Top

Technology

Password. STOP!

Password. STOP!

Many tech bloggers write about the need for strong passwords. It makes sense that we should have strong, not easily guessed passwords, but what defines strong? How easy or difficult is it for a cybercriminal to hack your password?

One common technique used by hackers is called a brute-force attack. A brute-force attack is a trial-and-error method of guessing your password. Hackers use specially-crafted programs to cycle through dictionary-based words, non-dictionary words and all possible combinations of alpha-numeric characters in an attempt to glean the “key” protecting your sensitive data. The limiting factor is compute power. The more processing power the hacker can leverage, the faster your data can be hacked.

malware

Danger! Malware Ahead!

Malware. We’ve all heard of it. It’s been headline news. The US Dept. of Homeland Security issues daily threat alerts. Software companies and device manufacturers scramble to patch discovered exploits. Many of us have had friends, family or colleagues who have been infected.

Malware. Malicious software. We know it’s bad.

When it comes to malware threats, there are no sacred cows. Not little old ladies. Not Pope Francis. Anything and everything is fair game for infection and has most likely been compromised at some point in time. In addition to the usual slate of victims such as financial institutions, government agenciesmedia websitesretail outlets and nuclear power plants (really!), some telling examples include hospitals, schools, senior citizens and churches.