And to wrap up password week at WyzGuys. From Pinterest
This would work out like this:
X9_old_pond . . .a_frog_leaps_in_water’s_sound♠ψ♥
Aside from the gang sign, the hieroglyph, and the virgin’s blood, this would actually be an awesome and usable password.
Keith Graham of SecureAuth was recently interviewed for a recent article on TechRepublic, and the subject of adaptive authentication came up. He defined adaptive authentication this way:
Continue Reading →“Adaptive authentication involves evaluating risk around the login process before the user even authenticates so that the system only steps up, or outright denies, the authentication when it deems a logon as a risk. Hence, ...
FEB
Here are the 25 most commonly used passwords for 2014. If your password is on this list, please understand that these passwords are among the first tried when automated password cracking software is used by a cyber-criminal. So if yours is here, change it now.
Passwords are becoming problematic for several reasons. The first, IMHO, is the use of email addresses as the user ...
Continue Reading →FEB
Thanks to mint.com for the following infographic. Credit card numbers are like social security numbers, different parts of the number tell a story. A credit card number, to be valid, has to conform to something called the Luhn algorithm. Basically, after doing some crazy math, the result needs to be divisible by 10.