Have you been?pwned?

IMAGE: Mohamed Hassan - Pixabay (CC0)

A team of Vice editors quizzed attendees at the latest DEF CON, one of the biggest cybersecurity conferences in the world, why so many people were still subject to robberies and crimes on the web, with the most common answer because they don’t take even the most obvious and simple precautions.

recent study by Google concluded that hundreds of thousands of people use not only the same password for websites and services, but even continue to use passwords that have been published and associated with their username on the internet, as a result of security leaks from services they used at some time. The equivalent in the physical world would be to lose a key that opened your front door, your car, your office and gym locker, and that, in addition, you had left where anybody could find it. The question, obviously, would not be if you were to be robbed, but when.

That’s right: hundreds of thousands of people use not only stupidly simple passwords, but also use them for multiple sites; what’s more, these passwords together with your username, are already out there, easily available to anybody who wants to use them for credential stuffing: simply take those user and password pairs and randomly test them automatically to see if that user has also used them for other services.

How to know if we are one of that sorry group? We repeat: the problem is no longer simply that your password is ridiculously simple or that we use it everywhere, which would already make you an easy victim, but that the password has been published. To find out, go to Have I Been Pwned, a service created by security expert Troy Hunt that collates security breaches and where you simply enter your email — no, they will not use it to spam — and are told if it appears in any online files and repositories. If yours comes up, the conclusion is very simple: the password you used on that service is publicly available, and you should not reuse it on any other site attached to that email, because anyone can simply try it on any service. You can even set up alarms to email you in case the email addresses you normally use appear in future data dumps.

Google has created a browser extension called Password Checkup Extension. If you enter a username and password that is no longer safe due to appearing in a data breach known to Google, you’ll receive an alert.

If, in addition to doing this little test and correcting any existing problems, you want to start doing things properly, simply stop using the same password all the time. Better still, forget about all your passwords except one and start using a password manager. There are many, the market leaders are LastPass1PasswordDashlane or KeePass, with different conditions and prices that include a freemium or donation model, and that simply require a little order and discipline. Ignore anybody who says password managers are not safe because “if the site is hacked, all my passwords will be stolen.” They don’t know what they’re talking about: password managers use powerful encryption. 

Finally, if you really believe you can handle your own passwords, at least take a look to see if yours have already been compromised: it doesn’t take long and it could prevent problems down the line. At least, don’t make it easy for the crooks…


(En espa?ol, aquí)

?

要查看或添加评论,请登录

Enrique Dans的更多文章

  • El desastre del software y la automoción

    El desastre del software y la automoción

    GM se ve obligada a detener temporalmente las ventas de su Chevy Blazer EV después de detectar un sinnúmero de…

    11 条评论
  • El enésimo drama de la automoción tradicional: la interfaz

    El enésimo drama de la automoción tradicional: la interfaz

    Porsche acaba de anunciar que se une a toda la legión de empresas de automoción tradicionales y renuncia a tener una…

  • Poniendo a prueba a ChatGPT: consultores centauros o cyborgs

    Poniendo a prueba a ChatGPT: consultores centauros o cyborgs

    Un working paper de Harvard, ?Navigating the jagged technological frontier: field experimental evidence of the effects…

    12 条评论
  • Suscripciones, tramos… y spam

    Suscripciones, tramos… y spam

    Elon Musk confirma sus intenciones de convertir la antigua Twitter, ahora X, en un complejo entramado de suscripciones…

  • El código abierto y sus límites

    El código abierto y sus límites

    Sin duda, el código abierto es la forma más ventajosa de crear software: cuando un proyecto de software toma la forma…

  • La gran expansión china

    La gran expansión china

    El ranking de apps más descargadas en el mundo en iOS y Android para el mes de septiembre de 2023 elaborado por…

    1 条评论
  • Starlink y las torres de telefonía en el espacio

    Starlink y las torres de telefonía en el espacio

    Starlink remodela su página web y a?ade una oferta de internet, voz y datos para smartphones provistos de conectividad…

    3 条评论
  • La fotografía con trampa

    La fotografía con trampa

    La presentación de los nuevos smartphones de Google, Pixel 8 y Pixel 8 Pro, y fundamentalmente de las funcionalidades…

  • Las consecuencias de reprimir los procesos de innovación

    Las consecuencias de reprimir los procesos de innovación

    Mi columna de esta semana en Invertia se titula ?El mercado de trabajo y la innovación? (pdf), y previene sobre los…

  • We are on the verge of the most dangerous election in history

    We are on the verge of the most dangerous election in history

    In just a few days, on November 3rd, the US presidential elections will take place, the most dangerous in history, and…

    2 条评论

社区洞察

其他会员也浏览了