Remove Blog Remove Passwords Remove Personal Security
article thumbnail

GUEST ESSAY: Until we eliminate passwords, follow these 4 sure steps to password hygiene

The Last Watchdog

Until biometrics or a quantum solution change our everyday approach to encryption, passwords remain our first line of defense against data breaches, hackers, and thieves. Proper password hygiene doesn’t require a degree in rocket science. 1) Create sufficiently-complex passwords. But simpler passwords are much easier to hack.

Passwords 244
article thumbnail

Weekly Update 125

Troy Hunt

But moving forward, it's Microsoft Ignite in Sydney next week and that should be a great event, plus I'm talking about Google's Password Checkup extension and the other credential stuffing list "collections" I keep getting asked about. Twilio is sponsoring my blog this week (they're talking about the PSD2 reg in the EU).

Passwords 171
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 42M Record kayo.moe Credential Stuffing Data

Troy Hunt

This is going to be a brief blog post but it's a necessary one because I can't load the data I'm about to publish into Have I Been Pwned (HIBP) without providing more context than what I can in a single short breach description. Can I provide the password used? Had these passwords been seen before?

Passwords 210
article thumbnail

Four Scary Cyber Creatures Haunting Your Working World

Thales Cloud Protection & Licensing

From AI-generated phishing attacks to badly behaved bots, these digital ghouls are more than just scary stories—they're real threats to your business and personal security. Next, multi-factor authentication (MFA) adds another layer of security by requiring users to verify their identity through multiple methods.

article thumbnail

Mother of all Breaches may contain NEW breach data

Malwarebytes

From SpyCloud’s blog: “a small number of individual breaches totaling a large number of records – approximately 1.6 As Troy Hunt of HaveIBeenPwned pointed out on his blog, there is a data breach “personal stash” ecosystem. That leaves a lot of new records. But it does nothing to enforce that restriction.

article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I’ve written this countless times: keep your antivirus updated, click judiciously, practice good password hygiene. Collectively, they’ve nurtured an entire new field of affiliate marketing partners: an army of bloggers and YouTubers who allude to VPNs as part of their blogs and videos. Related: Privacy war: Apple vs. Facebook.

B2C 214
article thumbnail

National Cybersecurity Awareness Month – What it Really Means for WordPress Users

SiteLock

It’s also the last day of October that the transition to Critical Infrastructure Security and Resilience Month in November begins. For more specific details on each of these topics, we recommend reading the StaySafeOnline.org blog. Never write down your username and passwords. What Does This Have To Do With WordPress?