Home Tags Password

Tag: password

password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

The use of passwords is known to be ancient. Sentries would challenge those wishing to enter an area or approaching it to supply a password or watchword, and would only allow a person or group to pass if they knew the password. In modern times, user names and passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user has passwords for many purposes: logging into accounts, retrieving e-mail, accessing applications, databases, networks, web sites, and even reading the morning newspaper online.

Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words may be harder to guess, a desirable property. Some passwords are formed from multiple words and may more accurately be called a passphrase. The terms passcode and passkey are sometimes used when the secret information is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be easily memorized and typed.

Most organizations specify a password policy that sets requirements for the composition and usage of passwords, typically dictating minimum length, required categories (e.g. upper and lower case, numbers, and special characters), prohibited elements (e.g. own name, date of birth, address, telephone number). Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords.

Here's how to protect yourself until Apple batches bafflingly bad bug.
Apple, this is bad – like Windows 95 bad – but there is a workaround to kill the bug A trivial-to-exploit flaw in macOS High Sierra, aka macOS 10.13, allows users to gain admin rights, or log in as root, without a password.…
Welcome to ransomware in 2017 – the year global enterprises and industrial systems were added to the ever-growing list of victims, and targeted attackers started taking a serious interest in the threat. It was also a year of consistently high attack numbers, but limited innovation.
It won't help the situation (*cough* idiot *cough*) Attempting to scare people by telling them their password choices are stupid or easily guessable is counterproductive: because it serves only to reassure them that they are just like everyone else.…
Phew! Nothing but e-mails and hashed passwords leaked The world's self-described “most awesome” collection of images, Imgur, has confessed to leaking 1.7 million user records in 2014.…
The hackers stole email addresses and passwords.

Android commercial spyware

Therersquo;s certainly no shortage of commercial spying apps for Android, with most positioned as parental control tools.
In reality, however, these apps barely differ from spyware, with the exception perhaps of the installation method.
Every year, Kaspersky Labrsquo;s experts look at the main cyberthreats facing connected businesses over the coming 12 months, based on the trends seen during the year.

For 2018, we decided to extract some top predictions that also have big implications for everyday connected life.
RCE? Check.

Clear passwords? Check.
Interfere with print jobs? Check Sysadmins have been advised to watch for a coming HP printer firmware update that will plug a remote code execution vulnerability (among others) in its MFP-586 and the M553 printers.…
"JoltandBleed" memory leak gives attackers full access to business applications.
Boffins find smartmobe accelerometers can turn your gait into a biometric A trio of Indian boffins have studied the use of smartphone accelerometers as biometric sensors and concluded they could be a handy way to identify users.…
A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote attacker to gain unauthorized, elevated access to an affected device. The v...