Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'Starwars' Debuts on List of Worst Passwords of 2017
Newest First  |  Oldest First  |  Threaded View
REISEN1955
REISEN1955,
User Rank: Ninja
1/5/2018 | 12:05:58 PM
Re: My recommendation
True enough about hobbies in general.  The vocabulatory and usage combinatoins is what does count.  You can like history enough to choose a segment of it as a small dictionery reference tool, i.e. words and numbers used in combination plus odd characters.  Ok, easy enough - but the combinations are what DOES matter.  And those can be astronomical indeed.  I have about 10 password combos in use at any one time --- but they are composed of words-numbers-char that are very difficult to crack unless you know my base logic which I am not spekaing of here for obvious reasons. 
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
12/23/2017 | 5:51:26 PM
Re: My recommendation
@REISEN: Eh. Hobbies aren't necessarily *that* unique. People who pay any attention to me on social, for example, have an idea of the kind of stuff I'm into.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
12/23/2017 | 5:50:22 PM
Re: Password Complexity Policy
@Ryan: Yeah, but what's even worse are IT-enforced security questions where you can only choose from a very short list of questions to which the answers are easily found or guessed.
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
12/23/2017 | 5:49:23 PM
Re: My recommendation
@RyanSepe: Unless your hobbies *are* Star Wars-related...

The problem with using hobbies as the basis of passwords is that, often, hobbies are at least somewhat public in this day and age.
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
12/19/2017 | 10:30:43 AM
Re: Bill Murray
...pretty sure he used the tune from "The Love Boat."
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
12/19/2017 | 10:22:44 AM
Bill Murray
For some strange reason, I keep hearing Bill Murray's lounge lizard sketch on SNL, where he crooned that silly "Star Wars" song.
REISEN1955
REISEN1955,
User Rank: Ninja
12/19/2017 | 9:43:40 AM
Re: My recommendation
Precisely - hobbies are UNIQUE and we all REMEMBER them very well.  You can use an abundance of tech terms whether history or just simple knitting and bunch together with any special character and there is a solid password without revealing ANY family details to give it away.  
RyanSepe
RyanSepe,
User Rank: Ninja
12/19/2017 | 9:38:29 AM
Re: My recommendation
It is a matter of retention and complexity. Ships work for you and the same can be said for others. Mold your hobbies into a passphrase is a much better practice than 'starwars'.
RyanSepe
RyanSepe,
User Rank: Ninja
12/19/2017 | 9:36:53 AM
Password Complexity Policy
For every single password in this list, it is abundantly transparent for why enforcing password complexity is paramount. Left to ones own devices many would create a password that could be cracked in a matter of seconds.
REISEN1955
REISEN1955,
User Rank: Ninja
12/19/2017 | 9:00:35 AM
My recommendation
Users like passwords that are easy to remember - and this list certainly qualifies for dumb and dumber.  So for my 2 cents, everyone has a HOBBY - something unique to us that WE know and enjoy.  For me it is history and ships and there are any number of unique combinations I can mold data INTO to make a secure password and I WILL NEVER FORGET IT.  Easy. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-45217
PUBLISHED: 2022-12-07
A cross-site scripting (XSS) vulnerability in Book Store Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Level parameter under the Add New System User module.
CVE-2022-39044
PUBLISHED: 2022-12-07
Hidden functionality vulnerability in multiple Buffalo network devices allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and ea...
CVE-2022-40966
PUBLISHED: 2022-12-07
Authentication bypass vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to bypass authentication and access the device. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and earlier, WHR-HP-GN fir...
CVE-2022-42458
PUBLISHED: 2022-12-07
Authentication bypass using an alternate path or channel vulnerability in bingo!CMS version1.7.4.1 and earlier allows a remote unauthenticated attacker to upload an arbitrary file. As a result, an arbitrary script may be executed and/or a file may be altered.
CVE-2022-45910
PUBLISHED: 2022-12-07
Improper neutralization of special elements used in an LDAP query ('LDAP Injection') vulnerability in ActiveDirectory and Sharepoint ActiveDirectory authority connectors of Apache ManifoldCF allows an attacker to manipulate the LDAP search queries (DoS, additional queries, filter manipulation) durin...