Qu’est-ce qu’un mot de passe long, ou « phrase passe » ?

Quand les sites le permettent, il est bon d’enregistrer des mots de passe les plus longs possibles afin de compliquer la tâche des pirates, susceptibles de vouloir capter vos données personnelles. Ainsi, il est possible d’écrire de longues phrases facilement mémorisables et, plutôt que le prénom de votre enfant, d’écrire ceci : charlotteestnéeauprintempsle091098, ou centansdesolitudeestmonromanfavori, lagrandevadrouillemefaitrire… ou encore lechoixdesophiemefaitpleurer.


What Security Challenges to Focus on in the New Year

In 2012, security challenges we faced were often the ribbon cuttings and business plans that startup criminal organizations launched. In 2013, those criminal enterprise business plans will come together—and we need to be ready. Social media is high on criminal hackers radar. Criminals scan social media looking for people who they can scam. One such scam seeks out entire families and usually targets a grandparent. Criminals will pose as the grandchild and call granny asking for money to be wired. They are also looking at your page to crack password resets.

What We Learned About Digital Security In 2012

Sometimes it’s the worst things that can happen that become the eye-opening best things that effect positive change. The year 2012 saw numerous high-profile data breaches, epic hacks, full-on hacktivism and lots of major identity theft ring busts. The best news is the public is more aware, which means they are better equipped to protect themselves and law enforcement is well prepared to take down criminals.

What is phishing?

Phishing is a scam conducted by cyber criminals, or hackers, to steal your online username and password, as well as "shared secrets" such as your pet's name. Often phishing is a two-part attack involving an e-mail containing a link to a fake website. The e-mail is sent to a wide audience and is designed to look like urgent communication from someone you trust, such as a security alert from your bank. The fake website is designed to look like the website of the bank named in the e-mail, but is controlled by the hacker.


What is the best way to prevent phishing?

The best way to prevent phishing is to have some kind of personal security device separate from your PC that is part of the login. This might be a smart card or one-time password (OTP) USB token that generates a unique secret number that makes every login unique. This is very effective protection because even if someone steals your username and password by phishing, using a malware Trojan or keyboard logger, they still cannot access your online accounts and pretend to be you without having the smart card or OTP token.


My email box was hacked, what can I do?

If your email has been hacked, there are several steps you can take to regain control of your account.

• First, change your password and make it strong (See, How do I choose a good password?).

• Also change any security questions you have associated with this account. A good rule of thumb with security questions is to not answer them honestly, so the answers are harder to guess. If the question asks the name of your first dog, answer with your favorite song, for example.



Subscrever hackers