Skip to main content

Home/ Fabroa ICS2O/ Group items tagged password

Rss Feed Group items tagged

Adrian Ma

'Jesus' and 'Ninja' Infiltrate List of Worst Passwords | TechnoBuffalo - 0 views

  •  
    According to SplashData, a new list of "Worst Passwords of 2012" has been published and some of the new worst passwords include "jesus", "ninja", "welcome", and more. SplashData gets their information based on files containing millions of stolen passwords posted online by hackers. These are perhaps the worst passwords that can ever be used when protecting your account. The best passwords contain at least eight characters and uses a combination of numbers, letters, and even symbols. "password" remains the most used, but worst password ever. For some of my less important accounts, I too also have use the password "password".
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
migmeister_98

Take control of password chaos with these six password managers - CNET - 0 views

  •  
    This article talks about six apps that will help you manage your passwords. in this day and age, it is not recommended to use the same password for all your accounts. It is also advisable to use long and complex passwords. Although many of the apps cost money, I think it is worth it.
Boris Smirnov

Evernote Hack Exposes User Data, Forces Extensive Password Resets | Threat Level | Wire... - 0 views

  •  
    Previously, Twitter, Apple, and Facebook have been on the list of tech companies hacked within the last couple of weeks. As of March 2nd, 2013, Evernote also joins this list when their network is breached by an attempt to access secure areas of the Evernote Service. Evernote has notified users via  e-mail, blogs, and social media to change passwords so that users personal information can remain safe on the Evernote network. The hackers had successfully accessed usernames, e-mail adresses and encrypted passwords, however, they were stopped before any damage could be done. This relates to the "Privacy & Security" category because users data and personal information is being accessed without authorization. Obviously, this can cause many problems for users especially because their work and information can be stolen or deleted. Evernote encourages creating a strong password to ensure that an account remains secure, however, this is a questionable matter because the website should also consider upgrading their system in order to keep users safe. As part of the eLifestyle, many users rely on cloud storage to store information, especially on Evernote. The recent hacking just proves how reliable cloud storage really is. When saving data, it is important to consider the possibility of it being stolen or deleted. With this in mind, one shouldn't depend on cloud storage for saving all of their work or important material as it hasn't proven to be very reliable. And if you are using cloud storage, it would be smart to backup important files on a USB or Computer.
James Harris

Why bother with passwords when you can have passthoughts? | Technically Incorrect - CNE... - 0 views

  •  
    This article is about a new concept developed by Berkeley that allows users to emit their password through their thoughts. This concept uses a technology known as Neurosky, and the actual headsets that use this technology look like cat ears. This device is still in testing, but for those eager people who want their thoughts converted into Passthoughts, they can get their hands on the device for a very pricey $199. I don't believe that this invention will "take off" because it doesn't seem very practical in real world situations when typing in a password can be as quick as 2 seconds. However this is a very imaginative invention and will most likely inspire people to create products just like this one. I chose the eLifestyle tag for this post because it may become a fashion trend in some part of the world, (Asia maybe) and people will truly enjoy using this product. I think it is safe to say though that I will not be walking into school wearing cat ears in the future!    
Adrian Galope

New Flashback Trojan Variant Doesn't Need A Password to Infect Your Mac - 1 views

  •  
    This article is about a new virus, namely OSX/Flashback.k, that can hack into your Mac without the need for the admin password. Once infected, the Trojan will attempt to download a code for the main piece of malware, also known as "payload" and attempt to install it one of two ways. The way it installs it depends on whether or not the user inputs his admin password. Once the Mac is infected, the malware then hijacks Safari every time it launches and redirects the user to it's targeted website.
Nikita Varabei

