Why relying on your memory could compromise your security