Articles Tagged with "Passwords"


From the Web

Cloud Based Wireless Cracking Services

December 15, 2009 from: AEON Security Blog

Security researchers are leveraging cloud computing to crack WPA wireless passwords at a cost and we’re wondering what other nefarious deeds are being done via cloud computing that we’ve never heard about. To be fair about this, for starters if you take notice of PC World’s title for the article, “New Cloud-based Service Steals Wi-Fi Passwords” it’s completely w...

Comments  (0)


From the Web

P2P fraudsters snare DoD employees and FL business; two indicted

December 11, 2009 from: Office of Inadequate Security

Jeffrey Steven Girandola and Kajohn Phommavong have been charged in a previously sealed 16-count indictment with Conspiracy, Computer Fraud, Access Device Fraud and Aggravated Identity Theft. According to the indictment, which was handed up by a federal grand jury in San Diego, the defendants installed peer-to-peer file sharing software on computers under their control and searched the a...

Comments  (0)


From the Web

Malware rebounds as cause of data loss

December 04, 2009 from: Office of Inadequate Security

The 2009 CSI Computer Crime and Security survey identified a number of shifts in significant cybersecurity threats this year. Malware infections jumped to 64% from 50%, reversing a dip in the number of companies experiencing malware infections that started in 2005. That year, the figure was 74%.

Comments  (0)


From the Web

Researcher refutes phishing account of hijacked Hotmail passwords

October 07, 2009 from: Office of Inadequate Security

One researcher isn’t buying Microsoft’s and Google’s explanation that hijacked Hotmail and Gmail passwords were obtained in a massive phishing attack.

Comments  (0)


From the Web

All about Website Password Policies

October 07, 2009 from: Jeremiah Grossman's Blog

Passwords are the most common way for people to prove to a website that they are who they say they are, as they should be the only ones who know what it is. That is of course unless they share it with someone else, somebody steals it, or even possibly guesses it. This identity verification process is more commonly know as “authentication.”

Comments  (0)


From the Web

Gmail, AOL and Yahoo logins posted online; weak passwords

October 07, 2009 from: Office of Inadequate Security

More than a quarter of a million email accounts on the biggest webmail services are believed to be at risk from online criminals after thousands of passwords belonging to users of the Yahoo, AOL and Gmail services were posted online.

Comments  (0)


From the Web

Scam hits more e-mail accounts, MS blocks accounts

October 06, 2009 from: Office of Inadequate Security

The scale of a phishing attack originally thought to be directed at Hotmail may be larger than previously thought. BBC News has seen a list of more than 20,000 more names and passwords that have been posted online.

Comments  (0)


From the Web

Confirmed: Thousands of Hotmail passwords leaked online

October 05, 2009 from: Office of Inadequate Security

An anonymous user posted details of the accounts on October 1 at pastebin.com, a site commonly used by developers to share code snippets. The details have since been removed but Neowin has seen part of the list posted and can confirm the accounts are genuine and most appear to be based in Europe. The list details over 10,000 accounts starting from A through to B, suggesting there could be addition...

Comments  (0)


From the Web

Password Advice

August 10, 2009 from: hackyourself.net

Some advice and insight from Bruce Schneier on Password Security. Whether you agree or disagree, this is worth checking out.

Comments  (3)


From the Web

Hash Information Disclosure Via Collisions - The Hard Way

July 14, 2009 from: Rsnake's blog at ha.ckers.org

Every hashing algorithm has possible collisions once you allow a certain number of chars to be hashed. Let’s say you found out that “bob” and “sam” collided in whatever hashing algorithm. If you created an account on a web server with the password of “bob” and then later typed in the password of “sam” assuming no salts you would be able to get ...

Comments  (0)


Most Liked