Feeds

Chocolate the key to uncovering PC passwords

Sweet talk and sweets is all it takes

SANS - Survey on application security programs

Three years since the last time they pulled this stunt, cheeky researchers can still wangle IT passwords with free chocolate and flirting.

A train station survey of 300 office workers carried out by Infosecurity Europe researchers in London revealed the disturbing statistic that 64 per cent would hand over their office computer passwords for a bar of chocolate "and a smile".

This percentage is marginally less than the last time Infosecurity Europe used this not-so-cunning honey trap trick, as reported by ENN.

The latest survey, however, also revealed what everyone knows but no one admits: 29 per cent of office workers know their colleagues' logins, and someone always has the boss's password.

The survey, which included a number of supposedly harder-to-crack IT professionals at a security conference, also revealed that over two-thirds of respondents thought the chief executive's secretary was usually the most likely candidate to have access to the head honcho's really juicy stuff.

Good-looking, chocolate-bearing researchers apparently had to probe a bit harder with the IT professionals than random train platform suits in order to get passwords, but the questions were simple.

Researchers asked IT conference delegates if they knew what the most common password is and then asked them what their password was. Only 22 per cent of IT professionals revealed their "Open Sesame" at this point, compared to 40 per cent of non-techie commuters. If at first they refused to give their password, researchers would then ask if it was based on a child, pet, football team, etc, and then suggest potential passwords by guessing the name of their child or team. By using this social engineering technique, a further 42 per cent of IT professionals and 22 per cent of commuters inadvertently revealed their password.

As the report authors pointed out: "What many of IT professionals failed to realise is that the researchers, who conducted the survey at the IT exhibition, had also read their names and organisation from their delegate badge as well!" Whoops.

One fifth of those surveyed said their organisation no longer uses passwords, with biometrics and coded tokens de rigueur.

The average number of work-related passwords was five, and the majority of respondents who regularly update their access codes (71 per cent) changed their password monthly.

More worryingly though, just under half of people questioned used the same corporate access passwords for all their personal web accounts such as online banking, retailing, and email. Half of respondents felt safe using internet banking services, but only one fifth could say the same about online retailing.

Meanwhile, two thirds said they would look at a file containing company salary details if they were sent it by mistake, and 20 per cent said they would circulate it among colleagues. Half of those who would take a peek would not pass on juicy info such as salary details, but this was more to do with fears of internal IT systems tracking file distribution patterns than respect of privacy. That is, if they thought they might get caught, many would keep schtum - digitally speaking at least.

Finally, 39 per cent said they would tell IT department staff their password. Only 32 per cent said they would tell their boss.

Infosecurity did not break down the gender split of its survey respondents, nor reveal what type of chocolate it was giving away - important metrics.

Copyright © 2007, ENN

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.