Results 1 to 8 of 8

Thread: If you're using 'Password1,' seriously, change it now

  1. #1
    Join Date
    Aug 2004
    Location
    Alberta, Canada
    Posts
    22,005

    If you're using 'Password1,' seriously, change it now

    http://ca.finance.yahoo.com/news/if-you-re-using--password1---change-it--now-.html

    The number one way hackers get into protected systems isn't through a fancy technical exploit. It's by guessing the password.

    That's not too hard when the most common password used on business systems is "Password1."

    MORE RELATED TO THIS STORY
    Next great grocery scam is in your home
    4 risky places to swipe your debit card
    BMO employee fined $10G for snooping

    There's a technical reason for Password1's popularity: It's got an upper-case letter, a number and nine characters. That satisfies the complexity rules for many systems, including the default settings for Microsoft's widely used Active Directory identity management software.

    Security services firm Trustwave spotlighted the "Password1" problem in its recently released "2012 Global Security Report," which summarizes the firm's findings from nearly 2 million network vulnerability scans and 300 recent security breach investigations.

    Around 5% of passwords involve a variation of the word "password," the company's researchers found. The runner-up, "welcome," turns up in more than 1%.

    Easily guessable or entirely blank passwords were the most common vulnerability Trustwave's SpiderLabs unit found in its penetration tests last year on clients' systems. The firm set an assortment of widely available password-cracking tools loose on 2.5 million passwords, and successfully broke more than 200,000 of them.

    Verizon came up with similar results in its 2012 Data Breach Investigations Report, one of the security industry's most comprehensive annual studies. The full report will be released in several months, but Verizon previewed some of its findings at this week's RSA conference in San Francisco.

    Exploiting weak or guessable passwords was the top method attackers used to gain access last year. It played a role in 29% of the security breaches Verizon's response team investigated. [Related: Smartphone Features You Don't Really Need]

    Verizon's scariest finding was that attackers are often inside victims' networks for months or years before they're discovered. Less than 20% of the intrusions Verizon studied were discovered within days, let alone hours.

    Even scarier: Few companies discovered the breach on their own. More than two-thirds learned they'd been attacked only after an external party, such as a law-enforcement agency, notified them. Trustwave's findings were almost identical: Only 16% of the cases it investigated last year were internally detected.

    So if your password is something guessable, what's the best way to make it more secure? Make it longer.

    Adding complexity to your password -- swapping "password" for "p@S$w0rd" -- protects against so-called "dictionary" attacks, which automatically check against a list of standard words.

    But attackers are increasingly using brute-force tools that simply cycle through all possible character combinations. Length is the only effective guard against those. A seven-character password has 70 trillion possible combinations; an eight-character password takes that to more than 6 quadrillion.

    Even a few quadrillion options isn't a big deal for modern machines, though. Using a $1,500 computer built with off-the-shelf parts, it took Trustwave just 10 hours to harvest its 200,000 broken passwords.

    "We've got to get ourselves using stuff larger than human memory capacity," independent security researcher Dan Kaminsky said during an RSA presentation on why passwords don't work.

    He acknowledged that it's an uphill fight. Biometric authentication, smartcards, one-time key generators and other solutions can increase security, but at the cost of adding complexity.

    "The fundamental win of the password over every other authentication technology is its utter simplicity on every device," Kaminsky said. "This is, of course, also their fundamental failing."



    @YahooFinanceCA on Twitter, become a fan on Facebook
    "Do or do not. There is no try." -- Yoda

  2. #2
    Join Date
    Jan 2012
    Location
    GTA, Ontario, Canada
    Posts
    98
    Most of my friends use my password method as its easy to remember, but killer to guess.

    Open a fav book, go to a random page. Find a 5 or more letter word that you like. Do the same with another book. Now change some of the A's to @ and some of the I's to 1 n so on. Next thing you know you have a 10+ long password that is easy to remember and near impossible to hack.

  3. #3
    Quote Originally Posted by Digi View Post
    Most of my friends use my password method as its easy to remember, but killer to guess.

    Open a fav book, go to a random page. Find a 5 or more letter word that you like. Do the same with another book. Now change some of the A's to @ and some of the I's to 1 n so on. Next thing you know you have a 10+ long password that is easy to remember and near impossible to hack.
    To a certain extent, yes that's true. If you're trying to protect against just humans guessing your password, then that'll work fine. However, if you're up against a password cracker, that would fall with ease. A password cracker can discern anything that's based off a dictionary word(s) with ease, even if you do replace the A's with @'s and the I's with 1's. The best password is 8+ characters long, not based off a dictionary word (or slang), contains variations of capital and lowercase letters, numbers, and characters.


  4. #4
    Oh I don't use that. My password is Letmein.

  5. #5
    Join Date
    Aug 2004
    Location
    Alberta, Canada
    Posts
    22,005
    Ummm...Marigold, you may not want to post that on a public forum that everyone can see. I know it's a remote chance...but still....
    "Do or do not. There is no try." -- Yoda

  6. #6
    Join Date
    Jun 2000
    Location
    Windham, Vermont, USA
    Posts
    40,861
    I'm sure she was joking, Candace.
    I've Been Frosted

  7. #7
    Join Date
    Apr 2006
    Location
    Litter Box, Greenville, SC
    Posts
    5,307
    And people wtill won't listen.

    Anyway, I was watching a show on security and they talked about the length of passwords. It seems that an 8 character combo is easy for a machine to crack. A 12 character combo takes much longer.

    And the articles below suggest you use a longer password.

    http://www.toplinestrategies.com/clo...y-brute-force/

    http://www.sans.org/windows-security...d-spreadsheet/

    That's cute Marigold. I wonder how many people use "Open Sesame"
    Anne
    Meowmie to Lucy Lou and Barney, and Aunt to Timmy (RIP)

    Former kitties now in foster care: Nellie aka Eleanor van Fluffytail (at a Cat Cafe), Lady Jane Grey, Bob the Bobtail, and Callie. Kimi has been adopted into another family that understands Siamese. HRH Oliver Woodrow von Katz is in a Sanctuary.

    I'm Homeless, but with resources, and learning to live again.


    RIP Timmy (nephew kitty) May 17, 2018, Mr. Spunky (May 10, 2017), Samwise (Dec 2, 2014), Emily (Oct 8, 2013), Rose (Sept 24, 2001), Maggie (Fall 2003)

  8. #8
    It's simpler than using a cracking program to get into the system if you have physical access.

    People are lazy about passwords. There are normally 5-4 places you can look and find it written down because the passwords are too complex to remember if you meet the IT depts' requirements for complexity.

    Why hack it if you can find it at their desk?
    The one eyed man in the kingdom of the blind wasn't king, he was stoned for seeing light.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Copyright © 2001-2013 Pet of the Day.com