<?xml version="1.0"?>
            <rss version="2.0">
                <channel>
                    <title>Healthy Passwords News</title>
                    <link>http://www.healthypasswords.com/RSS.html</link>
                    <description>Technical news pertaining to Healthy Passwords translated for non-technical people</description>
                    <language>en-us</language>
                    <pubDate>Wed, 24 Feb 2016 01:56:24 -0500</pubDate>
                    <lastBuildDate>Wed, 24 Feb 2016 01:56:24 -0500</lastBuildDate>
                    <docs>http://blogs.law.harvard.edu/tech/rss</docs>
                    <managingEditor>managingeditor@healthypasswords.com</managingEditor>
                    <webMaster>webmaster@healthypasswords.com</webMaster>
            
<item><title>Lastpass Adds Windows Phone 7 App Features</title>
                    <link>http://www.healthypasswords.com/Authentication.Third-Party.20111201083711.news.MiddleCenter.html</link>
                    <description>&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/LastPass_Nov28.png&quot; alt=&quot;Lastpass Pin Code Prompt Image&quot;/&gt;&lt;br/&gt;

&lt;p&gt;Lastpass just added a security improvement feature to their Windows Phone 7 app.  Users can now enable a &quot;pin code prompt&quot;.  Enabling this requires a pin after switching to another app and returning to lastpass.  &lt;/p&gt;

&lt;p&gt;All previous lastpass security remains unchanged.  According to the lastpass blog: You can enable the pin code prompt in your app settings so that when multitasking back to the LastPass app, you're prompted to enter your 4-digit code. This provides an extra layer of security that's more manageable on your Windows Phone 7, since you won't have to re-enter your master password each time you reopen the app.&lt;/p&gt;

&lt;p&gt;To enable the pin code prompt, login to the LastPass app to view your LastPass vault. Tap the ellipses (three dots) at the bottom of the screen to expand the menu options. Tap the &quot;set pin code&quot; option, and enter a 4-digit pin code. The next time you multitask away from and back to the LastPass app, you'll enter this pin code to regain access.&lt;/p&gt;

&lt;p&gt;They also report that if you've enabled Google Authentication and are using it to login to the LastPass mobile app, they've improved support for switching apps when entering the Google Auth login code. &lt;/p&gt;





</description>
					<pubDate>Thu, 01 Dec 2011 08:37:11 -0500</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Third-Party.20111201083711.news.MiddleCenter.html</guid>
                </item>

<item><title>UN Hack Exposes More Weak Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111130075733.news.MiddleCenter.html</link>
                    <description>&lt;img width=&quot;30%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/UnBreachWordCloud.png&quot; alt=&quot;Word Cloud of UN Top Ten Passwords&quot;/&gt;&lt;/br&gt;
&lt;br&gt;Credit word cloud to &lt;a href=&quot;http://www.wordle.net/create&quot;&gt;worldle.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;On Monday, the hactivist group TeaMpoiSon posted 857 usernames and passwords for members of the United Nations Development Programme (UNDP), Organisation for Economic Co-operation and Development (OECD), UNICEF, World Health Organisation (WHO) and other groups.&lt;/p&gt;

&lt;p&gt;The top ten passwords used were: &lt;/p&gt;
&lt;p&gt;Note: This small list of 857 usernames, email and passwords was so small several passwords hit the top ten that were probably from users with multiple accounts or admins.  We've removed these from the list.&lt;/p&gt;

&lt;pre&gt;

12345
PASSWORD
123
samurai
sn
test
undp
welcome
111
114
&lt;/pre&gt;

&lt;p&gt;We checked both pwnedlist and shouldichangemypassword.com this morning and neither found emails on this list.  We notified both sites of the list so they can load them.&lt;/p&gt;


&lt;p&gt;&lt;em&gt;Update&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Eweek Europe is reporting:&lt;br/&gt;
UNDP spokeswoman, Sausan Ghosheh, told the BBC that the hacked server, which goes back to 2007, contained old data and no active passwords.  “The UNDP found [the] compromised server and took it offline. Please note that UNDP.org was not compromised.” Reference: &lt;a href=&quot;http://www.eweekeurope.co.uk/news/un-was-not-compromised-in-teampoison-hack-47763&quot;&gt;eWeek Europe&lt;/a&gt;.  The eWeek article also quotes a US security expert, whom we agree with.  This list exposes email addresses and passwords.  Most people admit to reusing passwords at many sites.  &lt;/p&gt;
&lt;/p&gt;


</description>
					<pubDate>Wed, 30 Nov 2011 07:57:33 -0500</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111130075733.news.MiddleCenter.html</guid>
                </item>

<item><title>25 Worst Passwords of 2011</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111118161352.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.pcworld.com/article/244288/123456_the_worst_passwords_of_2011.html&quot; target=&quot;_blank&quot;&gt; PCWorld&lt;/a&gt;, a recent survey from SplashData compiled the 25 worst passwords of 2011.  This was determined by analysis of publicly disclosed breach data.&lt;/p&gt;

&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;password &lt;/li&gt;
&lt;li&gt;123456 &lt;/li&gt;
&lt;li&gt;12345678 &lt;/li&gt;
&lt;li&gt;qwerty &lt;/li&gt;
&lt;li&gt;abc123 &lt;/li&gt;
&lt;li&gt;monkey &lt;/li&gt;
&lt;li&gt;1234567 &lt;/li&gt;
&lt;li&gt;letmein &lt;/li&gt;
&lt;li&gt;trustno1 &lt;/li&gt;
&lt;li&gt;dragon &lt;/li&gt;
&lt;li&gt;baseball &lt;/li&gt;
&lt;li&gt;111111 &lt;/li&gt;
&lt;li&gt;iloveyou &lt;/li&gt;
&lt;li&gt;master &lt;/li&gt;
&lt;li&gt;sunshine &lt;/li&gt;
&lt;li&gt;bailey &lt;/li&gt;
&lt;li&gt;bailey &lt;/li&gt;
&lt;li&gt;passw0rd &lt;/li&gt;
&lt;li&gt;shadow &lt;/li&gt;
&lt;li&gt;123123 &lt;/li&gt;
&lt;li&gt;654321 &lt;/li&gt;
&lt;li&gt;superman &lt;/li&gt;
&lt;li&gt;qazwsx &lt;/li&gt;
&lt;li&gt;michael &lt;/li&gt;
&lt;li&gt;football &lt;/li&gt;
&lt;/ol&gt;
&lt;/p&gt;


</description>
					<pubDate>Fri, 18 Nov 2011 16:13:52 -0500</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111118161352.news.MiddleCenter.html</guid>
                </item>

<item><title>Finland Citizens Urged to Change Online Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111114104615.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/FinlandMap.png&quot; alt=&quot;Finland Map&quot;/&gt;&lt;br/&gt;The Finnish NBI (National Bureau of Investigation) is urging all Finns to change all passwords after a major leak this weekend.  Over 100,000 email addresses and 15,000 passwords were leaked on Saturday.  Officials fear more passwords will be leaked. &lt;/p&gt;

&lt;p&gt;According to &lt;a href=&quot;http://www.hs.fi/english/article/Finns+urged+to+change+online+passwords+after+thousands+leaked/1135269861024&quot; target=&quot;_blank&quot;&gt; The Helsingin Sanomat&lt;/a&gt;, the Finnish computer publication MikroPC reports that some of the information has leaked from discussion forums operating on a phpBB2 platform.&lt;/p&gt;

&lt;p&gt;This highlights an important consideration for users everywhere.  Certain platforms are more &quot;vulnerable&quot; to hacking than others.  Canned third party web platforms such as PHPBB, Wordpress, Joomla, Drupal, and many more are evolving daily.  The teams working on these projects do a great job quickly patching vulnerabilities, but the websites running them must apply the patches on a regular basis, or they are left vulnerable.  &lt;/p&gt;

&lt;p&gt;Many small niche blogs and websites are run by by small staffs or  individuals in their spare time.  If one of these sites requires you to register with email and/or password, always use a junk email account and password for registration.  &lt;/p&gt;






</description>
					<pubDate>Mon, 14 Nov 2011 10:46:15 -0500</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111114104615.news.MiddleCenter.html</guid>
                </item>

<item><title>Steam Breach - Lots of Personal Data, little worry of password compromise</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111111001251.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img width=&quot;35%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/SteamBreach_010.png&quot; alt=&quot;SteamPowered.com Website Image&quot;/&gt;&lt;/p&gt;
&lt;p&gt;Steampowered.com, the website of over 1100 games has reported a breach: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The bad news is they are reporting an entire database compromise including user names, hashed and salted passwords, game purchases, email addresses, billing addresses and encrypted credit card information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The good news is passwords were salted and encrypted, making it very difficult to obtain the password, and credit card data was encrypted.  
&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The following announcement was sent to users
&lt;pre&gt;
Dear Steam Users and Steam Forum Users,

Our Steam forums were defaced on the evening 
of Sunday, November 6. We began investigating 
and found that the intrusion goes beyond the
Steam forums.

