How Hackers Crack Weak Passwords

People use weak password practices to secure critical information. Weak password practices include using the same password for multiple systems regardless of the value of the asset, dictionary words, short phases and keeping the same passwords for extended periods of time. For example, it’s common to find a password on a non-critical asset such as a PlayStation 3 be the same as a person’s bank account login.

The more information an attack knows about your password profile, the more likely they will crack your password. For example, a policy of “6-10 characters with one upper case letter and special character” actually helps an attacker reduce the target space meaning passwords are weaker with the policy. If an hacker captures a password for another system and notices a formula such as ‘<dictionary word>’ followed by ‘<3 numbers>’, it helps the attacker prepare a dictionary attack (utilities such as Crunch makes this easy). Any password shorter than 10 characters is an easy target to brute force attack based on today’s system process power. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (2 votes cast)

How To Educate Your Employees About Social Engineering

 How To Educate Your Employees About Social EngineeringA common saying is ” Amateurs Hack Systems, Professionals Hack People”.  Social engineering is the art of manipulating people into performing actions or divulging confidential information. People fall for social engineering tricks based on their instinct to be helpful and trusting. The typical attacker never comes face-to-face with a victim using deception through email, social networks or over the phone. Continue reading

VN:F [1.9.22_1171]
Rating: 4.8/5 (4 votes cast)

How Secure Is Your Home Wireless Network? Wireless Network Security 101

wep1 300x199 How Secure Is Your Home Wireless Network? Wireless Network Security 101
Wireless Network Security is important. Wireless networks are the way of the future. People don’t want to run cables through their homes and mobile devices are becoming common tools for surfing the Internet. If you live in a populated area, you will find many wireless SSIDs broadcasted. How secure is your wireless network? How much should you spend on a wireless router? Can you get by with a basic password or should you utilize Wireless Network Security features? Here is my answer. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (2 votes cast)

Passwords Are Doomed: You NEED Two-Factor Authentication

 Passwords Are Doomed: You NEED Two Factor Authentication
How many people use eight-character or less passwords with the first letter being capital and last entries being numbers? People are predictable and so are their passwords. To make things worse, people are lazy and tend to use the same passwords for just about everything that requires one. A study from the DEFCON hacker conference stated, “with $3,000 dollars and 10 days, we can find your password. If the dollar amount is increased, the time can be reduced further”. This means regardless of how clever you think your password is, its eventually going to be crack-able as computers get faster utilizing brute force algorithms mixed with human probability. Next year the same researchers may state, “with 30 dollars and 10 seconds, we can have your password”. Time is against you. Continue reading

VN:F [1.9.22_1171]
Rating: 4.8/5 (5 votes cast)