-
Such searches are fast and easy, and often the computers they find have weak passwords.
WSJ: Hackers New Target: Small Firms With Lax Security
-
Most hacks that happen are social engineering, not actual hacks of code, and happen because of weak passwords.
FORBES: How To Protect Yourself Online Like An Arab Revolutionary
-
But in the context of risk he is right, weak passwords, common dictionary words, will be broken faster.
FORBES: Discussing Gawker's Breach With Founder Nick Denton
-
Weak passwords open the door to fraud, identity theft and breaches of privacy.
ECONOMIST: Online security
-
On top of never having to remember a password again, Pico users would be theoretically immune from phishing attacks, choosing weak passwords, or even having their password stolen by an over-the-shoulder snoop.
FORBES: Could A Crypto-Computer In Your Pocket Replace All Passwords?
-
All the data says that usernames and passwords are the weak link in the security chain.
FORBES: How Hackers Will Defeat Google's Smartphone Security Scheme
-
Computer security is a chain with many weak links, of which only one is the use of passwords.
ECONOMIST: The measure of man | The