article thumbnail

Passwords Are Unfit - So Why Do We Still Have Them?

Data Breach Today

Passwords are supported everywhere. In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy."

Passwords 130
article thumbnail

Your Phone May Soon Replace Many of Your Passwords

Krebs on Security

Apple , Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. “I worry about forgotten password recovery for cloud accounts.” Image: Blog.google.

Passwords 247
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Infostealer Gangs Steal 50 Million Passwords

eSecurity Planet

Group-IB cybersecurity researchers recently identified several Russian-speaking cybercrime groups offering infostealing malware-as-a-service (MaaS), resulting in the theft of more than 50 million passwords thus far. How to Stop Infostealer Malware. Don’t save passwords in browser.

Passwords 127
article thumbnail

GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen

The Last Watchdog

It involves regularly changing passwords and inventorying sensitive data. Employees are the first line of defense against cybercrime and should understand how to recognize phishing emails and what to do if they suspect them. Change passwords regularly. Passwords are easy to steal, and hackers can use them in just a few seconds.

article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

IoT devices are exposed to cybersecurity vulnerabilities. However, if you know where the dangers lurk, there is a way to minimize the cybersecurity risks. Here are five significant cybersecurity vulnerabilities with IoT in 2020. Simple or reused passwords are still a problem. The Threat is Definitely Real.

IoT 133
article thumbnail

Hackers Leak 87,000 Fortinet VPN Passwords

eSecurity Planet

The network security vendor said the credentials were stolen from systems that remain unpatched against a two-year-old vulnerability – CVE-2018-13379 – or from users who patched that vulnerability but failed to change passwords. Treat all credentials as potentially compromised and perform an organization-wide password reset.

Passwords 117
article thumbnail

John the Ripper: Password Cracking Tutorial and Review

eSecurity Planet

John the Ripper is a popular password cracking tool that can be used to perform brute-force attacks using different encryption technologies and helpful wordlists. It’s often what pen-testers and ethical hackers use to find the true passwords behind hashes. For our example, we won’t need a powerful machine. Or at least a good GPU.