Keeping clients' computers safe and profitable for over 30 years | |||
Home Forms About Current Newsletter subscribe Search All Articles
Browse by Category
|
LinkedIn BreachAs many of you have heard, LinkedIn and Eharmony were hacked this month. LinkedIn lost 6.4 million password hashes. The hash is the result of running your password through an encryption algorithm. This algorithm cannot be reversed, so you cannot take the hash and run it back through an algorithm to get the password. Hashing is one way only. However, because LinkedIn didn't salt the hash, their hash table was vulnerable to a standard dictionary attack, and within a few days over 60% of the table was decoded.So, people could have access to your LinkedIn account. If the hackers can match those to email addresses, then expect those passwords to be used to try and get into gmail accounts, yahoo accounts, Amazon accounts, Paypal accounts, and any other major accounts. The full 6.4 million hash table was posted online for everyone to work on. Some experts expect 95% to get cracked eventually. Rules to prevent you from being vulnerable
I've written about using secure passwords and password safes before. Here is an article on making good passwords. Here is one on making passwords that you can type in small form factor devices like phones, and here is using Keepass to make passwords. This article is an introduction to Keepass and this one shows you how to setup a Hotkey login with Keepass, so the username and password are entered automatically. Date: June 2012
This article is licensed under a Creative Commons Attribution-NoDerivs 3.0 Unported License. |
||
|