It looks like  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    usernames and passwords are on their way out. No  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    will we have to worry about the security of our login  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   . They are set to be replaced by an  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    more secure login system known as Web Authentication. Web Authentication has become an official standard for logging in at the main Internet standards  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   , the World Wide Web Consortium (WWWC). It is a  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    that will be universally used by web browsers and platforms for simpler and stronger authentication  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   . It will allow website users to log in securely to their  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    accounts using a digital  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   , biometrics (such as fingerprints and facial recognition) or USB  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    keys. The WWWC spoke about the  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    of passwords being  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   . A spokesperson said: "It's  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    knowledge that passwords have outlived their  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   . Not only are stolen, weak or default passwords behind 81 per cent of data  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   , they are a drain of time and  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable   ." It added: "Now is the time for web services and businesses to adopt Web Authentication to move beyond  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    passwords and help web users improve the security of their  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    experiences," Web Authentication means users are at  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    risk of having their passwords and credentials stolen. This is  because body breaches common credentials days device efficacy infinitely less login longer numbered online processes resources security system vulnerable    login authentication is achieved via physical devices or biometrics from our body.