In 2012, you’d hope the majority of people now know to stay away from common and easily hackable passwords, but with new research from SplashData we unfortunately find this is not the case. Amazingly, “password” still ranks as the number one most common password hackers find effective at breaching accounts, followed by “123456,” and some other passwords I bet you can guess.
SplashData pulled this information from hackers who posted online that these were common phrases they use to hack accounts. The company also performed this research last year and found that the three worst passwords are still the same this year. This means that people aren’t aware of the security risks and potential harm that could come to them. If you use any of the following 25 passwords you should seriously consider changing them to something new. Our strong password generator is a great tool that can help assist you in this process.
One of the most basic things you need to consider when doing business online is that the World Wide Web is an open arena with no established security. Once you have learned to appreciate that the inte ... [Read more]
Macintosh is well-known for being safe, secure, and smooth-running. However, hackers and cyber spies are becoming more and more ingenuous in tapping into private networks and computers that even what ... [Read more]
Most people think that tight security measures mean spending thousands upon thousands on high-tech gizmos. Some misleading companies may even lure you into buying their services by intimidating you wi ... [Read more]
People store up important information in their PCs but not many take measures to make sure it is well-guarded from spy monitoring. Computers are almost indispensable to work now but few protect their ... [Read more]
People are wiser nowadays when it comes to taking care of their computers. In fact, most computers come with software for protecting the device.Because there are different kinds of threats that can co ... [Read more]
Managing different accounts online can be quite a daunting task. For one thing, people are now prone to log on online to do what traditionally are done personally such as paying bills, shopping, sendi ... [Read more]
It has been said that nothing in the internet is lost forever. The price of living in the digital world is that deleting files from your computer or phone is not a permanent fix. Even if you have clea ... [Read more]
A typical business enterprise transfers thousands of files every day. Because this is an essential productivity tool, misconceptions abound as much as the practices associated to it. Could your file t ... [Read more]
Hacking is not only exclusive to obtaining private files and compromising networks. Cyber criminals have now found a way to take hacking to a whole new level, which is, targeting the SEO value of a do ... [Read more]
Business owners should not depend on luck or precautions to keep their services safe. Experts agree that every business should have a strategic plan to implement and ensure cyber security. This includ ... [Read more]
If you are running a business online, you know that trust is an essential foundation of your trade. It is the element that can make or break your customer relations and ultimately, the stability of yo ... [Read more]
Cybercriminals or hackers target the personal information of their victims by sending out emails. Otherwise known as a phishing scam, this tactic aims to fraudulently obtain and use personal informati ... [Read more]
The latest update to the Mac OS and iOS included a new feature called “iCloud Keychain.” In a nutshell, Keychain allows you to securely store account information like user IDs and passwords, alon ... [Read more]
The definition of “pwned,” according to the online UrbanDictionary, is “to be dominated by an opponent or situation.” Telling someone they’ve been “pwned” or “owned” after an account ... [Read more]
It seems to be the general consensus these days that passwords as we know them are on the way out. As far back as November of last year, Wired’s Mat Honan declared that, “The age of the password i ... [Read more]
In 2012, you’d hope the majority of people now know to stay away from common and easily hackable passwords, but with new research from SplashData we unfortunately find this is not the case. Amazingl ... [Read more]
A new survey performed by the Ponemon Institute shows that both businesses and private computer users frequently deal with security issues from hackers and other malicious attackers.The research insti ... [Read more]
Are you paying enough attention to online security?If you’re like most computer users, probably not. Trend Micro, a security software producer, performed some research to see how people view online ... [Read more]
Many companies allow employees to bring smartphones, tablets and other personal devices to work with them. According to a new survey from IT risk & compliance company Coalfire, employers might be putt ... [Read more]
Dropbox users can now take advantage of a secure two-step verification process to protect their accounts from unauthorized access. The process requires a cell phone and should help to prevent identity ... [Read more]
A new poll shows that people don’t really enjoy thinking of new passwords for their favorite websites. It’s not surprising information until you consider the tasks that respondents preferred over ... [Read more]
You’re probably aware of the importance of selecting a strong password, but you might not realize that you need to exercise similar care when choosing your PIN number. A new analysis shows that many ... [Read more]