Kangaroo-related passwords
Everyone loves a good story. And every time a cyber security breach occurs, the pros spring into action, attempt to recover what was stolen, and deal with the aftermath. Perhaps one day I'll blog about a few of those incidents, because there's some fascinating stories to be told!
For now over this cup of coffee, a thought occurred to me: Troy Hunt's blog on info stealer malware logs is readable on multiple levels. I hadn't considered this earlier, but the information he often writes about can be used by individuals who are tech-curious, right through to professionals in cyber, IDAM, etc.
For example, how many times have you explained the perils of malware on the interwebs to non-tech friends and family and wished for written resources and advice to point them at? Amanda-Jane Turner also has a fantastic set of resources for that.
Troy's opening paragraph in that blog is ideal for this purpose. He states quite clearly a few simple actions which could lead to passwords being stolen, complete with a screenshot of a set of email addresses and passwords (with the private details blanked out, of course). The next time you're attempting to explain to someone why it's a bad idea to install untrusted apps on your phone, tablet or laptop, just show them that opening paragraph!
..and for professionals he goes into using his API to check corporate domain emails for passwords that might need rotation. He also points out that interestingly, info stealer logs are a slow, continuous burn rather than a big bang (after a data breach, eg).
And lastly, there's some kangaroo-related passwords for everyone's amusement. Everyone loves a kangaroo! Well, maybe not everyone apparently, judging by one of those passwords...
Comments
Post a Comment