Here at Authlogics, we’re extremely privileged to have access to a cache of password-related data. The Password Breach Database is a treasure trove for security analysis, allowing us to use the 1 billion unique clear text passwords to develop trends and patterns found in data breaches that have exposed passwords. Using this, we can make..
It is well known that longer passwords are more secure than short ones, however, when it comes to IT security users will usually do the bare minimum. If a password policy only requires an 8 character password, most users will only use 8 characters and no more. This behaviour is partly down to laziness, but..
Here at Authlogics, we’re extremely privileged to have access to a cache of password-related data. The Password Breach Database is a treasure trove for security analysis, allowing us to use the 1 billion unique clear text passwords to develop trends and patterns found in data breaches that have exposed passwords, allowing us to make inferences..
Internet websites such as techradar.com and cybernews.com have been reporting that RockYou2021 is the largest password breach ever released, even comparing it to the Compilation of Many Breaches (COMB) breach collection we reported on earlier this year. Headlines include the fact that RockYou2021 has more than twice as many passwords (8 billion) compared to COMB (3.2 billion)…
You’re back in the stadium watching your favourite football team play, the crowds are going wild and your team is winning. Look again at the number of people present (when stadiums are back to full capacity) and imagine each one of those fans had the same password – football. Football fans around the world are..
No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
Unless you’ve been living under a rock, or aren’t into IT security, you will of heard about the Cit0day breach database dump. Various online news outlets rushed to get their scare tactic reports out, while others took some time to pause and analyze what was found in the breach before commenting. As ever, industry insiders..
It’s that time of year again, with 2019 behind us, and 2020 stretching far ahead. What’s to come this year is the question that most businesses will be pondering in January. We’ve made some cybersecurity predictions for 2020 and have considered: What do we need to prepare for? What has the potential to catch us..