Search Results

Free tool KeePass 2 Portable: free open source password manager Almost no one escapes from the hacker, who goes on the hunt for passwords. To avoid trouble will be possible only to those who keeps their passwords on a flash drive in encrypted form. Many firms have been victims of hackers who stole millions of […]

Google has warned its customers about the need to use different passwords for different services, strive to make your passwords as complicated and in any case not to give access to information to outsiders. Do not forget about the possibility of a painless password recovery, just in case, in case you forget it. Researchers believe […]


Posted: March 4, 2013 in Articles
Tags: ,

The reliable password – guarantee of safety on the Internet. To create it to follow a few simple rules, but surprisingly many ignore them, and the triple world’s most popular passwords looks like: “password”, “monkey” and “123456”. Why passwords are important?

Passware Kit 12.3 – recovering all kinds of lost or forgotten passwords with hardware acceleration. Company Passware, which specializes in tools for password recovery, has released a new version of its flagship product, Passware Kit 12.3 for forensic and other tasks. This version supports password recovery for the first time to the popular web-services from […]

In the course of work botnets and bank trojans there is a collecting a large number of passwords. Usually only registration data from financial services, such as online banking are interesting to malefactors. What to do with other information, not to vanish it. The known researcher in the field of IT safety Brian Krebs learned, […]

The company Splash Data analyzed publicly available user data leakage and made Top-25 most common user passwords. Conclusion of funny and disturbing at the same time: in spite of warnings, users still continue to use very simple passwords, such as password, 123456 or 12345678. In Splash Data say that to rank the most popular passwords […]

Anonymous said that the banking user information is stored in an unencrypted form. According to the anonymous user on the web-site Full Disclosure, portal bank Santander maintains confidential financial information to users in plain text in a cookie. The independent expert learned that when you visit the various sections of the resource (which already […]

Tags: Windows 8, vulnerability, authentication Administrator Windows 8 can reveal the passwords of other users. Company experts Password Recovery Software (PRS) have discovered a serious vulnerability in the new Windows 8 authentication mechanisms. It is about authentication methods through photographs and a PIN. Note that authentication with pictures in Windows 8 allows the user to […]

Detecting intrusions of your network can sometimes be difficult. You can’t assume it’s a big, catastrophic event. In fact, hackers would prefer that you never notice at all. Here are five signs to be on the lookout for. Your Firewalls or Anti-virus Software Are Disabled If you find that they’re been turned off, it may […]

When operating a business, you want to protect the integrity of it as much as possible. This is especially true for the sensitive information handled on computer networks, such as personal information about employees and clients. You need to make sure your network security is up to snuff and not vulnerable. Here are five network […]