Preview

Passwords: Married and Maiden Names and Password Reset Links

Good Essays
Open Document
Open Document
666 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Passwords: Married and Maiden Names and Password Reset Links
Instructor: Irena Skot

BUS-231-E2: Principles of Management

Fall 2008

Report # 1

Topic: E-Business “Forget your password”

September 18th 2008

Article:

Today In Tech >on Yahoo!

"Forgot your password" links the easy way in for hackers

Wed Sep 3, 2008 11:31AM EDT

[pic]

Never mind creating a password with at least eight characters, two of which are numbers, one of which is a capital letter, and one of which is a symbol like (*&^%$). The easiest way for a hacker to weasel into your account is likely the "Forgot your password?" link.

"Forgot your password?" features are older than the Internet, providing businesses and site owners a simple way to let a user reset a forgotten password, provided he can verify his credentials by asking a few personal questions that only the rightful user should know.

For years the archetypical question was, of course, the "Mother's maiden name" challenge. In recent years, additional challenges have emerged, such as asking the street you grew up on, your favorite pet, and grandparents' first names.

Is all of this stuff really secure? More than one researcher is sounding the alarm over these tools, noting that while this data may have been private a decade ago, in an era of personal blogs, online resumes, and rampant social networking services, "personal" information drawn from your past is now widely available for public consumption. According to a researcher at PARC, you can even buy black market directories of personal information "like dog's names," for about $15 per batch. It's certainly a lot easier than guessing passwords like AHFplug41*.

Think this doesn't happen? There aren't any statistics available, but these hacks are widely suspected in myriad cases where accounts have been compromised. (Even Paris Hilton is said to have fallen prey to the "what is your dog's name?" password reset hack. It doesn't help to have one of the most infamous dogs in America...) But if you need more proof,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when a hacker runs a program that will go through all the words in the dictionary and add any special characters such as numbers to try and guess the passwords. This can compromise the customer’s account information, so educating a customer on how to make strong passwords should be recommended.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT321 Labs 1.1 - 1.7

    • 2018 Words
    • 38 Pages

    ! ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 enable password class ! ! !…

    • 2018 Words
    • 38 Pages
    Satisfactory Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    07: Password and Ref

    • 4381 Words
    • 33 Pages

    The password for a user can be set with the PASSWORD clause of the CREATE USER command.…

    • 4381 Words
    • 33 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (Important: Copy and paste the password into the portal password field. If you get a “locked out” message, notify an ASR asap.)…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tripadvisor Swot Analysis

    • 268 Words
    • 2 Pages

    No passwords or other information was stolen. This happened shortly before many other companies reported similar thefts of the addresses on their email…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    Are you anxious about the security of your passwords and credit card numbers? [Attention getter]…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Data has become a prominent source for information about people to be discovered over the past few years. While the collection of personal data is no immediate harm to anyone, it becomes an issue when the data is used for malicious purposes. This includes spying and tracking people based on their internet history. Furthermore, data can be used by police forces to predict crimes and their victims before they occur. Although this may seem like a flawless idea, it can have harmful side-effects, such as removing the opportunity for decisions to be made by the person.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Pwdhash

    • 9759 Words
    • 40 Pages

    hackers to break into a low security site that simply stores username/passwords in the clear and use the retrieved passwords at a high security site, such as a bank. This attack, which requires little work, can lead to the theft of thousands of banking passwords. While password authentication could be abandoned in favor of hardware tokens or client certificates, both options are difficult to adopt because of the cost and inconvenience of hardware tokens and the overhead of managing client certificates. In this paper, we describe the design, user interface, and implementation of a browser extension, PwdHash, that strengthens web password authentication. We believe that by providing customized passwords, preferably over SSL, we can reduce the threat of password attacks with no server changes and little or no change to the user experience. Since…

    • 9759 Words
    • 40 Pages
    Powerful Essays
  • Satisfactory Essays

    "We don 't know how many of these details still work. But we know that 30-40% of people use the same passwords on different websites. That 's certainly something that people shouldn 't do," said Graham Cluley, a security researcher in an interview to BBC.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I'm 90% sure that you get sick to try to hack or to recovey your…

    • 705 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    References: 1. Armstrong, I. (2003). “Passwords exposed users are the weakest link”. Scmagazine. June 2003. Accessed as on 21 August http://www.scmagazine.com/scmagazine/2003_06/cover/index.html 2. 3. Bishop, M. (2003). Computer Security. Art and Science. Addison Wesley. David C. Feldmeier and Philip R. Karn Accessed as on 10 September 2010 http://www.springerlink.com/content/ljy0753m9gwwkd6d/ 4. 5. Fisher, D. (2003). “Worms Prove Passwords Do Matter”. eWeek. March 11, 2003. Hitachi ID Systems Inc. (2009). Password Management Best Practices. Accessed as on 10 September 2010 http://www.psynch.com/docs/password-management-best-practices.pdf 6. Information Systems Audit and Control Association (ISACA) (2009). Certified Information Accessed as on 10 September 2010 7. 8. 9. Systems Auditor (CISA) Review Manual 2009. ISACA: Rolling Meadows, IL. Rosencrance, L. (2003). “Survey: Insecure passwords can be costly for companies,” Computer World. McDowell, M, Rafail, J, and Hernan J. (2004).Choosing and Protecting Passwords. Carnegie Mellon University. Accessed as on 10 September 2010 http://cns.esf.edu/Sec_Rec/PW_rec1.htm 10. Wagner, R. (2003). “Windows Password Weaknesses Could Threaten Your Enterprise,” Gartner First Take. Accessed as on 10 September 2010 http://www.gartner.com/resources/116500/116510/116510.pdf…

    • 2513 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Social networking is a great way to meet people and entertain yourself but if put into the wrong hands it can cost you your current job or future employment. The problem is that there are many ways to access your personal information that you are voluntarily posting on a regular basis. We give ourselves aliases and nicknames to prevent unwanted people from locating us online and sometimes…

    • 1830 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    wificrack

    • 2263 Words
    • 9 Pages

    Follow the steps below… download wep password cracker software AIRCRACK. then, step 1: extract it on desktop, step 2: open up BIN folder, step 3: Now,open AIRCRACK-NG GUI step 4: step 5: step 6: step 7: That all... Any problem then coment me... Email extractor spider gold :: 2005-08-12 :: 30 EMail Extractor v3.2.1 :: 2007-09-26 :: 42 Email for NET 2.0 :: 2005-08-12 :: 36 Email Generator by Emailsmartz :: 2010-06-04 :: 22 Email hacker v3.4.6 :: 2014-03-14 :: 22 Email Manager by Emailsmartz :: 2010-06-04 :: 25 Email Marketer Business Edition v1.42 Multilingual :: 2006-09-01 :: 15 Email Marketing Director v4.1.117 :: 2007-11-24 :: 34…

    • 2263 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We are able to hack into all web-based Emails including Yahoo, Hotmail, AOL, Excite, Gmail, AIM, TISCALI, LIBERO, COMCAST, MYSPACE etc. Email Password Hacking or cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. The use of passwords goes back to ancient times. Sentries guarding a location would challenge for a password or watchword.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays