A recent study of five million leaked passwords from enterprises in 2016 revealed the most popular ones among users. Tops on the list was “123456,” which makes up about 4% of the sample set, followed...
A new internet security vulnerability was announced last week, and it is “a scary big deal“. Cloudbleed, the name given to this vulnerability, has led to a potentially wide-spread leak of passwords and other data...
Last month, charges were filed against a hacker who used a phishing scheme in May 2016 to potentially access over 750,000 confidential health and personal records in Los Angeles County. As this incident shows, phishing...
With all of the leaked passwords that have been made available recently (passwords from services such as Yahoo and LinkedIn), cyber-criminals have access to vast data sets of passwords that make it easier to crack...
As mentioned in a previous blog post, foreign spies had been targeting the Donald Trump and Hillary Clinton presidential campaigns. And in recent weeks, reports indicate attacks have not only been successful, but reaching other...
Corporate users of Microsoft’s OneDrive cloud storage are increasingly storing files there that contain passwords. According to a report released last month, “enterprises are routinely storing corporate password files in the cloud through Microsoft’s OneDrive...
Last week, James Clapper, the U.S. director of national intelligence, said there have been “some indications” that foreign hackers have been targeting the presidential campaigns of Donald Trump, Hillary Clinton, and Bernie Sanders. The FBI...
A recent faux phishing scheme designed to track the activity of hackers accessing the “leaked” data confirms what we already know — hackers gravitate towards corporate data, and not by the dozens, but by the...
Last month, I posted about the healthcare industry being a target for cybercriminals. Another target, likely even more lucrative, is the financial services industry. According to a 2014 news article, the Federal Bureau of Investigation...
For decades, logging into a network, application, server, etc. usually only requires a username and password. Sometimes certain policies are put in place to try to make sure passwords are not compromised, such as requiring...