Feeds

Chocolate the key to uncovering PC passwords

Sweet talk and sweets is all it takes

High performance access to file storage

Three years since the last time they pulled this stunt, cheeky researchers can still wangle IT passwords with free chocolate and flirting.

A train station survey of 300 office workers carried out by Infosecurity Europe researchers in London revealed the disturbing statistic that 64 per cent would hand over their office computer passwords for a bar of chocolate "and a smile".

This percentage is marginally less than the last time Infosecurity Europe used this not-so-cunning honey trap trick, as reported by ENN.

The latest survey, however, also revealed what everyone knows but no one admits: 29 per cent of office workers know their colleagues' logins, and someone always has the boss's password.

The survey, which included a number of supposedly harder-to-crack IT professionals at a security conference, also revealed that over two-thirds of respondents thought the chief executive's secretary was usually the most likely candidate to have access to the head honcho's really juicy stuff.

Good-looking, chocolate-bearing researchers apparently had to probe a bit harder with the IT professionals than random train platform suits in order to get passwords, but the questions were simple.

Researchers asked IT conference delegates if they knew what the most common password is and then asked them what their password was. Only 22 per cent of IT professionals revealed their "Open Sesame" at this point, compared to 40 per cent of non-techie commuters. If at first they refused to give their password, researchers would then ask if it was based on a child, pet, football team, etc, and then suggest potential passwords by guessing the name of their child or team. By using this social engineering technique, a further 42 per cent of IT professionals and 22 per cent of commuters inadvertently revealed their password.

As the report authors pointed out: "What many of IT professionals failed to realise is that the researchers, who conducted the survey at the IT exhibition, had also read their names and organisation from their delegate badge as well!" Whoops.

One fifth of those surveyed said their organisation no longer uses passwords, with biometrics and coded tokens de rigueur.

The average number of work-related passwords was five, and the majority of respondents who regularly update their access codes (71 per cent) changed their password monthly.

More worryingly though, just under half of people questioned used the same corporate access passwords for all their personal web accounts such as online banking, retailing, and email. Half of respondents felt safe using internet banking services, but only one fifth could say the same about online retailing.

Meanwhile, two thirds said they would look at a file containing company salary details if they were sent it by mistake, and 20 per cent said they would circulate it among colleagues. Half of those who would take a peek would not pass on juicy info such as salary details, but this was more to do with fears of internal IT systems tracking file distribution patterns than respect of privacy. That is, if they thought they might get caught, many would keep schtum - digitally speaking at least.

Finally, 39 per cent said they would tell IT department staff their password. Only 32 per cent said they would tell their boss.

Infosecurity did not break down the gender split of its survey respondents, nor reveal what type of chocolate it was giving away - important metrics.

Copyright © 2007, ENN

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.