Security Series: Passwords
This is the first post in our series on various aspects of security. Now, we take the first step into the digital world and begin exploring the universe of passwords.
It’s easy to imagine that all IT attacks are sophisticated, exploiting unknown security vulnerabilities (so-called 0-days), or that systems are not updated to patch known security holes.
In IT attacks, it’s typically either excessive exposure of non-exposed systems or the use of weak and leaked passwords that constitute the vulnerabilities.
Read On →