Hacking employees' passwords: As simple as 1 2 3 4 5 6

June 2014
HR Specialist: Employment Law;Jun2014, Vol. 44 Issue 6, p5
The article discusses the twelve most popular or top log-in passwords used by employees in the U.S. that include 123456 and suggests measures to strengthen the password.


Related Articles

  • New tools.  // Computer Act!ve;2/12/2020, Issue 573, p11 

    Smarter people than us have failed to understand Facebook's privacy settings, so horrendously complex is the small print. It splits Facebook's settings into four simple categories (see screenshot): "Who can see what you share" (where you can decide which people can see your profile information...

  • Experts solve your computing problems. Mead-Green, Rob; Ellis, Catherine; Sharma, Mayank; Sleightholm, Ian; Hanson, Matt // APC (Future Publishing Ltd.);Jul2019, Issue 469, p78 

    Highlights from the article: After Windows was up and running again, Bil discovered that his DVD drives and Windows 7 backup tool were now working perfectly as well, confirming that it had been a Windows issue all along. There are several customisation tools built in to Microsoft Office - in...

  • Gefährliche Nachlässigkeit.  // Die Bank;jul2013, Issue 7, p56 

    The article discusses the usefulness of password management software as a security measure for Internet user accounts that users may have forgotten to have created.

  • ROKU: Express. Andrews, Stuart // Computer Shopper;Apr2020, Issue 386, p38 

    At the back, you'll find a Micro USB input, which supplies power from the USB port on your TV or from a mains adaptor if your TV doesn't have one. If you've used a Roku device before, then your new streamer will even import your app list from your Roku account, though sadly not any usernames or...

  • number crunch.  // APC (Future Publishing Ltd.);Jul2019, Issue 469, p19 

    Highlights from the article: 1 MILLION NUMBER OF ASUS PCS VULNERABLE TO THE "SHADOWHAMMER" MALWARE ATTACK THAT LANDED IN MARCH. The malware, which posed as a security update, was discovered by anti-virus vendor Kaspersky, which said 57,000 of its customers were affected; while Symantec said...

  • WhatsApp adds Android fingerprint unlocking.  // Web User;11/13/2019, Issue 488, p9 

    Tired of tapping a PIN into your phone to protect your WhatsApp chats? If your Android phone has a fingerprint scanner, you can now use it to keep nosy parkers from reading your private conversations, though this comes months after the same feature was introduced in the iOS version of the app.

  • Best two-factor authentication apps. Shaw, Andy // Web User;2/5/2020, Issue 494, p46 

    Duo Security creates its own two-factor authentication (2FA) software that companies can buy to add secure login services to their websites. The huge benefit that both Google and Microsoft have over the other authenticators is that they use push notifications to let you accept logins to their...

  • “As a PC Pro reader, you can play your part in helping to spread the password manager message”. WINDER, DAVEY // PC Pro;Apr2020, Issue 306, p118 

    "As a PC Pro reader, you can play your part in helping to spread the password manager message" Even if you store truly unique and random, long and complex, passwords for every site and service in an encrypted password manager app, that doesn't mean your credentials are safe from attackers. Keep...

  • NO.8 USE A PASSWORD MANAGER.  // Engineering & Technology (17509637);Feb2017, Vol. 12 Issue 1, p30 

    The article offers information on the importance of using password managers to ensure password security such as the online app Zoho, mobile download Password Depot, and handheld gadget Trezor.

  • On IoT applications: a proposed SDP framework for MQTT. Refaey, A.; Sallam, A.; Shami, A. // Electronics Letters;10/31/2019, Vol. 55 Issue 22, p1201 

    In this work, the software-defined perimeter (SDP) is considered for the Message Queuing Telemetry Transport (MQTT) protocol framework in the Internet of Things (IoT) applications. In fact, the SDP provides an additional layer of security with or without SSL/TLS by replacing the traditional...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics