[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Iran Disables GPS, Joins China’s Beidou — The End of U.S. Satellite Dominance?

Ukraine's Withdrawal From Anti-Personnel Landmine Treaty Could Haunt Generations

71 killed in Israeli attack on Iran's Evin Prison

Practice Small, Daily Acts Of Sabotage Against The Imperial Machine

"EVERYONE'S BEEN SHOT UP HERE": Arsonists Set Wildfire In Northern Idaho, Open Fire On Firefighters, Police In Ambush

Trump has Putin trapped, and the Kremlin knows it

Kamala's comeback bid sparks Democrat donor meltdown amid fears she'll sink party in California

Russia's New Grom-A1 100 KM Range Guided Bomb- 600 Kilo

UKRAINIAN CONSULATE IN ITALY CAUGHT TRAFFICKING WEAPONS, ORGANS & CHILDREN WITH THE MAFIA

Andrew Cuomo to stay on ballot for NYC mayor in November general election

The life of the half-immortal who advised CCP (End of CCP in 2026?)

Millions Flee China’s Top Cities

Violence begets violence: IDF troops beaten, choked, rammed by Jewish settlers in West Bank

Netanyahu Says It's Antisemitic For Israeli Soldiers To Describe Their Own Atrocities

China's Economy Spirals With No End In Sight, Says Kyle Bass

American Bread Cannot Be Sold in Most Countries

Woman Spent Her Life To Prove 796 Babies were buried under Catholic Home

Japan Got Rich Without Getting Fat

US Spent $495.3 million to fire 39 THAAD Missiles

Private Mail Back Online

Senior Israeli officials tell Israeli media that they intend to attack Iran after ceasefire.

Palestinian Woman Nails Israeli

Tucker Carlson: Marjorie Taylor Greene:

Diverse Coney Island in New York looks unrecognizable after third world invasion

Corbett Report: Palantir at the Heart of Iran

Haifa, Israel Before and After

Nobody can hear you anymore.

Boattail Buick: The Bill Mitchell's Riviera Revival!

Pulitzer Winning Washington Post Journalist Busted For Child Porn

20 Big Restaurant Chains Are Closing Several Locations All Over America


Science/Tech
See other Science/Tech Articles

Title: There's a Simple New Way to Find Out if Hackers Already Have Your Password
Source: [None]
URL Source: http://www.sciencealert.com/there-s ... if-hackers-know-your-passwords
Published: Aug 8, 2017
Author: PETER DOCKRILL
Post Date: 2017-08-08 06:41:25 by Tatarewicz
Keywords: None
Views: 74

Sci-alert...

Passwords suck. They're hard to remember, we all have about a million of them, and they're not supposed to be anything easy or memorable like your cat's name (sorry Furball1).

Worst of all, when massive data breaches happen to the companies we actually trust with our online credentials, our usernames and passwords can become totally exposed – but luckily, there's now a simple way to find out if you've been compromised like this.

Troy Hunt is an Australian security researcher and the man behind Have I Been Pwned (HIBP), a website that lets people check if their email addresses and usernames have been involved in some of the biggest data breaches ever – involving companies like Myspace, LinkedIn, Adobe, Dropbox (and sadly hundreds more).

Now, Hunt has approached the same problem from the opposite perspective, building a new tool called Pwned Passwords that does the same kind of thing, but this time it lets you enter just your passwords to see if they've been leaked in any of the aforementioned hacks.

3948729348 password 2Pwned Passwords

There's a staggering 320 million leaked passwords stored in this database, and if you're wondering whether it's maybe irresponsible to collect them all in one place like this, there are a couple of things to bear in mind.

One, none of the passwords here are stored alongside the email addresses or usernames that they pair with, so if any people are still using these long-exposed passwords, their anonymised listing here shouldn't make things any easier for hackers.

Two, Hunt's whole point with Pwned Passwords is to draw attention to the issue of how just how many of our passwords have been outed by hackers up until now – by letting people check if one of their passwords is out there on the big bad internet.

Again, all of these passwords are already out in the wild – some have been for a long time – so hopefully most users have already changed them.

There are two ways of using Pwned Passwords: an online search tool on the website itself, and by downloading the whole list of 320 million leaked passwords, which are stored across three separate text files (note: you're looking at more than 5GB in total, as the list is very long).

Before we go any further, a word of warning. You really shouldn't type any active passwords you're currently using in to the online search tool, because it goes against the whole principle of never sharing or distributing your passwords, even if it's with a website set up by a professional security researcher.

3948729348 password 2Pwned Passwords

As Hunt explains on his blog:

"It goes without saying (although I say it anyway on that page), but don't enter a password you currently use into any third-party service like this! I don't explicitly log them and I'm a trustworthy guy but yeah, don't.

The point of the web-based service is so that people who have been guilty of using sloppy passwords have a means of independent verification that it's not one they should be using any more."

What this means is that if you want to see if any of your current passwords have been exposed, you really ought to download the whole list and search through it from the privacy and security of your own device.

It's an extra step of hassle, sure, but it's worth it, guys, and it's still a pretty simple thing to do.

For extra security – and to protect anybody still using these leaked passwords – the passwords in the list files have been encrypted with SHA–1 hashes, so you'll need to generate the hash of your password before you search for it in the list (instructions for generating SHA–1 hashes are easily found online).

Hopefully, whichever way you choose to use the service, you'll find that none of your passwords have been leaked, but if they are, now's as good a time as any to change them – and if you don't already, you should really consider using a password manager to store and generate your passwords.

For more on how to make the most of Pwned Passwords, check the instructions on the site, and have a read of Hunt's blog post introducing the service.

One last thing, if searching the service doesn't bring up any of your passwords, that's good news for sure, but it doesn't necessarily mean your password hasn't been leaked at some point – just that it's not included as part of this database.

"One quick caveat on the search feature: absence of evidence is not evidence of absence," as Hunt explains, "or in other words, just because a password doesn't return a hit doesn't mean it hasn't been previously exposed."

Stay vigilant, folks!

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]