change 41 percent of Germans on their own initiative, not their access codes for online accounts, e-mail accounts, auction platforms, PCs or mobile phones. The led a representative Forsa survey commissioned by the industry association Bitkom . Only one in six (17 percent) changes its key identification numbers and passwords at least once a quarter. "Pays Passwords are not loyal - the most important passwords should be changed every three months," commented Dieter Kempf Bitkom by the Bureau of the survey.
display
Every Twelfth (8 percent) changed their access codes every few years, one in nine (11 percent) at least annually. 6 per cent change their passwords every six months on average, 9 percent quarterly, 7 percent a month, every hundred a week at all. Women change their evaluation according to the most important passwords less frequently than men: 45 percent never do (men: 38 percent), only 12 percent at least once a quarter (men: 24 percent). Sensitized Bitkom are loud but teenagers and young adults up to 29 years. This group is one in four (27 percent) change its key passwords at least quarterly. However, seniors are lazy: In people over 60 years is only around 4 percent.
display
Every Twelfth (8 percent) changed their access codes every few years, one in nine (11 percent) at least annually. 6 per cent change their passwords every six months on average, 9 percent quarterly, 7 percent a month, every hundred a week at all. Women change their evaluation according to the most important passwords less frequently than men: 45 percent never do (men: 38 percent), only 12 percent at least once a quarter (men: 24 percent). Sensitized Bitkom are loud but teenagers and young adults up to 29 years. This group is one in four (27 percent) change its key passwords at least quarterly. However, seniors are lazy: In people over 60 years is only around 4 percent.
"private users and businesses are required. The company should set the PCs to their employees so that passwords must be changed regularly. It should also provisions regarding the minimum length and difficulty to give the password," says Kempf. Last published Bitkom Earlier this month a study on passwords, which share 37 percent of private passwords for your PC, Internet sites and company to others.
Recent cases show how the choice of the password, the resistance can influence each crack attempts. Thus, the FBI has a report the Brazilian TV channel Globo twelve months, according to a tough time with a dictionary attack on a TrueCrypt-encrypted container by the teeth. The FBI had received the files from the Brazilian authorities after they are already 5 months had tried it. The file was made by the accused of fraudulent transactions banker Daniel Dantas.
On the other side is just a French hacker acquitted who gains illegal access to a number of user accounts of text-messaging service Twitter - including also to those of Barack Obama and Britney Spears. The access he succeeded because he had guessed the passwords of Twitter Admins and with (then) available support tools Tweets could publish any accounts.
Whether a long time and cryptic passwords and protect a regular exchange account for more than short, but not easily guessed, depends on the particular application. In the case of Truecrypt vs dictionary attacks certainly worth a long password with special characters and trappings. Also, the Twitter admins would have probably been enough to repel the attack targeted. Instead, they can disclose personal information such as names and the like were getting in the passwords that could be out more about social networking sites.
The home is rarely under direct fire, as about one untargeted dictionary attack for criminals too much outlay. In addition, block or impair many websites further login attempts after a certain number of failures. Significantly more likely to get lost passwords from phishing attacks - and since then helps hunderstelliges no password anymore. After all, the use of different passwords for different page then limit the damage.
Is the PC, however help with a password-stealing Trojans (like ZeuS ) infected, and no more. For then the Trojans will read anyway with everything. After all, could be a regular password changes bring the crooks out of step: Because they can not misuse in real time the data or share goes to the misuse of the data some time. . You switch (despite knowing the infection) view the data, runs the login attempt by fraudsters to nothing source (
0 comments:
Post a Comment