Passwords

password

A  Brute Force Attack simply tries to use every possible character combination as a password. Automated software is used to generate a large number of consecutive guesses of the desired data, usually passwords or pin  numbers.

Work out your method for strong passwords

 

Enable 2-factor authentication, if it is available for the service you use. This is a process that requires you to confirm your identity on an alternate device (usually a mobile phone) when logging into an account. Google, Facebook, Twitter and WordPress support 2-factor authentication.

 


 

WorstPasswords-2013

Every year SpashData looks through the millions of passwords stolen over the previous 12 months and uses them to identify the worst (and most commonly used) passwords of the year. If your password is on this list, CHANGE IT RIGHT NOW!