passwords

  1. Tomcat

    A new method for stealing PIN codes and passwords from mobile devices has been introduced

    The method allows you to determine the characters entered on the virtual keyboard by the sound waves generated when you press the keys. Keyloggers are not the only means by which attackers can find out the password of a tablet or smartphone. A team of scientists from the University of Cambridge...
  2. Tomcat

    Your passwords are no longer yours: 2FA is powerless over OTP bots

    Why is relying on two-factor authentication not a good idea? These days, two-factor authentication (2FA) has become the security standard for most websites and online services. Some countries have even passed laws requiring certain organizations to protect user accounts using 2FA. However, the...
  3. Father

    Malicious Chrome extension VenomSoftX steals passwords and cryptocurrency

    Experts warn about a malicious extension for Google Chrome called "VenomSoftX". By installing this addon, users run the risk that the contents of their clipboard in Windows will fall into the hands of intruders. In fact, VenomSoftX is one of the components of a malicious program for...
  4. Father

    Microsoft intends to bury passwords: Passkey opens the door to a secure future

    Cryptographic pair as an insurmountable barrier against hacker threat. Not so long ago, Microsoft announced the mass launch of the Passkey feature, which allows users to opt out of using passwords to access company accounts. In its official publication, the company reports that users of...
  5. Father

    Britain introduces official ban on weak default passwords

    Goodbye, "12345". The PSTI Act comes into force after two years of disputes and discussions. From today, manufacturers of smart devices in the UK are required to follow new rules aimed at tightening security measures for phones, tablets and other smart gadgets. The Product and...
  6. Father

    Experts showed the results of brute-forcing passwords encrypted with Bcrypt

    Hive Systems has conducted another study on brute-force password cracking. This time, experts focused on the Bcrypt algorithm. Hive Systems, which specializes in cybersecurity, has been testing password cracking using brute-force attacks for several years. All this time, the object of research...
  7. Father

    Microsoft employees revealed the company's internal passwords

    Who hasn't managed to access sensitive data on the server yet? Microsoft has fixed a vulnerability that allowed the company's internal files and credentials to be publicly available on the Internet. The problem was discovered by a team of SOCRadar specialists who shared the information with...
  8. Teacher

    Ov3r_Stealer: Your passwords, crypts, and data are all in the hands of hackers

    Facebook ads are once again implicated in the spread of malware. A new report from Trustwave has revealed an advanced campaign to distribute powerful malicious software that aims to steal data from infected computers. The attack scheme starts with a Facebook ad leading to a PDF file on...
  9. Brother

    Hacking or negligence? Binance's code and passwords have been available on GitHub for several months.

    Will the leak affect the security of clients and internal systems of the platform? An extremely sensitive array of data belonging to Binance has been located in the public GitHub repository for several months. As it became known to the publication 404 Media, the array contained codes...
  10. Brother

    AsyncRAT in ASP.NET: how hackers bypass antivirus protection in two clicks and secretly collect passwords

    Trend Micro experts analyzed the attackers tactics in detail and reported on how to avoid the attack. Cybersecurity researchers at Trend Micro analyzed several incidents related to the introduction of the AsyncRAT malware. Attackers exploited a legitimate process vulnerability...
  11. Carding 4 Carders

    Strong passwords? Administrators select "admin" and "123456"

    How IT administrators pave the way for hackers to access the systems of large companies. Outpost24 researchers have identified alarming trend — thousands of IT administrators use predictable and weak passwords to protect access to internal company networks. This puts sensitive data and...
  12. Carding

    How can your vacation schedule steal your passwords? New malware DarkGate answers the question.

    Be careful if you receive a message from a colleague in Microsoft Teams. Truesec specialists have discovered a new phishing campaign in which attackers used the Microsoft Teams corporate messenger to send malicious files that activate the installation of the DarkGate Loader malware on victims...
  13. Carding

    3 in 1: How a Single Word Document Can Steal Passwords, Data, and Cryptocurrency

    One file delivers 3 malware and a lot of problems. Researchers at Fortinet FortiGuard Labs have identified a sophisticated phishing campaign that uses a Microsoft Word decoy document to spread three different types of malware-Agent Tesla, OriginBotnet, and RedLine Clipper. Programs can collect...
  14. Carding

    Under the Hood of Leaks: An investigation into the Fate of Your Passwords

    How one of the largest email services works with unreliable passwords. Average monthly Yandex. Mail audience for the second quarter of 2023 Mail.ru The average daily audience was 48.9 million, and the average daily audience was 16.4 million. Hundreds of scenarios are implemented to ensure the...
  15. Brother

    Hacker shares passwords from 900 corporate VPN servers

    Journalists of the ZDNet publication report that information security researcher Bank Security, specializing in financial crimes, found on a Russian-language hacker forum a list of IP addresses and credentials for 900 corporate Pulse Secure VPN servers. The announcement lists 1,200 servers...
  16. Carding 4 Carders

    How law enforcement experts reveal passwords

    Hackers, crooks, IT security workers, investigative agencies and special services - all of them, under certain circumstances, can try to get to information protected by passwords. And if the tools used by hackers and special services, on the whole, practically coincide, then the approach to the...
  17. Lord777

    A brief history of passwords from antiquity to the present day

    Despite the fact that Microsoft has been actively promoting the concept of a "passwordless future" for many years, it is still difficult to believe in the amazing new world. Could there be something more unshakable and permanent than checking "friend or foe" using a code word? We figure out how...
  18. Mutt

    Hacking WiFi WPA2-PSK Passwords with Cowpatty

    For this tutorial, we will use a utility developed by wireless security expert Joshua Wright called cowpatty (usually coWPAtty). This app simplifies and accelerates WPA2 hybrid / dictionary attack. So let's get to work! Step 1: Find Cowpatty Cowpatty is one of hundreds of useful utilities...
  19. dunkelh3it

    Kali Linux – Password Cracking Tool

    Password cracking is a mechanism that is used in most of the parts of hacking. Exploitation uses it to exploit the applications by cracking their administrator or other account passwords, Information Gathering uses it when we have to get the social media or other accounts of the C.E.O. or other...
  20. Carding

    How do authentication tokens work and how do they differ from passwords?

    We are all surrounded by passwords, one-time codes, keys, and tokens, but we don't always know they exist. They ensure the security of our accounts and data every minute. However, it is important for us to know exactly how the most basic information protection mechanisms work. One of them is...
Top