![]() They really just wanted my Twitter handle: As a three-letter username, it's considered prestigious. My Apple, Twitter, and Gmail passwords were all robust-seven, 10, and 19 characters, respectively, all alphanumeric, some with symbols thrown in as well-but the three accounts were linked, so once the hackers had conned their way into one, they had them all. This summer, hackers destroyed my entire digital life in the span of an hour. All a hacker has to do is use personal information that's publicly available on one service to gain entry into another. Thanks to an explosion of personal information being stored in the cloud, tricking customer service agents into resetting passwords has never been easier. The way we daisy-chain accounts, with our email address doubling as a universal username, creates a single point of failure that can be exploited with devastating results. ![]() Leaks and dumps-hackers breaking into computer systems and releasing lists of usernames and passwords on the open web-are now regular occurrences.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |