• Password

    Use Different Passwords for Different Sites

    by  • June 6, 2012 • Password • 0 Comments


    I woke up today to a couple of tweets from friends, “Did you get hacked?”.  Uh oh.  Not a good message to see first thing in the morning. There were couple of tweets about Russian work-from-home sites from me.  Definitely not something I remembered tweeting.  I immediately logged on to Twitter and changed my...

    Read more →

    The Big Security Blunder by Apple

    by  • May 12, 2012 • Password, Security • 0 Comments


    It was recently announced that Apple’s FileVault software had a serious error that exposed user’s passwords.  FileVault is a program that stores users passwords on their computer.  A programming mistake caused the passwords to be stored as plain text instead of encrypted.  That means that anyone one – or any malicious bot – could...

    Read more →

    Most Common Passwords

    by  • May 5, 2012 • Password • 0 Comments


    Everytime hackers release a set of usernames and passwords, it give analysts a chance to see passwords that people use in the real world.  Here is a list of the top 25 passwords from an attack on Sony in December 2010. seinfeld password winner 123456 purple sweeps contest princess maggie 9452 peanut shadow ginger...

    Read more →

    Password Do’s and Don’ts

    by  • March 24, 2012 • Password, Security • 0 Comments


    Five “Don’ts” & Five “Dos” for Better Passwords 1. Don’t leave passwords blank. 2. Don’t use your username as a password. 3. Don’t use identifiable information (such as a birthday). 4. Don’t write passwords down. 5. Don’t use auto-fill for passwords (especially on public computers). 6. Do use 8 characters or more. 7. Do...

    Read more →

    Why do I need a long password?

    by  • March 10, 2012 • Password • 0 Comments

    Security experts suggest that you create passwords with 8 or more characters.  Why does password length matter?  When a hacker attempts a bruce force attack, longer passwords make it more difficult. The success of the brute force attack depends on two things.  1) password length and 2) number of possible characters that are being...

    Read more →