passwords

Google reveals the 10 Worst Password Ideas

Man’s best friend does a terrific job of protecting your home. But when it comes to protecting your online accounts, your beloved pet is literally the worst choice possible.

 

Recently, Google conducted a study of 2,000 people to learn more about their methods for choosing account passwords. The research revealed a worrying fact: Most people choose passwords based on readily available information. This means a surprising number of accounts can be hacked using a few simple, educated guesses.

So, what are the most common passwords?

U.S.

6 mobile security screw-ups you're (probably) guilty of

In two weeks, the security community will flock to San Francisco for this year’s RSA Conference. With two-thirds of Internet users now accessing the Internet via their mobile devices daily and mobile malware reportedly up over 185 percent in 2012, the hottest topic on the docket is mobile security.
Whether you’re attending RSA or just curious about what the experts are saying, here are six tips for protecting your mobile identity (and privacy) in 2013:
U.S.

If the Internet is secure, why are there Internet security problems?

Internet security problems stem from criminal hackers or cause-motivated “hacktivists” that use crimeware, phishing and other techniques to steal online identities, money or confidential information. Hackers target individuals and businesses; research firm Gartner Inc. estimates that online criminals have stolen $3 billion from businesses. One major weakness in Internet security these hackers exploit is the use of passwords to prove your online identity. If someone steals your passwords they can log into your accounts.

U.S.

Is A Password Enough? A Closer Look at Authentication

Yahoo reported the theft of some 400,000 user names and passwords to access its website, acknowledging hackers took advantage of a security vulnerability in its computer systems. The Mountain View, California-based LinkedIn, an employment and professional networking site which has 160 million members, was hacked and suffered a data breach of 6 million of its clients and is now involved in a class-action lawsuit. These sites did something wrong that allowed those passwords to get hacked. However passwords themselves are too hackable.
U.S.

How To Choose The Perfect Password

Various password-cracking methods exist which use automated software to guess passwords; the three main methods are to use dictionary words, a combination of dictionary and other combinations (known as hybrid) and brute force which uses all possible methods and combinations.
International

How phone hacking works

Anyone who’s paid attention to the news lately has likely been bombarded with round-the-clock-updates on the phone hacking scandal that has ensnared Ruport Murdoch’s News Corp empire. But if you looked past the melodrama being played out before the entire world, or even beyond the often-discussed concerns over press ethics and journalists’ unsavory ties to government officials, the unfolding scandal brings to light, in my opinion, an equally disturbing (if not worse) threat to the public at large: phone hacking.
U.S.

Pages

Subscribe to passwords