Are Your Future Passwords Hidden In the Jiggling of Your Eyeballs? - 0 views

  •  
    This article describes how scientists are working to create new top off the line security. As we've seen in many sci-fi movies ; there is such a thing as eye scanners. they have existed for sometime now, but they have been primitive and worked just by using the iris of your eye. This could be faked easily by someone just taking a picture of your eye and simply holding it to the screen. This new technology however is a lot more sophisticated. It uses your eyes "fixations" and "saccades" to determine if it is really you. Fixations is how your eye behaves when it is still and saccades is how your eye behaves when it is moving from point to point. This new technology is a breakthrough in security, as it is virtually impossible to fake. no more stolen passwords, or hacked systems. Now unless its really you, the system wont let the person in. THis is extremely important as it prevents theft, hacking, and many other problems. To conclude, this technology is extremely important to our security and will greatly contribute to our future
Nicked -

Anonymous Targets Israel by Taking Down Hundreds of Websites and Leaking Emails and Pas... - 0 views

  •  
    Many of us remember the PSN outage of April 2011. Sony blamed 'Anonymous,' a collective hacktivist group formed in 2003 on 4chan, after they found the Anonymous calling card 'We Are Legion' in their system. Anonymous is composed of individuals with the ideals of: 1. Freedom of Information 2. Freedom of Speech 3. Unregulated Internet Anonymous will only attack databases and websites only if provoked, and will not do so for monetary gain. The group has recently engaged in multiple attacks on international government databases. The article, by Casey Chan, is about the Anonymous digital attack on Israel, in retaliation after the Israeli government threatened to shut down Internet access and other telecommunications to the Palestinian people in the Gaza and "Occupied Territories. " The group attacked the Israel Foreign Affairs database and Bank of Jerusalem database, as well as DDos attacks on over 600 sites and theft of over 2000 email addresses and passwords. This attack has generated some controversy. Since the beginning of November, Israel has also received over 150 missile attacks from the Palestinians as well. Anonymous aids the Palestinians by sharing a 'Care Package,' instructions on what to do in the event Israel does sever the Internet connection. Anonymous has become quite influential on the Internet. This illustrates how important the Internet has become. The internet is not only a commodity, but a right to have. It has replaced forms of communication, entertainment, transactions, and more. A group of 'anonymous' users has been formed for the sole purpose of protecting it, with the will and capabilities to punish any party that wishes to disrupt it. As with every conflict, there are sides. Anonymous, in protection of Internet freedoms; and the Israeli government, that has been fighting a war for as long as anyone can remember. Who's side are you on?
Cindy Huang

How Secure Is the Passcode on My Phone? - 0 views

  •  
    Recently, there have been a lot of passcode exploits, especially on the iPhone and Samsun Galaxy. On the iPhone, it can allow the attacker to access their way into the Phone app, letting them place calls, see/edit contacts, and access photos via the "assign new picture" option. On the Samsung Galaxy, the attacker can flash whatever was open before the phone was locked for a second. This is enough time to launch an app, which can be repeatedly downloaded and completely unlock your phone. The article suggests the user of the phone should download the Apple's Find my iPhone app or Prey, which can track the location of your smartphone if it is ever lost or stolen. This, they say is the best protection for your personal information stored on your phone. These passcode exploits can let one worry and doubt how much protection the lock screen actually provides. The truth is they are no more secure than any other password or PIN, which means they can eventually be cracked. However, it is still suggested to always lock your screen, just in case it is robbed by someone who does not know anything about getting around locked screens. Many companies are aware of the issues and is releasing new techniques, like the iOS 6.1.3. Hopefully, with time, these password problems will not be an issue anymore.
Ira Garcia

How to Send Secret Encrypted Text Messages on Your iPhone - 0 views

  •  
    This article is about the iPhone app "Black SMS."This app will enable you to send private messages to your recipient without having to worry about someone else being able to see it.  When you download the Black SMS app, you attach a password to your message and then type whatever you'd like into the app. Once the message is complete, hit Send and the app will automatically open your SMS app. Paste the message and the recipient (and everyone else) will only see a black text bubble. secret and encrypted black text bubble, that is. The person on the receiving end then copies the black bubble and unlocks the message by pasting it into Black SMS with the password. The only downside of this app is you can't encrypt pictures with it.
Jihae Jeon

Networking News, Videos, Reviews and Gossip - Lifehacker - 1 views

  •  
    This article is very important if you have important files in your computer or of you share your wi-fi with someone else. This article tells you how to protect your computers and data when someone else is using your network. Similar things happened to my family when someone hacked into my network. We had to change our password. There are many ways to protect your computer such as creating a difficult password, turning off file sharing and network discovery, hiding your files, creating a separate network for guest network, or by locking down your network. This would be a very useful for my family to ensure that no one else will break into our network again. I think this article would be very helpful to everyone because I think everyone has something they want to hide form anyone else in their computer and this article could help them to hide those files. 
Jason Strassler

6 Tips for Better Mobile Security - eSecurity Planet - 0 views

  •  
    I learned from this article how to secure your information on your mobile device using 6 simple tips. Setting a solid password, installing antivirus or security apps, and using encryption, a hardware security system, are just a few various methods of how to help and improve the security on the everyday use of your phone. Mobile security is important especially if you have a lot of important and valuable data and information, such as passwords or your email is accessible, you want to know that this information is stored and saved safely on your mobile device for no one but yourself to be able to use. With technology evolving and more and more people are being familiar and learning about hacking and breaking into systems, it is more important and necessary than ever in our society for everyone to have their information secured. Taking your mobile device's security seriously and keeping it at high maintenance is crucial so nobody can hack or see what information is important to you but also so that you aren't giving people the opportunity to rearrange or change this data that you trust that you are the only person to see and alter your personal data at your leisure. 
Daniela Gaudio

BlackBerry phones could get rhythm-to-unlock, like dun-da-da-dun-dun -- Engadget - 0 views

  •  
    Blackberry phones are in the process of getting a rhythm to unlock your phone with. This type of technology would be useful to those who try to unlock their phones, but many people try to watch what password you put in so they can do it as well if they ever take your phone. However, with this rhythm that may come up it will be harder for those to try to pick up on what you are putting on your phone and it will be much more difficult to imitate it. Also, blackberry will be able to sense the touch so you do not have to make it obvious. I think this is more convenient because people won't guess your password as easily if it is a rhythm. 
Marco D

Microsoft Store India hacked, username and password database leaked - 1 views

  •  
    Turns out storing private information with no encryption is a bad idea. In other news, researchers today have discovered that the sky is in fact, blue.
Daniel Dmitrievich Prilipko

Apple Patent Shows Squeezable iDevices and Vanishing Keyboards | Gadget Lab | Wired.com - 0 views

  •  
    This article is rather interesting, because it talks about a patent Apple recently filed. The patent, "Sensing capacitance changes of a housing of an electronic device," - it sounds quite confusing, and the article described what it is.  Basically the patent is talking about the ability for our mobile devices to differentiate between how we hold our device, and react to it. For example, to open up our camera app, we have to unlock the phone and select it, but with this new technology we could simply hold our device with our fingers around its perimeter and have the app open up. Another example is turning on the device, instead of pressing a button we could simply squeeze the device slightly and it will turn on. We might also not need to lock our phones or have passwords if they are configured to recognize only our grip and fingertips. One last interesting feature is the ability to wave our hand over the device and reveal a keyboard that would later disappear when you wave your hand again.  It all sounds terribly interesting until you realize that it's only a patent and Apple hasn't even begun building a prototype. Right now it's an idea that I hope can exist in the near-future, so that accessing certain applications would be a lot easier and faster. Also, if the keyboards become tactile with thin, bendable metal plates that may solve a lot of the complaints about typing on most current tablets and smartphones. 
James Harris

Illegal music downloads dropped in 2012, says report | Internet & Media - CNET News - 0 views

