Are your credentials known to Cyber Criminals?

Are your credentials known to Cyber Criminals?

The Dutch Police announced a new service last week where people can check if their email address and password are known to cyber criminals. The Dutch police has built a database from data coming from confiscated equipment from known cyber criminals. I think this is a good initiative. Currently the Dutch databased holds 60.000 records (email address/ password). Last month the German police announced a similar initiative.

But if you really like to know if your username/email address and passwords are known to the bad guys and being traded on the dark-web, do the check on Have I Been Pwned? https://haveibeenpwned.com

The database behind on that site (created by Tory Hurt) holds the astonishing amount of 3.914.073.118 records with a unique combination of used username/email address password. (almost 4 billion accounts) A big chance that your username is known there, especially if you were using LinkedIn in 2012. :-)

Is that a problem? Not necessarily, But I'm assuming you do change your password on a regular basis and that you know how to make a good password.

Depending on the uses algorithms to store passwords (hashed, salted etc) hackers will have more trouble cracking the encrypted passwords. But there are also tools and tricks available for that.

So, stay safe and change your password on a regular basis. Use strong passwords

  • Use a sentence that you can remember
  • Change some letter with numbers
  • Add some punctuations (This week I saw a good article on LinkedIn - becomes - tW1sagaoL1!! )

Stay Safe. Roland Broersen



Peter Bruijns

My opinions are my own. A fellow human with a lot of business experience

7 年

To the average person cyber security is a quagmire and I am average. I know for me I do not trust any entity on the internet. Nor would I even trust those that put out stories like this one by Roland because a) I do not know Roland b) His company name is just a name and has no general awareness and c) Because any entity you share any information with may not be legitimate, ethical or practice safe internet themselves.

回复

要查看或添加评论,请登录

Roland Broersen的更多文章

  • Business Email Compromise, blijft een groot probleem.

    Business Email Compromise, blijft een groot probleem.

    Business Email Compromise (BEC), blijft een groot probleem voor zakelijk Nederland, met een stijging van 100% in 2019…

    3 条评论
  • Privilege Escalation Detection

    Privilege Escalation Detection

    In the Cyber Security landscape, we all deal with the same type of problems.

  • How do email scams work?

    How do email scams work?

    Increasingly, fake emails are indistinguishable from real ones, which, of course, entails the necessary security risks.…

  • Datalekken en menselijk gedrag

    Datalekken en menselijk gedrag

    De GDPR gekte is een hoogtepunt aan het bereiken. Consultancy bedrijven buitelen over elkaar heen met goed bedoelde…

  • What is the weakest link in your Cyber Security defence?

    What is the weakest link in your Cyber Security defence?

    When I talk to organisations about Cyber Security and Cyber Threats, I always ask them: What is the weakest link in…

  • 80% van cyber security incidenten vinden hun oorsprong in menselijk gedrag

    80% van cyber security incidenten vinden hun oorsprong in menselijk gedrag

    Vanuit SLTN Inter Access nemen wij deel aan het Alert Online programma van de Nederlandse overheid. Vanuit dit…

  • Digital bullying within schools

    Digital bullying within schools

    As a part of my activities I’m also involved with “Stichting Importunus”. This is a nonprofit foundation that is…

    1 条评论

社区洞察

其他会员也浏览了