Remove 2018 Remove Account Security Remove Accountability Remove Passwords
article thumbnail

Pwned Passwords, Version 5

Troy Hunt

Almost 2 years ago to the day, I wrote about Passwords Evolved: Authentication Guidance for the Modern Era. Shortly after that blog post I launched Pwned Passwords with 306M passwords from previous breach corpuses. 3,768,890 passwords. 3,768,890 passwords.

Passwords 234
article thumbnail

SEC Sanctions Several Companies over Email Account Hacking

Hacker Combat

Hackers took advantage of the mishap to gain unauthorized access to email accounts and lots of customer’s data was exposed. During that timeframe, unapproved third parties gained unauthorized access into over 60 email accounts hosted in the cloud belonging to Cetera Employees. Often, hackers use phishing emails to target employees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LastPass: ‘Horse Gone Barn Bolted’ is Strong Password

Krebs on Security

The password manager service LastPass is now forcing some of its users to pick longer master passwords. LastPass says the changes are needed to ensure all customers are protected by their latest security improvements. Nor was he ever forced to improve his master password. And very recently, it upped that again to 600,000.

Passwords 260
article thumbnail

T-Mobile customers were hit with SIM swapping attacks

Security Affairs

Once hijacked a SIM, the attackers can steal money, cryptocurrencies and personal information, including contacts synced with online accounts. The criminals could hijack social media accounts and bypass 2FA services based on SMS used by online services, including financial ones. .

Mobile 96
article thumbnail

Analyzing attacks conducted by North Korea-linked ARCHIPELAGO APT group

Security Affairs

The credentials provided by the recipient are sent to an attacker-controlled URL, however, after the recipient enters their password, the phishing page redirects to a benign document that contains the interview questions, or an RFI that includes information of interest for the victims.

article thumbnail

Trick or Treat: The Choice is Yours with Multifactor Authentication

Thales Cloud Protection & Licensing

Whether you want the ‘trick’ of a malevolent threat actor infiltrating your network by exploiting a compromised password or the ‘treat’ from the peace of mind associated with multifactor authentication, the choice is yours. This ability to log in to the administrative account could have been prevented with multifactor authentication in place.

article thumbnail

Beyond Passwords: 2FA, U2F and Google Advanced Protection

Troy Hunt

Last week I wrote a couple of different pieces on passwords, firstly about why we're going to be stuck with them for a long time yet and then secondly, about how we all bear some responsibility for making good password choices. This week, I wanted to focus on going beyond passwords and talk about 2FA.

Passwords 261