paykasa bozdurma
Home > Support > Blog
A Security Expert Explains the Top Password Pitfalls

A Security Expert Explains the Top Password Pitfalls

Typically, when I speak to someone about passwords and how to improve them, the follow-up question to the instructional “do this” is inevitably “why?” So we’re going to start with “why certain passwords are bad” and then follow up in a few weeks with “what should we do about that?” This post will attempt to show you the pitfalls many passwords fall into, broken down into four main categories.

Tuesday, April 24, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (482)/Comments (0)/
Categories: Security Services
New Report: IoT Devices Used to Mount Massive-Scale Attacks

New Report: IoT Devices Used to Mount Massive-Scale Attacks

Hackers are using compromised Internet of Things (IoT) devices to attack ecommerce and other web sites, according to a report published Oct. 12 by the Akamai Technologies Threat Research team. The researchers noted a recent spate of attacks in which hackers attempted to gain access to the sites using login and password combinations from the recent Yahoo! security breach, in which half a billion accounts were stolen. Because many people reuse their passwords, hackers often try stolen credentials in other sites to see if they work.

Monday, November 21, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1170)/Comments (0)/
Categories: Security Services
RSS