Ramblings of an old Doc

 

 

According to a report, most users still haven't answered the call by
security experts to implement more robust passwords. In fact, in a
list of the most easy to hack passwords, simply typing '123456' took a
truly forgettable top prize.

Security firm Imperva recently released its list of the passwords most
likely to be hacked based on 32 million instances of successful
hacking. Imperva named their report "Consumer Password Worst
Practices," and some of the entries near the top are truly simple. Here’s a LINK to the report.

 

Worst Password Practices

The top three passwords all included the simple streaming of numbers:
first '123456' followed by '12345' and then '123456789'. Similar
entries reappeared at eight and nine on a top ten list. However, the
fourth most-hacked password was actually just the word 'Password'
followed by 'iloveyou' and 'princess' at spots five and six. (Source:
computerworld.com)

What the report shows is that people still aren't using effective
strategies to protect their sensitive information online. Using these
kinds of passwords to protect your email account or, worse yet,
banking information, could lead to theft or identity fraud.

Top 10 Worst Passwords

The following is a list of the most predictable passwords, and should
not be used under any circumstances (Source: pcworld.com):

1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123

How to Strengthen Your Passwords

Other key findings in the report: it seems that almost 1 in 3 users
choose passwords comprised of six or fewer characters; more than half
use passwords based on only alpha-numeric characters; and almost 50
per cent used variations on their name, popular slang terms, or simple
strings of consecutive characters from the average QWERTY keyboard --
such as 'asdfg'.

Imperva has made several obvious recommendations, suggesting most
users adopt passwords with at least eight characters and to mix those
characters between upper and lower case letters, numbers, and symbols:

Recommendations

Users:

1. Choose a strong password for sites you care for the privacy of the information you
store. Bruce Schneir’s advice is useful: “take a sentence and turn it into a password.
Something like “This little piggy went to market” might become "tlpWENT2m".
That nine-character password won't be in anyone's dictionary.”


2. Use a different password for all sites – even for the ones where privacy isn’t an
issue. To help remember the passwords, again, following Bruce Schneier’s advice is
recommended: “If you can't remember your passwords, write them down and put
the paper in your wallet. But just write the sentence – or better yet – a hint that
will help you remember your sentence.”

3. Never trust a 3rd party with your important passwords (webmail, banking,
medical etc.). If you can’t remember them all, write them down and keep them in your wallet.

Administrators:


1. Enforce strong password policy – if you give the users a choice, it is very likely that
they would choose weak passwords.

2. Make sure passwords are not transmitted in clear text. Always use HTTPS on login.
3. Make sure passwords are not kept in clear text. Always digest password before
storing to DB.


4. Employ aggressive anti-brute force mechanisms to detect and mitigate brute
force attacks on login credentials. Make these attacks too slowly for any practical
purposes even for shorter passwords. You should actively put obstacles in the way
of a brute-force attacker – such as CAPTCHAs, computational challenges, etc.


5. Employ a password change policy. Trigger the policy either by time or when
suspicion for a compromise arises.


6. Allow and encourage passphrases instead of passwords. Although sentences may
be longer, they may be easier to remember. With added characters, they become
more difficult to break.

Passwords should be simple enough that they won't be too easily
forgotten, but the idea is to make cracking the code virtually
impossible for either an unknown or known hacker.


Comments (Page 2)
4 Pages1 2 3 4 
on Jan 08, 2011

I've looked at LastPass and it appears quite solid, DrAtomic1.

 

on Jan 08, 2011

Zubaz
Zubaz starts changing all his passwords

Not really.  Of on-line stuff I use LastPass.  I have a very strong pass-phased based logon for that and then I let it generate passwords for me.  I don't know any of my web passwords.

My previeous password policy was jsut to type weak passwords with my unique spelling/typing.  Never got hacked.  

That's actually a pretty good policy, imo.  I use last pass as well, but I don't have it randomly generate passwords for me.  What you suggest sounds good. 

on Jan 09, 2011

DrAtomic1


myfist0reply 8I use 1 very strong password for every forum and game login (not bank). Remembering 50 passwords is for the birds. I might just try that LastPass. 
Which is a dangerous practise, want to bet at least half of those sites store your password unencrypted in their database?

Correct.

on Jan 09, 2011

Checked out lastpass. It went pretty good until they started asking for personal info like SS#, credit card info, bank account numbers and such. I gave them nothing. Which is what I have. I did not give them anything other than my email.

on Jan 09, 2011

Checked out lastpass. It went pretty good until they started asking for personal info like SS#, credit card info, bank account numbers and such. I gave them nothing. Which is what I have. I did not give them anything other than my email.

You must have chosen to use it to fill out forms as well. I didn't opt beyond name, address, zip... the rest I'll fill out, but it wasn't trying to steal your personal info, Uvah.

on Jan 09, 2011

Mine is a combination of Po's real name, his mom's maiden name, his blood type and his first pets name...

on Jan 09, 2011

nothing at all wrong with that.

on Jan 09, 2011

Something I do is to take an easy-to-remember password, and then move my fingers one step to the right when it's entered. It just looks like a bunch of random letters, and that's what it will be to a dictionary attack, but I don't go forgetting it. It can include capitals and numbers and symbols same as otherwise.

on Jan 09, 2011

Something I do is to take an easy-to-remember password, and then move my fingers one step to the right when it's entered. It just looks like a bunch of random letters, and that's what it will be to a dictionary attack, but I don't go forgetting it. It can include capitals and numbers and symbols same as otherwise.
Smart. I think I'll start implementing that once I exhaust my existing nerd-culture database.

on Jan 09, 2011

OH GOD I'll have to change my password now. </3

on Jan 09, 2011

I have three separate pwds at work that expire monthly. I used to just add sequential numbers, get to the end (guess you'd call that weak) and start all over but now no reusable pswds so it's become a pain in the a**.

on Jan 09, 2011

I use a password manager, my passwords are randomly generated, the master password is entered using a virtual keyboard. A backup is stored as a encrypted file on my USB drive.

on Jan 09, 2011

Skinhit
Mine is a combination of Po's real name, his mom's maiden name, his blood type and his first pets name...

His is "ihateskinhit".

Strange combination of letters...can't figure that boy out.

on Jan 09, 2011

password manager

Good idea...just put one on my phone. It has a pswd generator too so maybe that'll help...until I forget my phone...and pswds...

on Jan 09, 2011

I'm acquainted with a gentleman who makes his living consulting nationally & internationally on computer security issues.  He advocates having 2 strong passwords, one for financial transactions and one for everything else, and that is his personal practice.  He also believes forcing employees to change passwords every 90 days, a common practice, is counterproductive and less secure than leaving them alone.  One man's opinion.  YMMV.

4 Pages1 2 3 4