Tag Archives | passwords




Microsoft Says You SHOULD Re-use Passwords Across Sites

Ok so we constantly tell people not to reuse passwords across sites, because if they are stored in plain text (and leaked) those naughty hackers now have your e-mail address AND your password and can wreak havoc on your life. Which is pretty much true, but Microsoft disagrees and there is some validity to what […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

The 25 Worst Passwords Of 2013 – “password” Is Not #1

The worst passwords of 2013 – really, more like the most common. The majority come from the massive Adobe leak, which contributed over 40 million passwords and skewed the data a fair bit pushing “photoshop” and “adobe123” into the list. Most of them are no surprise though, we published the top 10 most common passwords […]

Tags: , , , , , , ,

Posted in: Password Cracking, Privacy, Web Hacking | Add a Comment

Cupid Media Hack Exposes 42 Million Passwords In Plain Text

42 Million Passwords – now that’s a big number, and the worst part – they aren’t even hashed. Nope, not at all – not even badly. Apparently the intrusion took place earlier this year, in January 2013 – but there was no public announcement. The data was found on the same server where the hacked […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Privacy, Web Hacking | Add a Comment

Brits Give Up Passwords For a £5 Gift Voucher

So it turns out you don’t need any fancy password cracking software like John the Ripper or Cain and Abel you just need a handful of £5 gift vouchers for Marks and Spencers! But we had discussed this in part before, some people will give out their passwords if you just ask, some if you […]

Tags: , , , ,

Posted in: Password Cracking, Social Engineering | Add a Comment

Wyd – Automated Password Profiling Tool

Wyd is a neat tool I found recently for Password Profiling. In current IT security environments, files and services are often password protected. In certain situation it is required to get access to files and/or data even when they are protected and the password is unknown. wyd.pl was born out of those two of situations: […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment

Most Damaging Computer Attacks Rely on Stolen Logins

A sterling case for two factor authentication if I ever saw one. The rule is use two of the 3 methods of authentication, if possible use all 3. What you have (A USB key or Token) What you are (Biometrics – Fingerprint or Iris scan) What you know (A password or passphrase) More than 8 […]

Tags: , , , , , , , , ,

Posted in: General Hacking | Add a Comment

The Top 10 Most Common Passwords

A pretty interesting article that statistically measured the frequency of passwords by taking an aggregate sample of passwords (primarily from the UK). Here are listed the most commonly occurring from the sample. 10. ‘thomas’ (0.99%) First off, at number 10, is the most common format of passwords – the name. Thomas is a perennially popular […]

Tags: , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Fake Microsoft Patch – BeastPWS-C

If you receive a e-Mail alert of a new patch for your Windows XP OS, think again before opening the link present on the message. The spammed emails, which purport to come from patch@microsoft.com, claim that a vulnerability has been found ‘in the Microsoft WinLogon Service’ and could ‘allow a hacker to gain access to […]

Tags: , , , , , , , ,

Posted in: Malware, Windows Hacking | Add a Comment

Photos as Visual Passwords Could Foil Hackers?

I’ve tried out a few of these visual recognition password technique things, and to tell you the truth they didn’t work for me, not at all. I clicked the requisite 3-4 spots on the image, and remembered them, but when I tried to login it wouldn’t accept it. A password that uses images instead of […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

Passwords Passe at RSA

SAN JOSE, California — Identity theft and online bank fraud were the unofficial themes of the 2006 RSA Conference, a massive security confab where Bill Gates came to announce the imminent death of the password and vendors filled the exhibition halls with iPod giveaways and promises that their product could stop everything from spam and […]

Tags: , ,

Posted in: General Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·