(Source: GCN.com) As a software security researcher looking at authentication technologies for hand-held devices, I am fully aware that the technologies change, but the challenge …