Password Security
Getting hands on personal information leading to breach of identity and security issues is the hottest methodology of criminals. Thanks to the Internet, as I had earlier mentioned there is tons of information just available to just about anybody about just about anybody (that is right) and so ease of availability leads hackers and others to get their hand on it. This can be done by being anywhere in the world and access other people’s information again anywhere in the world. It surely is a world without borders since the web servers can be hosted anywhere in the world. This is exactly what happened at Monster.com were details of 1.3 million job seekers were stolen.
Hackers broke into the U.S. on-line recruitment site’s password-protected resume library using credentials that Monster Worldwide said were stolen from its clients, in one of the biggest Internet security breaches in recent memory. Talking about password protection, a 23 year old convicted computer hacker states that it hacking into corporate computers is the easiest thing to do- “so easy that a caveman could do it.” Read this. The main reason stated by him is that the computers were insecure with default passwords and once he had the default password then “we’d have all sorts of information, basically the whole database, right at our fingertips.”
Keith Rhodes, chief technologist at the U.S. Government Accountability Office, said “Default passwords are a silly problem,” said Rhodes, who is widely considered to be the federal government’s top hacker. “But they were able to take a silly flaw and turn it into a business. … It disappoints me, but I’m not surprised.”
Password security is real important even with our personal computers and one has to take the time to set up a unique password that is not generic and change it often especially if on-line accounts are used and financial transactions are being conducted.
-
Archives
- May 2009 (1)
- March 2009 (2)
- February 2009 (5)
- December 2008 (3)
- October 2008 (1)
- August 2008 (7)
- July 2008 (4)
- June 2008 (6)
- May 2008 (8)
- April 2008 (8)
- March 2008 (1)
- February 2008 (11)
-
Categories
- ABA Bar Journal
- Airport security
- America COMPETES Act
- Antipiracy technology
- Antitrust
- Apple
- AT&T
- Billionaires in India
- Blogs
- blogTV
- Botnets
- Business
- Canadian Copyright
- Children
- China
- clandestine movie taping
- Cloned food
- Communication Decency Act
- compulsory vaccinations
- Computer hacking
- Contract
- Cops inside the Internet
- Copyright
- Copyright and innovation
- Copyright Infringement
- Courage and Love
- Cyber safety
- cybercrime
- cyberethics
- cyberlaw
- Cybersafety
- cybersecurity
- Cybersquatting
- Cyberwar
- Defamation
- Digital technology
- DMCA
- domain info
- Domain name registration
- DoubleClick
- email in Hindi
- Emerging India
- EU
- Executive Privilege
- Faith
- FDA
- FISA
- Forbe's list
- Fraud
- Free Speech
- freedom
- FTC
- Global privacy
- Google and trademarks
- Google's Gphone
- Googleplex
- GPay
- Gphone
- HIPAA
- Identity theft
- Immigration
- India
- India Innovative Act
- Indian Business Women
- Indian IT sector
- Industries
- Intellectual property enforcement
- Internet
- Inventions
- IP infringement
- iPhone
- iPod Touch
- Labeling
- Lanham Act.
- liberty
- Licensing
- Live streaming video
- Marketing
- Medical records
- Microsoft
- Monks
- Monopoly
- Music Sharing
- Networking Sites
- New age
- On-line world
- online fraud
- p2p
- parents liability
- passwords
- patent law
- Patent Reform
- PBS Wired Science
- Perjury
- Personal information
- Phishing
- photographing a witness
- Piracy
- privacy
- Razr2
- Research
- RFID chips
- RIAA
- Security
- site linking
- Social networking
- spam
- Spam. Identity theft
- Splogs and Blawgs
- Statutory Rape
- Steve Jobs
- Surveillance
- surveillance technology
- Targeted advertising
- Technology
- Technology and law
- Technology industry
- Trademark
- Treo
- Uncategorized
- Unethical conduct
- Victim identification
- Virtual Friends
- VMWare
- Wiretapping
- Witness intimidation
- Yahoo
- YouTube
-
RSS
Entries RSS
Comments RSS