26 Sep 2014 // Jonathan Lee
Password hacking, breaking into a company, viewing top-secret material – seems like the things only seen in the movies. Turns out you don’t need “1337hax” skills to do so when the top 10 corporate environment passwords are things like “password1” and “hello123.” The results of a recent study by the NetworkWorld via a series of Trustwave penetration tests of corporate environments environment in 2013 and 2014 resulted in an astonishing result of insecure and reused passwords for company accounts.
25 Sep 2014 // Jonathan Lee
Russian hackers used mismanaged Stubhub accounts to fuel their recent international money laundering operation. The hackers breached Stubhub accounts to purchase and resell high-demand tickets. Unlike Target’s security catastrophe, where the company was directly breached, Stubhub’s hack was likely a result of mismanaged passwords. Everyone should have a different password for each online account, consistently check your accounts for suspicious activity, and rotate your passwords using a strong password generator.
25 Sep 2014 // Jonathan Lee
A combination of recent phishing scams and weak passwords resulted in a massive e-mail hack. Usernames and passwords from Gmail and two Russian-language services, Yandex and Mail.ru, were made public. Sources say that if your e-mail has been compromised, it is likely that the leaked passwords are too old to grant hackers access. However, it is still recommended to be on the safe side and check out websites such as ‘Is my e-mail leaked’ to see the security status of your e-mail. And, of course, change your password to something more complicated and more secure to prevent future hacks. To help you get started, here is our recommended password generator, provided by CommonKey.
25 Sep 2014 // commonkey
The CommonKey team just received word we were accepted to compete in Techweek NY, the nation’s leading technology conference and festival.
31 Aug 2014 // Andrew Stroup
A flaw found by Oxcite in some router chipsets now let hackers bypass the push-button security of WiFi Protected Setup (WPS) nearly instantly. What used to be a difficult task of trying to grab inbound or outbound data packets to crack the password, hackers now can take a single shot based on a series of offline calculations that take only about a second to complete.