remember but long enough to hinder brute-force hacking attacks,” he said. “At the same time, providers should avoid adding several restrictions as it makes it more likely for users to resort to workarounds that compromise security.”


Bypassing popular passwords

More information:
Roberto Dillon et al. Password Policies vs. Usability: When Do Users Go “Bananas”?, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2021). DOI: 10.1109/TrustCom50675.2020.00032

Provided by
James Cook University


Complex passwords aren’t always best (2021, May 7)
retrieved 7 May 2021

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.


Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.


For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – The content will be deleted within 24 hours.

Leave a comment