Big Changes For Yahoo-Hosted Email
Frontier has been sending messages to its customers saying that the company has noticed their use of “a lower security sign-in that is sometimes used in third-party mail applications such as Outlook, IncrediMail, MacMail, Mozilla Thunderbird and others.” The message is somewhat vague and misleading. It gives the impression that these “third-party” tools don’t encrypt […]
How Can We Create Secure Passwords?
What makes a password secure? We have to keep the bad guys out while letting the legitimate user in. We need to protect authentication and prevent user identity masquerading or spoofing, so it must be impractical for the attacker to guess it. I didn’t say “impossible” because any string could be guessed eventually. But impractical, […]
Password Rules Accomplish Things, But Not Necessarily What You Expect Or Want
I am very skeptical of passwords. Rules for password length and complexity may offer a feeling that you are behaving safely but they provide much less security than promised. As we see in Learning Tree’s Cloud Security Essentials course, the major cloud providers configure their Linux servers providing the majority of the cloud Infrastructure-as-a-Service so […]