Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Comic Con, Dark Reading Version
Oldest First  |  Newest First  |  Threaded View
RyanSepe
RyanSepe,
User Rank: Ninja
9/14/2015 | 12:36:15 PM
#2
#2 is pretty hilarious and also makes me wonder if password strength could be any different in Chinese? That is if they were to incorporate all 3000 characters. I know they don't because that would be a daunting task and take a year to write one page of anything. But just food for thought.
mumbles76
mumbles76,
User Rank: Apprentice
11/6/2015 | 10:37:23 PM
Chinese Passwords.
Depending on which dynasty and period of history, there were as much as 55,000 Chinese characters. Today there are just about 7000 in literature.

Speaking-wise,  the average Chinese citizen has memorized between 2600 and 5000 for normal usage.

The reality is, chinese use a lot of ascii characters for their passwords, 123456 is just as common there as it is here due to the laziness factor around the world. Typing 123456 in Chinese takes more time than it does in ascii form.

There are cultural factors at play as well, 8 is a lucky number in Chinese culture, therefore it's used a lot. '168' combination has some lucky meaning behind it as well. A lot of passwords are pinyin (Chinese spelled out in English) and other phonetic translations into ascii.

I found this after you piqued my interest in the subject (Warning: Extremely thorough):

researchgate.net/publication/269101022_Understanding_Passwords_of_Chinese_Users_Characteristics_Security_and_Implications

 

 

 

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-39252
PUBLISHED: 2022-09-29
matrix-rust-sdk is an implementation of a Matrix client-server library in Rust, and matrix-sdk-crypto is the Matrix encryption library. Prior to version 0.6, when a user requests a room key from their devices, the software correctly remembers the request. When the user receives a forwarded room key,...
CVE-2022-39254
PUBLISHED: 2022-09-29
matrix-nio is a Python Matrix client library, designed according to sans I/O principles. Prior to version 0.20, when a users requests a room key from their devices, the software correctly remember the request. Once they receive a forwarded room key, they accept it without checking who the room key c...
CVE-2022-38732
PUBLISHED: 2022-09-29
SnapCenter versions prior to 4.7 shipped without Content Security Policy (CSP) implemented which could allow certain types of attacks that otherwise would be prevented.
CVE-2022-40407
PUBLISHED: 2022-09-29
A zip slip vulnerability in the file upload function of Chamilo v1.11 allows attackers to execute arbitrary code via a crafted Zip file.
CVE-2022-40408
PUBLISHED: 2022-09-29
FeehiCMS v2.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted payload injected into the Comment box under the Single Page module.