Password warning – 50% of open Internet users to reuse attack

Password theft is widespread thanks to the use of infostealer attacks leading to Ransomware use, account theft and a flowering trade of compromised credentials. Despite years of proverbial advice when it comes to building secure passwords, new research suggests that a stunning 50% internet users are doing something that proves even the strongest account password in something as easy to explode as a rice pudding. Here’s what you need to know and do.

stale1Spassword-beware of Master Stack Reset Reset

The problem with your password is mainly management, not construction, connected

There is no lack of tips when it comes to protecting your account password. Everything from sublime, such as the provision you are using two -factor certificate as a secondary layer of input security, to the ridiculous suggestion that passwords can be replaced with 3,600 smile faces to make them somewhat stronger. While building a password remains a matter, and I will reach that moment, the harsh truth of the issue is that the password management, the way you use your credentials, is a bigger problem here in the real world, if you ask me.

Or, on this issue, if you ask others. A new analysis of about 1,000 Internet adult users in the US has confirmed that all online security practitioners already knew: for the average user, their password management absorbs. But let’s start with construction, because it blows. The analysis revealed that 84% of those asked have “unsafe password practices”, including mainly personal information on their password wires to make them easier to remember, while also as strong as Tom Stoltman or Hafþór Júlíus Björnson.

The type of personal information that is most commonly used, according to the latest analysis, includes a favorite number at the top of the list, closely followed by the name of a pet, the birthday date or the name of a girlfriend. I mean. What can go wrong in this era of social media transparency? What about adding an old password to the list? Yes, the one who is statistically most likely has found its way on those lists of compromised passwords traded among hackers and online criminals. But that, dear reader, is not half of it. That 50% of password users apply the same password to more than one account is half of it, and then some.

staleMicrosoft’s new attack 365 bypasses e -mail security checks

Password reuse is dangerous and new – change your input habits now

“Sharing information about entry with friends and family members has become increasingly common in an era where things such as broadcasting services, social media collaborative accounts and more are well known,” said all About Cookies Analysts. The number of people who share their passwords this way, 59%, is worrying, but there are ways to mitigate the risk, including using password management applications. What is most worrying for me, and it should be for you too, is that 50% of those respondents reuse passwords in at least two accounts.

There are some good news to get out of these statistics, not only the same analysis from a year ago revealed that 65% of people are reusing their passwords like this. It remains, however, cold comfort when remembering that using the same password to unlock sites and various services, especially when they include e -mail likes, social media and even bank accounts, is very dangerous. You only need a service where you hire that password to be compromised, no matter how small or insignificant it may seem that the service may be, and all passwords protected by the password must then be considered at high risk to be violated. Never, never, reuse a single password. If you do it, then set aside some time now, today, and change them to something unique. Better still, if available, use a transition to your accounts.

A password manager, and you can get your choice, will make this really easy to make and manage your passwords in the future. So what are you waiting for?

staleCurrency attack $ Trump leads to the password robbery in 2 flat minutes

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top