Length does matter (ha), but how you create and manage a password often matters just as much, if not more. A long password that's predictable or reused across accounts can still be cracked, leaked or ...
Few Internet frustrations are so familiar as the password restriction. After creating a few (dozen) logins for all our Web presences, the use of symbols, mixed cases, and numbers seems less like a ...
NIST’s latest password guidelines focus less on length and complexity of secrets and more on other measures such as 2FA, throttling, and blacklists. A comment period has closed on NIST’s new password ...
A few weeks ago, I mentioned a contest that InfoWorld columnist Roger Grimes was having to prove that long passwords are just as good or better than complex passwords. Today, in a vacation edition of ...
Modern IT system administrators know the importance of maintaining a strong password policy. In this article, we'll explore the evolution of password policies, from basic to advanced, and discuss the ...
UPDATE FROM AUTHOR: As noted by several commenters this post focuses on brute force; I will discuss the rainbow table issue at length in next month's column. About a month ago, I was walking through ...
For more than a decade now, security experts have had discussions about what's the best way of choosing passwords for online accounts. There's one camp that argues for password complexity by adding ...
We all use passwords. We use them for our phones, our computers, our e-mail, and just about every other kind of personal account. Unfortunately, many of us use simple passwords, such as “Password1” or ...
Linux gives you lots of ways to create complexity in passwords that include a lot more than just length, such as mixing upper- and lower-case letters with numerals and punctuation marks along with ...
Indeed, Social media security has become a big issue for internet users. Hackers are now more active on social networking websites, as LinkedIn reported 6.46 million passwords hacked during last month ...