  •  
    A recent survey has proven that the downloading of illegal music has decreased by 26 percent from 2011 to 2012. It seems that fewer people are illegally downloading music for three specific reasons. With the introduction of P2P music sites a few years ago, illegally downloaded music was becoming more and more common. Since, the music industry has responded very negatively trying to shut down these sites.A famous example was the shutting down of the huge P2P site and software, Limewire, after they were found guilty of copyright infringement. Limewire had millions of users that ripped off artists music millions of times and the record companies were not just going to stand there and watch. People are also not downloading illegal music as much because of the new music streaming services, such as Songza.  These sites stream music to many computers and devices free of charge for the listener to enjoy. The last reason that people are downloading illegal music less is because of the malware and spyware risks that downloading this music poses. You may think you are downloading your favourite techno song when really you are downloading a trojan virus that will steal all of your passwords and personal information. I think this is a sign that people are finally realizing that this is an immoral act and they are taking away money from the artists that make the songs. I personally have bought all of the songs I own and I rarely use the music streaming services. Hopefully by 2014, there will be no illegally downloaded music by anybody.
Matthew Fantauzzi

Google Helps You Control Your Digital Life Once You're Worm Food | Gadget Lab | Wired.com - 0 views

  •  
    Google has recently implemented a feature known as "Inactive Account Manager" which will allow users to control what will happen to their data after inactivity for a predetermined amount of time. The option gives users the option of deleting their data, or sending the account information such as passwords to another user or email address. Besides the use of this feature for alive users that just wish to remove their information if they don't use the services after a certain amount of time, Inactive Account Manager is one of the first mainstream Google features that will allow people to control what happens to their information after they're six feet under. With the way technology has become more and more involved in our every day lives, this new implementation is not surprising to me at all. What surprises me is that it took this long for there to be a service such as this. A quick Google search shows that on Facebook alone, there is over 30 million accounts of dead users still on the Facebook servers. It won't be long until other social websites implement such features, and it wouldn't be surprising if some even allow you to write a message or status update after their untimely doom. Imagine that, "John Smith is now dea! Like or Comment"
Joshua Soosaithasan

Facebook's Never Had A Big User Data Breach, But May Never Recover When It Does | TechC... - 0 views

  •  
    This article talks about the problems Facebook could have if it were to be breached by a hacker. Facebook is one of the biggest social networking websites to date and is the biggest holder of personal information, and yet they have been able to keep this information safe from hackers. Comparing to Twitter who had 250,000 accounts accessed by hackers, Facebook has done a remarkable job to keep our information safe, and although they have been able to do so for now, eventually they will have to face the problems of hackers. When you look at Facebook over other social networking sites like Twitter and Tumblr, there is a big difference when it comes to privacy and security. Twitter, for instance, is a more public social networking site with the odd soul that locks their account from the public. Facebook has privacy by default, which means Facebook has a lot more to lose if they were to get hacked. The physical damage that would pertain to us would include some of our photos and messages might be stolen, and the worst that could happen would pertain to credit card information, but Facebook would jump on and respond to these problems with password changes and other stuff. The real damage that would hit Facebook hard would be the psychological damage, and it would nearly destroy them. When something big happens in our society, the media jumps on this and will twist the truth in the story to give us, the viewers, the best story that will manipulate us into thinking an entire wrong. Facebook would be all over the media, whether it be on the radio, on the internet, on the news or in newsprint. The world would know about what happened, and fear would sweep across the globe.  People would start asking questions about what is safe on Facebook and if it is safe at all. Facebook already has a problem with people not being sure if everything is safe on Facebook, and this would just ruin everything for Facebook. No matter how much Facebook tries to keep its network safe, i
  •  
    TL;DR
  •  
    TL;DR
Sarah Karam

Samsung tweaking Face Unlock to require blinking, smiling still optional -- Engadget - 0 views

  •  
    When your friends get into your phone and know your password it can get quite annoying. Now Samsung has an app that allows you to open your phone with facial expressions. You can blink a certain amount of times and smile and then it will open. This amazing because there has never been something like this before. It relates to the course because you need the software and app to get this on your phone. I personally like this because it would be fun to unlock your phone with facial expressions. It makes a social impact because then it will be harder to hack your friends phone. Overall, I think this was a great idea Samsung brought up. 
1 - 20 of 28 Next ›
Showing 20 items per page