AD Banner

Featured

3/featured/recent

footer about

Videos

6/cate2/videos
Adv (300 x 250)

Find us on Facebook

5/cate3/lifestyle

Advertisement

6/breakingnews/random

Instagram posts

About us

3/cate1/entertainment

Recent Comments

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.
Copyright ©2019 by Mogtemplates

contact form

Name

Email *

Message *

Other News

[Related][recentmag]

EHI ONLINE LESSONS

EHI ONLINE LESSONS

Powered by Blogger.

Random Posts

World News

[World News][recentmag]
featured

Header Ads

Total Pageviews

Search This Blog

Blog Archive

Search This Blog

Latest

Brexit

Brexit

Football

Football

Random posts

5/cate4/random

Random Post

Adv (880 x 120)

News By Picture

pictures

Hot News

5/cate3/hottrend
Adv (880 x 120)

Labels

Hot News

[Hot News][recentmag]

Labels Cloud

Get In Touch
Footer Logo

Trending Posts Display

Labels List

Home Layout Display

Posts Title Display

Theme Layout

Theme Translation

Tech

tech

Games

games

Popular Posts

127 Likes
3,240 Followers
12.7k Subscribers
136 Followers

Pages

Recent Comments

How accessories make you a better lover. 18 ways devices are completely overrated. Operating systems in 12 easy steps.

Recent Posts

Adv (300 x 250)

Popular Posts

Trending Posts

The Big Password Mistake That Hackers Are Hoping You'll Make

By Ehijoshua (Jboss) → Saturday, 18 October 2014

The Big Password Mistake That Hackers Are Hoping You'll Make


PASSWORD


You're smart.

You don't use passwords like the perennial 123456 and qwerty. Or even slightly better ones, like Cassie86 or Cubs1908. Because you put some thought into them, your passwords are better than those, right?

Maybe. But unless you avoid a little-known mistake recently uncovered by password researchers, there's a good chance your passwords will still be far easier for hackers to crack than you think.

Can you tell how strong a password is?

To see, try to figure out which of these four are a pushover for hackers.

Zdhkqjbu83
74Xmbgdapw
Bmukwes3901!
lw;62v74y

Spoiler: They're all an easy mark for hackers, even though every one is 9 or more characters long and contains a mix of both letters and non-letters. How can such apparently strong passwords be so weak? The short answer is that they follow some of the most common patterns of composition that people use to create passwords, patterns that weaken them.

Beat the clock

How does a hacker get hold of your password? Most likely, through a breach of a customer database like the one that recently let criminals obtain confidential celebrity photos from Apple's iCloud. (According to Apple, the iCloud database itself was not breached). Since many passwords are stored in such a way that they can't be directly read by people, hackers often use software to crack them. The longer it takes to crack a password, the less likely the hacker will succeed. If it takes too long, the hacker may give up and move on to easier prey.

As I explained in Hack-proof your passwords, which I wrote when I was Technology Editor at Consumer Reports, long passwords comprised of a variety of letters, numbers, and special characters can better withstand cracking software than can short, simpler ones. However, when something about a password's composition is too predictable -- it begins with an upper case letter, for example, or includes a recognizable word -- it can be cracked much more quickly.

Games users play

Just how predictable are people in composing passwords? Even when they're following an organization's password guidelines regarding length and mix, it turns out, most compose passwords in very similar ways.

In a 2013 study for DARPA (the Federal Defense Advanced Research Projects Agency) called Pathwell, security consulting company KoreLogic found that, among the thousands of users within an unnamed Fortune 100 company, roughly half had relied on just five patterns to compose their passwords and 85 percent had relied on just 100 patterns. (KoreLogic found similar predictability within a variety of other companies).

Here are the three most common patterns KoreLogic found among the thousands it identified in those companies:

• One upper case, then 5 lower case, then 2 digits (Example: Dulith57)
• One upper case, then 6 lower case, then 2 digits (Example: Abugmar64)
• One upper case, then 3 lower case, then 4 digits (Example: Itio1981)

Which of these mistakes do you make?
It's not practical to try to avoid every one of the many patterns KoreLogic found. But you can still create better passwords by steering clear of some of the most common mistakes people make:

• Starting with an upper case letter followed by lower case letters
• When a password isn't long enough, adding a letter or two to the base word
• Putting digits, especially two or four of them, before or after the letters
• When a special character is required, using "!" and putting it at the end
• Not using two special characters in the same password

Don't rely on password checkers

When creating a password, you may be tempted to use online password checkers to test the strength of those you're considering. Beware: When I tried four of the most popular checkers, How Secure is my Password, Password Meter, Microsoft's Password Checker, and Kasperky's Secure Password Check, only Kaspersky's clearly informed me that the apparently strong password I submitted was actually far weaker than it appeared. Even Gmail's own password strength tester labeled that password as "strong."

How to make passwords less predictable

I won't suggest any compositional patterns here because, once published, they would immediately become a target for hackers. Instead, here are a few rules of thumb to keep your passwords from becoming too predictable:

• Avoid beginning the password with an upper case letter -- or maybe even any letter
• Create an acronym using the first letter of each word in a memorable sentence, as suggested by security expert Bruce Schneier -- example: t2cmlp,@yh ("Try to crack my latest password, all you hackers")
• Resist your natural tendency to mimic familiar words and phrases
• Use multiple special characters in the same password
• Don't always place digits adjacent to each other

Jillur Rahman

I'm Jillur Rahman. A full time web designer. I enjoy to make modern template. I love create blogger template and write about web design, blogger. Now I'm working with Themeforest. You can buy our templates from Themeforest.

No Comment to " The Big Password Mistake That Hackers Are Hoping You'll Make "