The importance of strong passwords ("Anonymous" hack of Stratfor)

Blackjack200

Lifer
May 28, 2007
15,995
1,685
126
According to the analysis, 50,277 unique credit card numbers were in the files posted by Anonymous, where 9,651 have not expired yet. The analysis also noted 86,594 email addresses, where 47,680 are unique; 27,537 phone numbers, where 25,680 are unique; 44,188 encrypted passwords, where 50 percent could have easily been cracked, and 13,973 U.S. addresses.

Password strength was noted as an important issue, where 73.7 percent of decrypted passwords were weak, 21.7 percent were of medium strength, and only 4.6 percent were strong. About 10 percent of decrypted passwords were less than five characters long, while only 4.8 percent were 10 or more characters long.

Edit: http://www.dailytech.com/Anonymous+...er+50000+Credit+Card+Numbers/article23613.htm

My friend who works in security told me to start using passphrases, so when I set up my mother's gmail account (she got an ipad for christmas) I set it with a 31 character passphrase. I'm also going to set-up dual authentication.

Won't protect her from MIM attacks or keyloggers, but I'm hoping she wouldn't face those kinds of attacks.
 

Paperlantern

Platinum Member
Apr 26, 2003
2,239
6
81
You have already gone above and beyond what a lot of BUSINESSES do to protect thier e mail... or really any system.
 

dawks

Diamond Member
Oct 9, 1999
5,071
2
81
Edit: http://www.dailytech.com/Anonymous+...er+50000+Credit+Card+Numbers/article23613.htm

My friend who works in security told me to start using passphrases, so when I set up my mother's gmail account (she got an ipad for christmas) I set it with a 31 character passphrase. I'm also going to set-up dual authentication.

Won't protect her from MIM attacks or keyloggers, but I'm hoping she wouldn't face those kinds of attacks.

Check out Password Haystacks. Length is more important than entropy. D0g..................... is actually a really good password.

I've been using Gmails multi-factor authentication for a year now. works great. Technically it does negate the value of keyloggers to a certain extent, such that it uses a one time, time sensitive token (~30sec). An attacker would need to capture your password, and security code, and submit it before it got to the server after you typed it.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |