Tag Archive for Password

Why Do We Call Them Uppercase?

Why Do We Call Them Upper Case?The typical U.S. user can have up to 130 online accounts and hopefully, they have 130 different passwords on these accounts. When setting up the 130 different passwords on these 130 accounts – you have undoubtedly seen the hate message

Password must include at least one upper case letter, one lower case letter, a number, and a special character.

Why is it called an uppercase or lowercase letter?

It is Gutenberg’s fault

Printing pressThe story goes back to Gutenberg‘s innovation of moveable type and the printing press (1450 A.D.). With Gutenberg’s printing press the compositor (“person who sets the type or text for printing”) stored the individual pieces of metal type in boxes called cases. The smaller letters (along with the type for punctuation and spaces), which were used most often, were kept in a lower case that was easier to reach. Capital letters, which were used less frequently, were kept in an upper case. Because of this old storage convention, we still refer to small letters as lowercase and capital letters as uppercase.

Upper print type case

Lower  print type case

Notice the uppercase letters had slots of equal size, while the lowercase letters (more often used) had slots proportional to their frequency of use (in English). 

The terms quickly became convention, because then a typesetter from one press could quickly adapt to another press. Now the terms are so generic that they are used even in handwriting instruction.

 

No more uppercase in passwords

use longer passwords or passphrases of 15 or more characters without requiring uppercase, lowercase or special charactersFortunately, the tide against using case as a password complexity factor has turned. The National Institute of Standards and Technology (NIST) now recommends everyone use longer passwords or passphrases of 15 or more characters without requiring uppercase, lowercase or special characters. NIST 800-63B says enforcing unnecessary password complexity requiring a mix of special characters, numbers and uppercase letters is a practice that can stop.

rb-

The distinction between uppercase and lowercase letters doesn’t exist in all languages, though. Certain Eastern and Asian writing systems, including certain Indian, Chinese, and Japanese alphabets, do not distinguish between uppercase and lowercase letters.

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Why Don’t Users Protect Themselves

Why Don't Users Protect ThemselvesA new report (PDF) from recently swallowed and swallowed again Webroot, says that American technology users overestimate their levels of cyber hygiene. Cyber hygiene is a cybersecurity risk mitigation technique introduced by Vinton Cerf in 2000 where you train yourself to think proactively about your cybersecurity. The goal is to resist cyber threats and online security issues to protect and maintain IT systems and devices and implement cybersecurity best practices, just as you do with your daily personal hygiene.

Webroot logoThe report says U.S. users do not know how to protect themselves from cyber threats. Americans are overconfident in the perceived protection they have. The endpoint security and threat intelligence provider found that 88% of interviewed Americans believe they are taking the appropriate steps to protect themselves from cyber-attacks.

Their confidence is misplaced. Instead, Americans have only a surface-level understanding of the most common types of cyber threats according to Webroot. We can recognize some of the names of the most common cyber-attacks such as malware (79%) or phishing (70%), but for most, that’s where their knowledge ends. Very few (less than 1 in 3) actually know what these common cyber-attacks are or what they do.

While Americans claim to have heard of some of the most common cyber-attack terms when prompted, very few actually understand what those cyber-attacks are. When asked about critical cyber-hygiene issues like malware, backups passwords, and identity theft surveyed Americans reported:

20% update their AV software regularlyMalware – 79% have heard of malware, but only 28% can confidently explain what it is. 82% are using some sort of AV software on their personal devices. 62% of those who use AV software use a free product. Only 20% update their AV software each time they are prompted.

Backups – are another weakness. 78% of respondents report backing up their data. However, 57% are still leaving themselves susceptible to risk by only backing up using one method, rather than backing up online (cloud) and offline.

  • 22% rarely or never backup their data.34% Automatically backup to the cloud
  • 27% Backup to an external hard drive
  • 24% Backup to a USB stick
  • 22$ backup locally on My Computer
  • 17% backup manually to the cloud
  • 22% rarely or never back up their data.

Among those who are backing up their information by uploading it to the cloud, only 43% are taking the extra step in ensuring that it’s stored in an encrypted format.

33% of Americans admit to sharing their passwordsPasswords – Followers of Bach Seat know that passwords suck and the Webroot report confirms it. 33% of Americans admit to sharing their passwords with others. To make matters worse, 63% are reusing passwords across multiple accounts. The research found that Americans have on average 9 passwords for 17 accounts.

Mobile – While on the go, 67% of Americans use public Wi-Fi, but only 35% take the extra step to protect themselves by using a VPN. Additionally, 34% use a work device as their primary personal device at home.

Identity theft 74% of Americans believe their identity stolen has never been stolen.

According to the Webroot whitepaper, the 5 most cyber risky U.S. states are:

  1. Mississippi most cyber risky stateMississippi
  2. Louisiana
  3. California
  4. Alaska
  5. Connecticut

The 5 least risky U.S. states are

  1. New Hampshire least cyber risky stateNew Hampshire
  2. North Dakota
  3. Ohio
  4. Idaho
  5. Kentucky

rb-

According to the research conducted by Wakefield for Webroot, Michigan ranked 31 among the 50 states. Overall, the average home user scored a 60% for cyber-hygiene. The researchers also found that those who they classified as “Superstars” tended to be:

  • A Boomer
  • Married or in a relationship
  • Suburbanite
  • Not a parent.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

DIY Ransomware

DIY RansomwareSophos has recently uncovered a new trend of cyber DIY’ers who are breaking into computers one at a time and manually running ransomware on them. Apparently, these purveyors of bespoke malware are tired of the mass distribution channels employed by WannaCry and NotPetya.

cybercriminalWhy bother using stolen NSA exploits or sending millions of booby-trapped email attachments when you can do it yourself. For whatever reason, some cyber-criminals have decided that if you want something doing properly, you have to do it yourself.

The Naked Security blog points out that many companies, notably small businesses, outsource their IT to, or pay for lots of help from, outside contractors. These contractors might live in another part of town, or elsewhere in the country, or even on the other side of the world. To let remote sysadmins look after your Windows networks, the most widely used tool is Microsoft‘s (MSFT) own Remote Desktop Protocol or RDP for short.

Microsoft Remote Desktop ProtocolFor those who haven’t used it, the author describes RDP as a tool that allows remote use even of fully graphical applications that can’t be scripted or operated via a command prompt. They can work like being right on-site.  That means that the RDP password you’ve chosen for your remote sysadmin (or that you’ve let them choose for themselves) is essentially the key to your office – a weak password is like a server room door that’s propped open, inviting any passing snooper to take a look inside.

brute force attackSo, if the crooks using a network search engine such as Shodan, notice that you’ve got RDP open to the internet, they’ll take a poke around. Sophos security experts who’ve investigated a number of recent RDP attacks have often found evidence that a tool called NLBrute was used to try a whole range of RDP passwords – a so-called brute force attack – in the hope of sneaking in.

Once they’ve got your RDP password – whether they use NLBrute, or simply look you up on Facebook to find your birthday and your pet’s name – they’ll log on and immediately create various brand new administrative accounts. That way, even if you get rid of the crooks and change your own admin password, they’ve already got backup accounts they can use to sneak back in later.

Here’s what you can expect to happen next, based on what Sophos has seen in the attacks they have investigated:

Female hacker - teachprivacy.comStep 1: The crooks download and install low-level system tweaking software, such as the popular Process Hacker tool. Tools of this sort are regularly used by legitimate sysadmins for troubleshooting and emergency recovery. The bad guys can also use it for no good. They can modify the operating system, kill off processes, delete files, and change configuration settings that are usually locked down.

Step 2: The cybercriminals turn off or reconfigure anti-malware software, using the newly installed tweaking tools.

Step 3: The bad guys go after the passwords of administrator accounts. If they can’t get an admin password, they may try logging in as a regular user and running hacking tools that try to exploit unpatched vulnerabilities to get what’s called EoP, or elevation of privilege.

EoP means that already logged-on users can sneakily promote themselves to more powerful accounts to boost their powers. Sophos has seen EoP tools left on attacked systems that tried to abuse vulnerabilities dubbed CVE-2017-0213 patched by Microsoft in May 2017 and CVE-2016-0099, patched by Microsoft back in March 2016.

database servers

Step 4: The crooks turn off database services (e.g. SQL) so that vital database files can be attacked by malware. Files such as SQL databases are usually locked while the database server software is active, as a precaution against corruption that could be caused by concurrent access by another program. The side-effect of this is that malware can’t get direct access to database files either, and therefore can’t scramble them to hold them to ransom.

Step 5: The crooks turn off Volume Shadow Copy (the Windows live backup service) and delete any existing backup files.  Shadow copies act as real-time, online backups that can make recovery from ransomware a quick and easy process. That’s why crooks often go looking for shadow copies first to remove them.

Step 6: The crooks upload and run ransomware of their choice. Because these DIY criminals have used their illegitimate sysadmin powers to rig the system to be as insecure as they can, they can often use older versions of ransomware, perhaps even variants that other crooks have given up on and that are now floating around the internet “for free”.

These bespoke hacks mean the crooks don’t have to worry about using the latest and greatest malware, or setting up a command-and-control server, or running a hit-and-hope spam campaign.

In one attack, Sophos saw a folder on the desktop containing four different types of ransomware. The crooks ran each in turn until one of them worked.

Many ransomware attacks are distributed indiscriminately, and therefore rely on a “pay page” – a Dark Web server set up specially to tell victims how much to pay, and how to pay it.

But the author notes these RDP crooks are already personally involved to the extent of logging into your network themselves, so there’s often what you might call a “personal touch”.

Pay ransomware in bitcoinRather than automatically squeezing you via a website, the blog says you’ll probably see a pop-up telling you to make contact via email to “negotiate” the release of your data. At the time of writing the Bitcoin address used by that attacker contained BTC 9.62, with 1 bitcoin valued at $11,388.33 (11-28-2017) currently worth almost $110,000.

The Sophos investigators found that the victims of this kind of attack are almost always small-to-medium companies: the largest business in our investigation had 120 staff, but most had 30 or fewer. With small-scale comes a dependence on external IT suppliers or “jack-of-all-trades” IT generalists trying to manage cybersecurity along with many other responsibilities.

In one case a victim was attacked repeatedly, because of a weak password used by a third-party application that demanded 24-hour administrator access for its support staff.

Sophos recommends these steps to cut your risk of becoming a victim of DIY Ransomware:

  1. If you don’t need RDP, make sure it’s turned off on every computer on the network: RDP can be used to connect to servers, desktops, and laptops.
  2. Consider using a Virtual Private Network (VPN) for connections from outside your network. A VPN requires outsiders to authenticate with the firewall first and to connect from there to internal services. This means software such as RDP never needs to be exposed directly to the internet.
  3. Use two-factor authentication (2FA) wherever you can. To log on with 2FA you need a one-time logon code every time. If crooks steal or guess your password, it’s no use on its own.
  4. Patch early, patch often. This prevents crooks from exploiting vulnerabilities against your network reducing your exposure to danger.
  5. After an attack, check to see what the crooks have changed. Don’t just remove the malware or apply the missed patches and be done with it. Especially check for added applications, altered security settings, and newly created user accounts.
  6. Set a lockout policy to limit password guessing attacks. With three guesses at a time followed by a five-minute lockout, a crook can only try out 12 × 3 = 36 passwords an hour, which makes a brute force attack impractical.
  7. If you’re using a third-party IT company and they haven’t already suggested the precautions Sophos listed above, why not ask them why, and ask yourself if they’re the right people to be looking after your network?

Related article

  • Hackers have cashed out on $143,000 of bitcoin from the massive WannaCry ransomware attack (CNBC)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Lessons From the LinkedIn Data Breach

Lessons From the LinkedIn Data BreachReaders of the Bach Seat know that passwords suck and that people are awful at picking passwords. The Business Insider offers more proof. According to a recent article, the 2012 LinkedIn data breach exposed a whopping 167 million accounts that were compromised, including 117 million passwords.

The article says the passwords were hashed or encrypted so they can’t be read, but researchers at LeakedSource have been able to decrypt them. Their findings should be no surprise to Bach Seat followers. The results show just how much the same passwords get used over and over (and over and over and over and over) again.

Most often used passwords

92% of the top leaked LinkedIn passwords were identified as the top 25 most often used passwords in 2011 or 2012. Nearly half of the passwords listed were the most commonly used password in 2011, 2012, or 2013. The top 5 bad passwords were used to “secure” over 1.2 million accounts.

PasswordsThe LeakedSource data says the most popular password for LinkedIn in 2012 was 123456. That password was used by more than 750,000 accounts. Data the Bach Seat has collected says that 123456 has been the top 1 or 2 passwords every year used since 2011.

The remarkably unstealthy password ’linkedin’ is the second most used password on these breached LinkedIn accounts with 172,523 users. That is just so wrong on so many levels.

The password ‘password’ is number three with 144,458 hacked LinkedIn users relying on it to secure their professional profile. Our historical data says that ‘password’ has swapped the top ranking with ‘123456’ since 2011.

password is ‘password’12345678’ is the fourth most popular bad LinkedIn password with 94,214 users according to LeakedSource. This password has been a consistent #3 in my data.

The data for the top 49 passwords is below. You can search for your user name here  Fix your passwords.

RankPasswordFrequencyNotes
1123456753,305#2 in 2012
2linkedin172,523
3password144,458#1 In 2012
412345678994,314#6 in 2012
51234567863,769#3 in 2012
611111157,210#12 in 2011
7123456749,652#7 in 2011
8sunshine39,118#15 in 2011
9qwerty37,538#4 in 2011
1065432133,854#21 in 2011
1100000032,490#25 in 2013
12password130,981#21 in 2013
13abc12330,398#5 in 2011
14charlie28,049
15linked25,334
16maggie23,892
17michael23,075#16 in 2012
1866666622,888
19princess22,122#22 in 2013
2012312321,826#11 in 2013
21iloveyou20,251#9 in 2013
22123456789019,575#13 in 2013
23Linkedin119,441
24daniel19,184
25bailey18,805#17 in 2011
26welcome18,504
27buster18,395
28Passw0rd18,208#18 in 2011
29baseball17,858#9 in 2012
30shadow17,781#17 in 2011
3112121217,134
32hannah17,040
33monkey16,958#6 in 2011
34thomas16,789
35summer16,652
36george16,620
37harley16,275
3822222216,165
39jessica16,088
40GINGER16,040
41michelle16,024
42abcdef15,938
43sophie15,884
44jordan15,839#22 in 2012
45freedom15,793
4655555515,664
47tigger15,658
48joshua15,628
49pepper15,610

rb-

The advice remains the same as I wrote about in 2010.

Strong passwords characteristics:
• At least eight (8) alpha-numeric characters
• At least one numeric character (0-9)
• At least one lower case character (a-z)
• At least one upper case character (A-Z)
• At least one non-alphanumeric character* (~, !, @, #, $, %, ^, &, *, (, ), -, =, +, ?, [, ], {, })
• Are not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc.
• Are never written down or stored online.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Online Dangerous Celebrities 2015

Online Dangerous Celebrities 2015It that time of year again! McAfee Intel Security has named the most dangerous celebrities on the Intertubes. And I have no idea who Electronic Dance Music (EDM) DJ Armin van Buuren is. Despite that, he is Intel’s most dangerous web celeb. To regain my street creds – I have been gone to DEMF –YO PEACE OUT. The EDM DJ replaces talk show host Jimmy Kimmel as Intel Security’s most dangerous celebrity to search for online.

For the ninth year in a row, The Intel Security Most Dangerous Celebrities™ study revealed that searches for certain musicians and comedians tend to expose Internet searchers to more possible viruses and malware.

The presser from Intel (INTC) Security warns that cybercriminals are always looking for ways to take advantage of consumer interest around popular culture events including award shows, TV shows, and movie premieres, album releases, celebrity breakups, and more. They capitalize on this interest by enticing unsuspecting consumers to sites laden with malware, which enables them to steal passwords and personal information.

Stacey Conner, online safety expert at Intel Security says that trying to download or listen to free music can be especially risky.

Celebrity names combined with the terms ‘free MP4, ‘HD downloads,’ or ‘torrent’ are some of the most searched terms on the Web … When consumers search for music that is not made available through legitimate channels, they put both their digital lives and devices at risk.

Top 10 risky celebrities

The top 10 celebrities from the 9th annual Intel Security Most Dangerous Celebrities™ study with the highest risk percentages are:

  1. Armin van BuurenBetty White one 2015s most dangerous celebs online
  2. Luke Bryan
  3. Usher
  4. Britney Spears
  5. Jay Z
  6. Katy Perry
  7. Amy Schumer
  8. Betty White
  9. Lorde
  10. Nina Dobrev

Musicians are 7 of the top 10 riskiest online celebrities (and good click-bait). Other risky artists in the top 20 are:
Justin Bieber (No. 11),
Rihanna (No. 12),
Jennifer Lopez and Kenny Chesney (tied at No. 13),
Selena Gomez (No. 14),
Zendaya (No. 15),
Kanye West (No. 16),
Afrojack and Miley Cyrus (tied at No. 19), and
Nick Jonas (No. 20).

Other celebrities who round out the 20
Sandar Bullock one 2015s most dangerous celebs onlineriskiest online celebrities.
Antonio Banderas (No. 14),
Nicole Kidman (No. 15),
Zac Efron (No. 17),
Natalie Portman (No. 18),
Paul Wesley (No. 18)
Sandra Bullock (No. 19),
Jennifer Lawrence (No. 20),

Riskiest celebrities around the world

Better Protect Yourself

While doing your star-struck surfing, Intel Security offers some suggestions on How You Can Better Protect Yourself:

  • Katie Perry one 2015s most dangerous celebs onlineBeware of clicking on third-party links. You should access content directly from the official websites of content providers. For example, visit reputable site ComedyCentral.com to find Amy Schumer’s latest episodes.
  • Use web protection that will tell you of risky sites or links before you visit them and it’s too late. Stick to official news sites for breaking news.
  • Only download videos from well-known, legitimate sites. Most news clips you’d want to see can easily be found on official video sites and don’t require you to download anything.
  • Use caution when searching for “HD downloads.” This term is by far the highest virus-prone search term. Consumers searching for videos or files to download should be careful not to unleash unsafe content such as malware onto their computers.
  • Always use password protection on all mobile devices. If you don’t and your phone is lost or stolen, anyone who picks up the device could have access to your personal information online.
  • Don’t “log in” or give other information. If you receive a message, text, or email or visit a third-party website that asks for your information — including your credit card, email, home address, Facebook login — to grant access to an exclusive story, don’t give it out. Such requests are a common tactic for phishing that could lead to identity theft.
  • Search online using a tool, such as McAfee® WebAdvisor software, which protects users from malicious websites and browser exploits.

rb-

Maybe I’m just being grumpy, but McAfee has done this for 9 years and people are still falling for this online celebrity malware staff – sigh – They were right – One born every day.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.