The Hacker News recently published an article (see link below) which identified three common password cracking techniques used by hackers.

The article introduction began by stating that "passwords are rarely appreciated until a security breach occurs" and "the importance of a strong password becomes clear only when faced with the consequences of a weak one"!

Which begs the qustion, how vulnerable are the passwords you use to the most common password-cracking methods?

Three Common Password-cracking Methods

Overall we found this article both interesting and useful.

Read it for yourelf at the following link.

Read more: Three Password-cracking Techniques and How to Respond

Key takeaway if you got this far

Use strong long complex passwords comprising a combination of letters, numbers, and special characters.

Avoid using common words or easily guessable phrases.

Be proactive when engaging with your website's hosting provider: ask them which password hashing algorithm is used by their database application.

More about WYNCHCO Solutions

The Hacker News recently published an article (see link below) which identified three common password cracking techniques used by hackers.

The article introduction began by stating that "passwords are rarely appreciated until a security breach occurs" and "the importance of a strong password becomes clear only when faced with the consequences of a weak one"!

Which begs the qustion, how vulnerable are the passwords you use to the most common password-cracking methods?

Three Common Password-cracking Methods

Overall we found this article both interesting and useful.

Read it for yourelf at the following link.

Read more: Three Password-cracking Techniques and How to Respond

Key takeaway if you got this far

Use strong long complex passwords comprising a combination of letters, numbers, and special characters.

Avoid using common words or easily guessable phrases.

Be proactive when engaging with your website's hosting provider: ask them which password hashing algorithm is used by their database application.

More about WYNCHCO Solutions

By browsing our website you agree to its use of cookies. Cookie Policy.