Tag Archive | "passwords"


18 July 2014 | 3,265 views

Microsoft Says You SHOULD Re-use Passwords Across Sites

Ok so we constantly tell people not to reuse passwords across sites, because if they are stored in plain text (and leaked) those naughty hackers now have your e-mail address AND your password and can wreak havoc on your life. Which is pretty much true, but Microsoft disagrees and there is some validity to what [...]

Continue Reading


22 January 2014 | 4,125 views

The 25 Worst Passwords Of 2013 – “password” Is Not #1

The worst passwords of 2013 – really, more like the most common. The majority come from the massive Adobe leak, which contributed over 40 million passwords and skewed the data a fair bit pushing “photoshop” and “adobe123″ into the list. Most of them are no surprise though, we published the top 10 most common passwords [...]

Continue Reading


20 November 2013 | 3,629 views

Cupid Media Hack Exposes 42 Million Passwords In Plain Text

42 Million Passwords – now that’s a big number, and the worst part – they aren’t even hashed. Nope, not at all – not even badly. Apparently the intrusion took place earlier this year, in January 2013 – but there was no public announcement. The data was found on the same server where the hacked [...]

Continue Reading


26 September 2008 | 7,963 views

Brits Give Up Passwords For a £5 Gift Voucher

So it turns out you don’t need any fancy password cracking software like John the Ripper or Cain and Abel you just need a handful of £5 gift vouchers for Marks and Spencers! But we had discussed this in part before, some people will give out their passwords if you just ask, some if you [...]

Continue Reading


02 November 2006 | 49,268 views

Wyd – Automated Password Profiling Tool

Wyd is a neat tool I found recently for Password Profiling. In current IT security environments, files and services are often password protected. In certain situation it is required to get access to files and/or data even when they are protected and the password is unknown. wyd.pl was born out of those two of situations: [...]

Continue Reading


24 September 2006 | 6,592 views

Most Damaging Computer Attacks Rely on Stolen Logins

A sterling case for two factor authentication if I ever saw one. The rule is use two of the 3 methods of authentication, if possible use all 3. What you have (A USB key or Token) What you are (Biometrics – Fingerprint or Iris scan) What you know (A password or passphrase) More than 8 [...]

Continue Reading


05 June 2006 | 51,933 views

The Top 10 Most Common Passwords

A pretty interesting article that statistically measured the frequency of passwords by taking an aggregate sample of passwords (primarily from the UK). Here are listed the most commonly occurring from the sample. 10. ‘thomas’ (0.99%) First off, at number 10, is the most common format of passwords – the name. Thomas is a perennially popular [...]

Continue Reading


31 May 2006 | 6,454 views

Fake Microsoft Patch – BeastPWS-C

If you receive a e-Mail alert of a new patch for your Windows XP OS, think again before opening the link present on the message. The spammed emails, which purport to come from patch@microsoft.com, claim that a vulnerability has been found ‘in the Microsoft WinLogon Service’ and could ‘allow a hacker to gain access to [...]

Continue Reading


18 April 2006 | 235,293 views

Photos as Visual Passwords Could Foil Hackers?

I’ve tried out a few of these visual recognition password technique things, and to tell you the truth they didn’t work for me, not at all. I clicked the requisite 3-4 spots on the image, and remembered them, but when I tried to login it wouldn’t accept it. A password that uses images instead of [...]

Continue Reading


24 February 2006 | 6,520 views

Passwords Passe at RSA

SAN JOSE, California — Identity theft and online bank fraud were the unofficial themes of the 2006 RSA Conference, a massive security confab where Bill Gates came to announce the imminent death of the password and vendors filled the exhibition halls with iPod giveaways and promises that their product could stop everything from spam and [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·