Passwords | News, how-tos, features, reviews, and videos

6 password

Unraveling the truth about the NIST's new password guidelines

tl;dr: if you’re using a password manager, you should be in really good shape.

About half of those responding to an online survey say their passwords are over five years old.

Top 25 worst, most insecure passwords used in 2017

SplashData released a list of the top 100 most popular, and therefore dangerous, passwords used in 2017.

salted hash cms hero th3

Salted Hash Ep 12: Zero trust networks and other things that caught our attention in 2017

This week's episode of Salted Hash is the last one for 2017, so we're closing out the year by talking about security wins, and the incidents that held the attention of our panel. Steve is joined by Akamai's Dave Lewis, Andy Ellis and...

roadblock road blocked barrier

5 ways users circumvent security measures and how to prevent it

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

Apple Mac OS High Sierra [ home screen ]

Apple's High Sierra allows root with no password, there's a workaround to help

Earlier this afternoon on Twitter, a developer posted a screenshot and reported it was possible to obtain root access on Apple's High Sierra without a password. Several users recreated this issue on their own systems, including a...

hacker login password cliche

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

help support advice guidance signpost

Are you giving useful advice?

If you can’t measure it, it’s not actionable. If it’s not actionable, it’s not useful. And if it’s not useful, is it actually advice?

About half of those responding to an online survey say their passwords are over five years old.

Free GoCrack password cracking tool helps admins test password security

FireEye released a managed password cracking tool, GoCrack, to help security professionals test password effectiveness and securely store passwords.

cybersecurity awareness month

6 reasons why awareness programs fail even when following best practices

Taking into account the traditional critical success factors of security awareness may not be enough to create a security aware environment.

death darkness dark hood hooded

3 scary tech spooks and how to protect yourself

In this technology-dependent world, it’s no surprise we often come into contact with many threats and scams, but you don’t have to fall victim to them. Check out the top 3 tech spooks I’ve had to deal with, and my recommendations for...

6 password

Equifax proves the CISOs right

Are we witnessing a tipping point for an archaic cybersecurity framework based on SSNs?

cybersecurity ts

5 worst cybersecurity habits with catastrophic consequences

These cybersecurity habits can have devastating effects. Make sure you — and your employees — aren't following them.

security password lock biometric fingerprint

Want stronger passwords? Understand these 4 common password security myths

Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.

door locks

Authenticating your customers: the tripartite of consumer authentication

Things to consider when choosing which authentication options to offer in identity systems for wide demographics. How the mix of security, usability, and customer attitude affects that choice.

cyber security

A note to mom about cybersecurity

I wanted to put this advice in simple terms that people who didn’t obsess about security and privacy could understand. And so I came up with this “Cybersecurity Pledge” that I’m going to send to my friends and family. I’ll start with...

06 authentication

How to protect your email account from Equifax hackers in 5 minutes

Use two-step verification to protect your email accounts from the Equifax hackers.

tom pendergast in the alps

Take a vacation—just not from cybersecurity best practices!

If you’re a person with privileged access in a company—executives, yes, but IT and finance and more—a criminal who has been watching your company and watching you personally could easily gather enough clues about you and your company...

eliminate insider threats 1

IT's 9 biggest security threats

As this list of the biggest security threats shows, hacking has evolved from a one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launderers.

python snake programming language

Insider wreaks havoc on company—after he resigns

Over the course of several weeks, a former Navarro Security employee used off-the-shelf tools to destroy files, compromise email and redirect the company's web traffic to a competitor.

Which enterprise password managers work the best?

This IT Central Station report is based on real users’ feedback on enterprise password managers

Load More