A recent study of five million leaked passwords from enterprises in 2016 revealed the most popular ones among users. Tops on the list ...
- Jeremy Cruz
- No Comment
Cloudbleed – More Bad News For Using Passwords Alone
A new internet security vulnerability was announced last week, and it is "a scary big deal". Cloudbleed, the name given to this ...
- Jeremy Cruz
- No Comment
Phishing Scheme Allows Access to Los Angeles County Confidential Records
Last month, charges were filed against a hacker who used a phishing scheme in May 2016 to potentially access over 750,000 confidential ...
- Jeremy Cruz
- No Comment
Password Guessing Is Becoming Easier And Easier
With all of the leaked passwords that have been made available recently (passwords from services such as Yahoo and LinkedIn), cyber-criminals have ...
- Jeremy Cruz
- No Comment
Hillary and the Democrats Hacked
As mentioned in a previous blog post, foreign spies had been targeting the Donald Trump and Hillary Clinton presidential campaigns. And in ...
- Jeremy Cruz
- No Comment
Password Files on OneDrive Increasing
Corporate users of Microsoft's OneDrive cloud storage are increasingly storing files there that contain passwords. According to a report released last month, ...
- Jeremy Cruz
- No Comment
Foreign spies trying to hack Trump, Clinton, and Sanders campaigns
Last week, James Clapper, the U.S. director of national intelligence, said there have been "some indications" that foreign hackers have been targeting ...
- Jeremy Cruz
- No Comment
Fake phishing scheme shows the value of corporate data to hackers
A recent faux phishing scheme designed to track the activity of hackers accessing the "leaked" data confirms what we already know -- ...
- Jeremy Cruz
- No Comment
Financial services are another prime target for hackers
Last month, I posted about the healthcare industry being a target for cybercriminals. Another target, likely even more lucrative, is the financial ...
- Jeremy Cruz
- No Comment
Worried about stolen credentials? You’re not alone.
For decades, logging into a network, application, server, etc. usually only requires a username and password. Sometimes certain policies are put in ...