Remove Exercises Remove Government Remove Mining Remove Passwords
article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

In this case, that secret is her password and, well, just read it: My staff log onto my computer on my desk with my login everyday. To be fair to Nadine, she's certainly not the only one handing her password out to other people. In fact I often forget my password and have to ask my staff what it is. No one else has access.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows. In total, there are 1,160,253,228 unique combinations of email addresses and passwords. This is when treating the password as case sensitive but the email address as not case sensitive. There are 21,222,975 unique passwords. It'll be 99.x%

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

Use PasswordIQ to find which users are sharing passwords and which ones have weak passwords See the fully automated user provisioning and onboarding Find out how 60,000+ organizations have mobilized their end-users as their human firewall. Government. KnowBe4 Mobile Learner App - Users can now train anytime, anywhere!

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. Even government and public bodies’ websites – including, ironically, the ICO – were found to be running cryptomining software after a third-party plug-in was compromised, but it transpired. Users were encouraged to change their passwords.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter. And while I'm on Sony, the prevalence with which their users applied the same password to their Yahoo!

article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

How HIBP runs across the various Azure services, the Cloudflare dependencies, how I recover if things go wrong and then how that's managed across different autonomous parts of the project such as the HIBP website, the Pwned Passwords service etc etc. Collectively, we agreed to put pens down. I loaded 77 new data breaches comprising of 1.7B

IT 135
article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

And just a side-note before I jump into those fundamentals: I had a quick flick through the government's eSafety guidance for children under 5 whilst on the plane and it has a bunch of really good stuff. And importantly, teaching them how to use secure passwords with @1Password ?? What a ridiculous statement!

Privacy 140