Kangaroo-related passwords

Everyone loves a good story. And every time a cyber security breach occurs, the pros spring into action, attempt to recover what was stolen, and deal with the aftermath. Perhaps one day I'll blog about a few of those incidents, because there's some fascinating stories to be told! For now over this cup of coffee, a thought occurred to me: Troy Hunt's blog on info stealer malware logs is readable on multiple levels. I hadn't considered this earlier, but the information he often writes about can be used by individuals who are tech-curious, right through to professionals in cyber, IDAM, etc. For example, how many times have you explained the perils of malware on the interwebs to non-tech friends and family and wished for written resources and advice to point them at? Amanda-Jane Turner also has a fantastic set of resources for that . Troy's opening paragraph in that blog is ideal for this purpose. He states quite clearly a few simple actions which could lead to passwor...