by Richard Barrus | Apr 18, 2019 | InfoSec Strategies
Reading Time: 2 minutes
We’re celebrating “Password Month” throughout April 2019 here on the Pivot Point Security blog. This is the first of 5 blogs counting down our Top Ten Tips for stronger password security. Let’s jump right in at #10! All Passwords Are...
by Richard Barrus | Apr 16, 2019 | InfoSec Strategies
Reading Time: 2 minutes
Data security breaches constantly impact popular social media sites, online service providers, retailers and other companies that many of us share personal data with. So… are our login credentials and other personal data still...
by Richard Barrus | Mar 19, 2019 | InfoSec Strategies
Reading Time: 2 minutes
Even this era of near-daily data breach headlines, the Collection 1 trove gives one pause. What is being called the largest public breach ever is apparently just the tip of a gargantuan, 4TB iceberg of unique emails and passwords,...
by Terry Crowley | Nov 22, 2016 | Penetration Testing
Reading Time: 2 minutes
On a recent network penetration test our password catcher software sniffed out a service account logging in and caught its credentials. The hashed password we retrieved was nine characters long. With our homemade password cracking...
by Richard Barrus | May 19, 2016 | ISMS Consulting
Reading Time: 2 minutes
Taking note of the recent alleged Spotify hack and associated compromised Spotify accounts, I checked out the customer data that the fraudsters had posted to Pastebin. The dump included usernames/email addresses and passwords. What...