Iranian Golden Pages Canada - Zarvaragh.com
Home Directory Promote Your Business Services Need Business Advice? About Us Contact Us  
 


Advanced Search



 




Contact us to promote your business
Your listing will appear on Google!
 

If you're using 'Password1,' seriously, change it now




CNNMoney.com

The number one way hackers get into protected systems isn't through a fancy technical exploit. It's by guessing the password.

That's not too hard when the most common password used on business systems is "Password1."

There's a technical reason for Password1's popularity: It's got an upper-case letter, a number and nine characters. That satisfies the complexity rules for many systems, including the default settings for Microsoft's widely used Active Directory identity management software.

Security services firm Trustwave spotlighted the "Password1" problem in its recently released "2012 Global Security Report," which summarizes the firm's findings from nearly 2 million network vulnerability scans and 300 recent security breach investigations.

Around 5% of passwords involve a variation of the word "password," the company's researchers found. The runner-up, "welcome," turns up in more than 1%.

Easily guessable or entirely blank passwords were the most common vulnerability Trustwave's SpiderLabs unit found in its penetration tests last year on clients' systems. The firm set an assortment of widely available password-cracking tools loose on 2.5 million passwords, and successfully broke more than 200,000 of them.

Verizon came up with similar results in its 2012 Data Breach Investigations Report, one of the security industry's most comprehensive annual studies. The full report will be released in several months, but Verizon previewed some of its findings at this week's RSA conference in San Francisco.

Exploiting weak or guessable passwords was the top method attackers used to gain access last year. It played a role in 29% of the security breaches Verizon's response team investigated. [Related: Smartphone Features You Don't Really Need]

Verizon's scariest finding was that attackers are often inside victims' networks for months or years before they're discovered. Less than 20% of the intrusions Verizon studied were discovered within days, let alone hours.

Even scarier: Few companies discovered the breach on their own. More than two-thirds learned they'd been attacked only after an external party, such as a law-enforcement agency, notified them. Trustwave's findings were almost identical: Only 16% of the cases it investigated last year were internally detected.

So if your password is something guessable, what's the best way to make it more secure? Make it longer.

Adding complexity to your password -- swapping "password" for "p@S$w0rd" -- protects against so-called "dictionary" attacks, which automatically check against a list of standard words.

But attackers are increasingly using brute-force tools that simply cycle through all possible character combinations. Length is the only effective guard against those. A seven-character password has 70 trillion possible combinations; an eight-character password takes that to more than 6 quadrillion.

Even a few quadrillion options isn't a big deal for modern machines, though. Using a $1,500 computer built with off-the-shelf parts, it took Trustwave just 10 hours to harvest its 200,000 broken passwords.

"We've got to get ourselves using stuff larger than human memory capacity," independent security researcher Dan Kaminsky said during an RSA presentation on why passwords don't work.

He acknowledged that it's an uphill fight. Biometric authentication, smartcards, one-time key generators and other solutions can increase security, but at the cost of adding complexity.

"The fundamental win of the password over every other authentication technology is its utter simplicity on every device," Kaminsky said. "This is, of course, also their fundamental failing."



644 page views
Want to convert pinglish to english?   Want to convert date?   Want to find out today's currencies' value?
         
Need a dictionary?   Want to download Zarvaragh's pdf version?   Need business advice?

 
 
 
 
 
   
 
   
 
 
 
     
 
Head Office
Toronto, Ontario, Canada
Phone: 416-222-2211
Toll Free: 1-855-460-2211
Fax: 416-222-7422
mail@zarvaragh.com
   
3500 Dufferin Street
Suite 603 Toronto,ON M3K 1N2

Montreal, Québec, Canada
Toll Free: 1-855-460-2211
Fax: 416-222-7422
montreal@zarvaragh.com

Orange, California, USA
Phone: 714-978-4888
Toll Free: 1-855-460-2211
usa@zarvaragh.com

© 2011 www.zarvaragh.com
Sitemap:

Home
Add Your Business
Directory
Promote Your Business
Services
Need Business Advice
About Us
Contact Us
Website Legals
Download Zarvaragh Online Versions:

2015 - 2016
2014 - 2015
2013 - 2014
2012 - 2013
2011 - 2012
2010 - 2011
2009 - 2010
2008 - 2009
2007 - 2008
2006 - 2007
2004 - 2005