Preview

Passwords: Married and Maiden Names and Password Reset Links

Good Essays
Open Document
Open Document
666 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Passwords: Married and Maiden Names and Password Reset Links
Instructor: Irena Skot

BUS-231-E2: Principles of Management

Fall 2008

Report # 1

Topic: E-Business “Forget your password”

September 18th 2008

Article:

Today In Tech >on Yahoo!

"Forgot your password" links the easy way in for hackers

Wed Sep 3, 2008 11:31AM EDT

[pic]

Never mind creating a password with at least eight characters, two of which are numbers, one of which is a capital letter, and one of which is a symbol like (*&^%$). The easiest way for a hacker to weasel into your account is likely the "Forgot your password?" link.

"Forgot your password?" features are older than the Internet, providing businesses and site owners a simple way to let a user reset a forgotten password, provided he can verify his credentials by asking a few personal questions that only the rightful user should know.

For years the archetypical question was, of course, the "Mother's maiden name" challenge. In recent years, additional challenges have emerged, such as asking the street you grew up on, your favorite pet, and grandparents' first names.

Is all of this stuff really secure? More than one researcher is sounding the alarm over these tools, noting that while this data may have been private a decade ago, in an era of personal blogs, online resumes, and rampant social networking services, "personal" information drawn from your past is now widely available for public consumption. According to a researcher at PARC, you can even buy black market directories of personal information "like dog's names," for about $15 per batch. It's certainly a lot easier than guessing passwords like AHFplug41*.

Think this doesn't happen? There aren't any statistics available, but these hacks are widely suspected in myriad cases where accounts have been compromised. (Even Paris Hilton is said to have fallen prey to the "what is your dog's name?" password reset hack. It doesn't help to have one of the most infamous dogs in America...) But if you need more proof,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT321 Labs 1.1 - 1.7

    • 2018 Words
    • 38 Pages

    ! ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 enable password class ! ! !…

    • 2018 Words
    • 38 Pages
    Satisfactory Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The PASSWORD EXPIRE option can be used to force a user to change his or her password at the time of the next login.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assesment 1

    • 477 Words
    • 3 Pages

    situation you lost that you can't have access to all the password have this policy enable.…

    • 477 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Don’t use common words, phrases, keyboard or sequential patterns as passwords. It is risky. Online criminals and hackers could potentially gain access to your accounts with such…

    • 599 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The article also identified the threat as a Pony Botnet Controller that captured and compromised over two million accounts. The possibilities of these types of threats are very real as experienced by many websites during this incident. One of the best ways to try and combat these type threats is to keep your patches and antivirus up to date, which was also mentioned in this article. According to a CNN Money article on this incident, the below website accounts were compromised during this event (Pagliery J, 2013).…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tripadvisor Swot Analysis

    • 268 Words
    • 2 Pages

    No passwords or other information was stolen. This happened shortly before many other companies reported similar thefts of the addresses on their email…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Pwdhash

    • 9759 Words
    • 40 Pages

    hackers to break into a low security site that simply stores username/passwords in the clear and use the retrieved passwords at a high security site, such as a bank. This attack, which requires little work, can lead to the theft of thousands of banking passwords. While password authentication could be abandoned in favor of hardware tokens or client certificates, both options are difficult to adopt because of the cost and inconvenience of hardware tokens and the overhead of managing client certificates. In this paper, we describe the design, user interface, and implementation of a browser extension, PwdHash, that strengthens web password authentication. We believe that by providing customized passwords, preferably over SSL, we can reduce the threat of password attacks with no server changes and little or no change to the user experience. Since…

    • 9759 Words
    • 40 Pages
    Powerful Essays
  • Satisfactory Essays

    I'm 90% sure that you get sick to try to hack or to recovey your…

    • 705 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    References: 1. Armstrong, I. (2003). “Passwords exposed users are the weakest link”. Scmagazine. June 2003. Accessed as on 21 August http://www.scmagazine.com/scmagazine/2003_06/cover/index.html 2. 3. Bishop, M. (2003). Computer Security. Art and Science. Addison Wesley. David C. Feldmeier and Philip R. Karn Accessed as on 10 September 2010 http://www.springerlink.com/content/ljy0753m9gwwkd6d/ 4. 5. Fisher, D. (2003). “Worms Prove Passwords Do Matter”. eWeek. March 11, 2003. Hitachi ID Systems Inc. (2009). Password Management Best Practices. Accessed as on 10 September 2010 http://www.psynch.com/docs/password-management-best-practices.pdf 6. Information Systems Audit and Control Association (ISACA) (2009). Certified Information Accessed as on 10 September 2010 7. 8. 9. Systems Auditor (CISA) Review Manual 2009. ISACA: Rolling Meadows, IL. Rosencrance, L. (2003). “Survey: Insecure passwords can be costly for companies,” Computer World. McDowell, M, Rafail, J, and Hernan J. (2004).Choosing and Protecting Passwords. Carnegie Mellon University. Accessed as on 10 September 2010 http://cns.esf.edu/Sec_Rec/PW_rec1.htm 10. Wagner, R. (2003). “Windows Password Weaknesses Could Threaten Your Enterprise,” Gartner First Take. Accessed as on 10 September 2010 http://www.gartner.com/resources/116500/116510/116510.pdf…

    • 2513 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    "We don 't know how many of these details still work. But we know that 30-40% of people use the same passwords on different websites. That 's certainly something that people shouldn 't do," said Graham Cluley, a security researcher in an interview to BBC.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    wificrack

    • 2263 Words
    • 9 Pages

    Follow the steps below… download wep password cracker software AIRCRACK. then, step 1: extract it on desktop, step 2: open up BIN folder, step 3: Now,open AIRCRACK-NG GUI step 4: step 5: step 6: step 7: That all... Any problem then coment me... Email extractor spider gold :: 2005-08-12 :: 30 EMail Extractor v3.2.1 :: 2007-09-26 :: 42 Email for NET 2.0 :: 2005-08-12 :: 36 Email Generator by Emailsmartz :: 2010-06-04 :: 22 Email hacker v3.4.6 :: 2014-03-14 :: 22 Email Manager by Emailsmartz :: 2010-06-04 :: 25 Email Marketer Business Edition v1.42 Multilingual :: 2006-09-01 :: 15 Email Marketing Director v4.1.117 :: 2007-11-24 :: 34…

    • 2263 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    Social networking is a great way to meet people and entertain yourself but if put into the wrong hands it can cost you your current job or future employment. The problem is that there are many ways to access your personal information that you are voluntarily posting on a regular basis. We give ourselves aliases and nicknames to prevent unwanted people from locating us online and sometimes…

    • 1830 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    We are able to hack into all web-based Emails including Yahoo, Hotmail, AOL, Excite, Gmail, AIM, TISCALI, LIBERO, COMCAST, MYSPACE etc. Email Password Hacking or cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. The use of passwords goes back to ancient times. Sentries guarding a location would challenge for a password or watchword.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays