Friday, November 11, 2016

How it works the new program that guesses the passwords – Daily ONE Among Rivers

The ease or difficulty for a password to be hacked, depends, in large part, the commitment to put the user into creating it. And while this is not new and is repeated until the fatigue, many are still using the names of relatives, pets, as well as dates of birthdays or anniversaries for passwords.

In a world where everything is digitized, it is enough with a tour of the social networks to be able to detect these data and test the different possible combinations. Clear that to do so manually can be time-consuming. But this search can be automated to arrive at a result virtually foolproof.

Researchers from the universities of Lancaster, Peking and Fujian Normal University developed a system that allows you to guess passwords with a 73% effectiveness.

The program, called TarGuess, tracks all the personal data of the users in the network, processes them, and begins to test possible combinations.

A certain amount of errors in the passwords, just to take care of the safety of its users.

To avoid this inconvenience, the program systematizes the typical scenarios likely using seven mathematical models that are based on the data of the user. These models identify patterns, are used to design algorithms that are more efficient and innovative.

The researchers used data from the Yahoo accounts hacked, and then test the effectiveness of the system in other sites.

The most common passcodes that are found the developers were: 123456, password, welcome, ninja, among others.

The conclusion of this work is that users must work harder to think of a password as with some algorithms it is possible to violate the accounts.

“The critical point is how the people define their passwords with exposure in digital terms. That is why we are going to begin to charge more force developments based validation, multi factor where at least two factors be biometric,” stressed Carlos Aramburu, general manager of Intel Security.

Source: INFOBAE

‘); } var _aep = _aep || []; (function(d, s, c) { var getTimestamp = function() { var date = new date(); return (’00′ + date.getFullYear()).slice(-2) + (’00′ + date.getMonth()).slice(-2) + (’00′ + date.getDate()).slice(-2); }; _aep.push(['tag', '582210e77dc7d10300ca678b', { /* add optional custom config here */ }]); var f = d.createElement(s); f.src = (d.location.protocol == ‘https:’) ? c. replace(‘http:’, ‘https:’).replace(‘//akfs’, ‘//s-akfs’) : c+ ‘?r=’ + getTimestamp(); var e = d.getElementsByTagName(s)[0]; e.parentNode.insertBefore(f, e); })(document, ‘script’, ‘//akfs.nspmotion.com/aep/tag/ar/582210e77dc7d10300ca678b.cfg.js’);

LikeTweet

No comments:

Post a Comment