Archive for the ‘password’ Category

Uber users beware; Faketoken Android malware hits ride-sharing apps

August 18th, 2017

By Waqas

The new version of Faketoken Malware Targets Uber-Like Apps to

This is a post from HackRead.com Read the original post: Uber users beware; Faketoken Android malware hits ride-sharing apps

Posted in android, Banking, Cyber Crime, Internet, malware, password, Phishing Scam, privacy, Scams and Fraud, security, Technology, trojan, Uber | Comments (0)

Facebook password stealer; hacking the attacker rather than victim 

August 11th, 2017

By Uzair Amir

How to hack a Facebook account is one the most

This is a post from HackRead.com Read the original post: Facebook password stealer; hacking the attacker rather than victim 

Posted in Cyber Crime, facebook, Hacking, Internet, malware, password, privacy, RAT, Scam, Scams and Fraud, security, social media, Social Network News, trojan | Comments (0)

Was the Devil’s Ivy Vulnerability a Dud? Don’t Count on It.

August 11th, 2017

In-brief: The Devil’s Ivy vulnerability in the open source gSOAP library is widespread and supposedly trivial to exploit. So why, one month later, haven’t we seen any attacks? Is Devil’s Ivy a dud? ‘Don’t count on it,’ security experts tell us. In July, the warnings were all about the so-called...

Read the whole entry... »

Related Stories

Posted in connected devices, Devil's Ivy, hardware, Internet of things, malware, password, Patching, Reports, Search engine, Senrio, Senrio (Xipiter), Shodan, software, Top Stories, vulnerabilities | Comments (0)

‘Ghost Telephonist’ Attack Exploits 4G LTE Flaw to Hijack Phone Numbers

July 31st, 2017

By Waqas

According to UnicornTeam, a group of Chinese researchers from country’s

This is a post from HackRead.com Read the original post: ‘Ghost Telephonist’ Attack Exploits 4G LTE Flaw to Hijack Phone Numbers

Posted in china, DefCon, Hacking, hacking news, password, privacy, security, social media, Technology News, telecom | Comments (0)

U.K. Parliament Attack Reshines Light on Persistent Vulnerability of Passwords

June 27th, 2017

In-brief: Password security remains a thorn in the side of security experts as once again proven by the cyberattack on U.K. Parliament, which focused on gaining access to members’ e-mail accounts merely by guessing their passwords. The recent cyberattack on U.K.’s Parliament shows once again that passwords— the most basic way users have...

Read the whole entry... »

Related Stories

Posted in Cyberattacks, data privacy, e-mail, Hacking, Mobile Threats, password, risk, Technology, U.K. Parliament, vulnerabilities | Comments (0)

Watch out: don’t lose your passwords when you sign up online

June 27th, 2017
Researchers have identified how an attacker could steal passwords - and answers to security questions - when you register for something online. We've got some tips for website owners and users to protect you

Posted in 2-factor Authentication, authentication, Man in the middle, password, Security threats | Comments (0)

UK airport authorities charge activist for not sharing his passwords

May 16th, 2017

By Jahanzaib Hassan

The director of CAGE human rights organization, Muhammad Rabbani who was returning from a trip abroad was stopped at the UK airport for not revealing his laptop and phone passwords to the authorities. When asked, Rabbani told that he had been stopped on the basis of Section 7 that is part of UKs anti-terrorism law. He […]

This is a post from HackRead.com Read the original post: UK airport authorities charge activist for not sharing his passwords

Posted in Airport, Cyber Crime, Internet, password, privacy, security, social media, uk | Comments (0)

What’s a Good Password? NIST says One that hasn’t been stolen

May 10th, 2017

In-brief: what’s a good password? According to new guidelines from NIST: one that hasn’t already been stolen by hackers. What’s a good password? According to new guidelines from NIST: it’s one that hasn’t already been stolen by hackers. Draft guidance from NIST on the creation of digital identities (NIST SP800-63b)...

Read the whole entry... »

Posted in data privacy, encryption, LinkedIn, NIST, NuData, password, passwords, phishing, Reports, Top Stories, trends | Comments (0)

What Else Kids Give Away When They Share Passwords

May 9th, 2017

Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t so wise — their passwords.

Password sharing has become a symbol of trust between friends and a sign of intimacy between significant others so much so that most teens aspire to password sharing as “relationship goals.”

Ask the dozen oft-surveyed teens in my world, and they happily explain that password sharing is “no big deal,” “fun,” “what besties do.” Sharing also “proves to people you trust them” and is “the best way to keep tabs on a boyfriend or girlfriend; you know, just to be sure they are behaving.”

But before you cringe at this seeming naiveté, wait. A recent survey World Password Day from McAfee [ADD LINK to STUDY & GRAPHIC], reveals that 59% of people surveyed are comfortable sharing their passwords with other people. People share passwords with spouse/partner (37%), family (23%), parents (23%) and even friends (9%) and colleagues (5%). The survey, which canvassed 3,000 people ages 18 and over, also exposes that 34% re-use the same or similar passwords on multiple accounts and that most people keep track of their passwords by writing them down and keeping them somewhere safe (37%). Another survey from Pew echoes these recent findings stating that 67% of Internet users in marriages or relationships have shared passwords with one or more of their accounts with their partner.

But is sharing your password such a good idea? Arguments exist on either side.

Obvious reasons emerge in the headlines each week to remind us why we shouldn’t share passwords. The heartbreak publically plays out in public betrayal, revenge, cruel jokes, reputation damage, financial and identity theft, and, sadly even sextortion.

There are also the larger reasons that likely aren’t even on your child’s radar such as the value of privacy and personal boundaries.

Family Talking Points

Boundaries matter. Keeping personal passwords private helps kids exercise healthy boundaries. Not all personal things need to be shared in a relationship, no matter how close two people may be. Maintaining independence in any relationship is a good thing. In his book Boundaries, Dr. Henry Cloud defines a boundary as “a personal property line that marks those things for which we are responsible. In other words, boundaries define who we are and who we are not.”

Establishing boundaries helps children (and adults) understand and take responsibility for the things over which they have control. The boundaries we draw (such as privacy) begin to define us and what we believe about our values and standards. By forfeiting boundaries around the issue of privacy, kids can develop destructive behavior patterns in relationships.

Privacy is honoring. Allowing friends and significant others to maintain password privacy, honors the personal space and possessions of another person. While kids may believe sharing passwords builds trust, a friend would not require you to give away your privacy to prove the depth of a relationship. Relationships require respect for a person’s material, emotional, and physical boundaries.

Pressure isn’t love. Peer pressure can come in many forms, even requests for a password. A simple request to “hey, I need to Google something, what’s your lock screen password?” can make one person in a relationship vulnerable to material and emotional risks. A friendship or relationship can become bullish, controlling, and one in which the “monitored” party develops a need to please.

People change. As much as kids pledge undying loyalty to one another (“he’d never do anything to hurt my reputation!”), even the strongest bonds can surprisingly break, and the strength of the emotions that follow can be startling. Encourage kids to share some things but not all things, especially anything that can be used against them later. It’s just not wise.

No shortcuts to trust. Websters defines trust as “a firm belief in the reliability, truth, ability, or strength of someone or something.” To have a firm belief in anything or anyone is a process that takes time and experience. So, it stands to reason, that the act of sharing passwords does not instantly make a relationship trustworthy. In a relationship, a person’s consistent character over time is what builds trust. There are no shortcuts to trust.

Reclaiming privacy. If your child (or you) constantly puts others needs first, has trouble saying no, and believes that setting healthy boundaries in a relationship could jeopardize it, then he or she may be a co-dependent person. Co-dependent people don’t honestly feel they have rights because they have given them all away. Slowly, over time, they have moved if not eliminated, their personal boundaries. It’s never too late to change this picture and help your child learn how to establish healthy boundaries. Healthy boundaries include: Having clear opinions and preferences and acting upon them, feeling safe and secure in relationships, being aware of personal choice in relationships, being able to identify manipulative behaviors in others.

Password Reminders. A strong password has all of the following characteristics:

  • It is at least ten characters in length
  • It doesn’t contain any word or words found in the dictionary
  • It mixes capital and lower-case letters
  • It contains special characters like numbers, punctuation marks, or symbols

Don’t get lazy with your passwords. The most common mistake consumers make is using the same password for all or most online accounts. So do this: Take an hour out of your day and change and document all of your passwords. Once you’ve beefed up your passwords, you can simplify the password process by using True Key multi-factor authentication service (hey — it’s also free)!

~~~

It may help kids to identify a healthy boundary as an imaginary force field that separates their responsibilities and opinions from those of others. This force field separate what’s theirs and what’s others; what they believe and value and what others believe and value. Seeing this force field clearly may help kids from feeling guilty for not conforming and free them up from taking negative comments personally.

As tough as it is to witness, your kids will experience heartbreak, betrayal, and broken trust. You can’t stop that. What you can stop is the depth of potential fallout by teaching the priceless value of privacy and keeping passwords under lock and key.

ToniTwitterHS

 

Toni Birdsong is a Family Safety Evangelist to McAfee. You can find her on Twitter @IntelSec_Family. (Disclosures).

The post What Else Kids Give Away When They Share Passwords appeared first on McAfee Blogs.

Posted in cybersafety, Cybersecurity, Family Safety, identity theft, password, protecting kids online, sharing passwords, social networking | Comments (0)

Unpatched WordPress Password Reset Vulnerability Lingers

May 4th, 2017
A zero day vulnerability exists in WordPress Core that in some instances, could allow an attacker to reset a user's password and in turn, gain access to their account.

Posted in 0day, Dawid Golunski, password, password reset, vulnerabilities, Web Security, WordPress, WordPress core, Zero-Day | Comments (0)