Remove DNS Remove InfoSec Remove Passwords Remove Risk
article thumbnail

Generated Passwords, UX and Security Absolutism

Troy Hunt

So why doesn't every site take away the ability for people to choose their own passwords? Why not just generate the password for them thus completely eradicating password reuse? It doesn't matter who generated the password. passwords ?? But how relevant is this criticism when the passwords are system-generated?

Passwords 161
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Normally account take overs are due to insecure passwords or recovery options, this is definitely something different. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation. Haddix continues to provide his insights while serving as the Head of Security and Risk Management for Ubisoft.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

The panel will tackle topics and questions, including: The potential risks quantum computing poses to current cryptographic methods. When will these risks come to fruition, and who are the main threat actors? Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr.

article thumbnail

SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats

eSecurity Planet

Williams urged viewers to focus on the basics, like phishing , passwords and patching /updating, as those are still the entry point of many attacks. Inventory B2B VPNs and block all high-risk protocols (see slide below). Inventory B2B VPNs and block all high-risk protocols (see slide below). Plan for rapid containment.

B2B 122
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Just as in my post on NatWest last month , that entry point must be as secure as possible or else everything else behind there gets put at risk. By recognising this, they also must accept that the interception may occur on that first request - the insecure one - and that subsequently leaves a very real risk in their implementation.

Hacking 279
article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Anyway I was testing this suite when I happened to randomly strike two keys -- I think it was control and B -- and up popped the password manager, displaying all my test passwords in the clear. Thing was, the manager required its own password, which I had not entered; remember, I had hit only two keys. This was a software flaw.

article thumbnail

The Hacker Mind: Shellshock

ForAllSecure

Anyway I was testing this suite when I happened to randomly strike two keys -- I think it was control and B -- and up popped the password manager, displaying all my test passwords in the clear. Thing was, the manager required its own password, which I had not entered; remember, I had hit only two keys. This was a software flaw.