We learned that intruders obtained access to 
a Steam database in addition to the forums. This 
database contained information including user 
names, hashed and salted passwords, game purchases, 
email addresses, billing addresses and encrypted 
credit card information. We do not have evidence 
that encrypted credit card numbers or personally 
identifying information were taken by the intruders, 
or that the protection on credit card numbers or 
passwords was cracked. We are still investigating.
&lt;/pre&gt;

&lt;p&gt;Sophos' recommendation to users is perfect, we're going to Copy and Paste it: ( Credit: &lt;a href=&quot;http://nakedsecurity.sophos.com/2011/11/11/steam-goes-public-on-data-breach-but-will-it-delay-the-launch-of-skyrim/&quot; target=&quot;_blank&quot;&gt;Sophos report on Steam breach&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Change your Steam password, just in case. If you were using a weak password before, take this opportunity to choose a decent one.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Keep an eye on your credit card statement and report any unexpected transactions.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; Consider not storing your credit card data on Steam's servers. You don't have to. You can choose to enter it every time you need it instead.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Consider enabling Steam Guard. If you do, Steam will email you every time you (or someone else) logs in from someone else's computer.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Send an email to Steam asking why they encrypted credit card data and passwords, but apparently not the rest of its users' personally identifiable information.&lt;/li&gt;&lt;/p&gt;
&lt;/ul&gt;

&lt;p&gt;If Steam truly did salt passwords, passwords changes may not be necessary.  It's better to be safe than sorry.&lt;/p&gt; 





</description>
					<pubDate>Fri, 11 Nov 2011 00:12:51 -0500</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111111001251.news.MiddleCenter.html</guid>
                </item>

<item><title>New Website May Find Your Insecure Password Before Most Hackers Do</title>
                    <link>http://www.healthypasswords.com/Breach.Authentication.20111104230454.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img width=&quot;25%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/pwnedList.png&quot; alt=&quot;Pwnedlist.com logo&quot;/&gt;
A new site, pwnedlist.com, now has spiders crawling the web looking for breached or vulnerable password lists.  The site was created by Alen Puzic and Jasiel Spelman, two security researchers from DVLabs, a division of HP/TippingPoint.&lt;/p&gt;

&lt;p&gt;According to the site's &lt;a href=&quot;https://pwnedlist.com/learn&quot;&gt;&quot;learn&quot; page&lt;/a&gt;, the site does not keep any email data submitted through queries (no phishing).  The little they reveal about site architecture is great.  We are big fan of Amazon Simple DB (SDB) and feel it's the one the least vulnerable database platforms a website can use.  &lt;/p&gt;

&lt;p&gt;For the truly skeptical, the site enables users to submit their email as an SHA-512 hash &lt;a href=&quot;http://www.healthypasswords.com/content.What_are_hashes_and_Rainbow_Tables.html&quot;&gt;See what are hashes and rainbow tables&lt;/a&gt;.  &lt;/p&gt;

&lt;p&gt;We tested a known bad email from a recent hack and it did not show up in the database.  In fairnmess, the same address was not found in shouldichangemypassword.com either.&lt;/p&gt;

&lt;p&gt;The sites domain was registered in June 2011 under a proxy service, which is very common and does not raise any flags.  The founder is a well respected and active member of the security community.  All timelines on personal and business twitter feeds correlate properly.  We started this article on November 1st, and submitted some questions to the website.  In the three days that followed we've received no response, but at least dozen publications have reported on pwnedlist.com, including Brian Krebs and Kaspersky Labs. &lt;/p&gt;


&lt;p&gt;Every indication points to pwnedlist.com being a great resource.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Related Stories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://threatpost.com/en_us/blogs/got-pwned-pwnedlistcom-knows-102711&quot; target=&quot;_blank&quot;&gt; Kaspersky Labs ThreatPost&lt;/a&gt; has the only real interview with founder, Alen Puzic as of 04-Nov-2011.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://krebsonsecurity.com/2011/11/are-you-on-the-pwnedlist/&quot; target=&quot;_blank&quot;&gt;Brian Krebs&lt;/a&gt; has a good article geared toward the more technical crowd.&lt;/p&gt;



</description>
					<pubDate>Fri, 04 Nov 2011 23:04:54 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Authentication.20111104230454.news.MiddleCenter.html</guid>
                </item>

<item><title>Lying about your Name or Age on the Internet May Get Difficult</title>
                    <link>http://www.healthypasswords.com/Authentication.Authentication.20111101230559.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/tru.ly.beta.logo.png&quot; alt=&quot;tru.ly logo&quot;/&gt; A new service promises to accurately verify your name and age.  While this may not seem important for adults, for minors, this could be a huge advancement, although the site's terms requires persons to be 18 or older for verification.  &lt;b&gt;Update 1-Nov-2011&lt;/b&gt; Tru.ly co-founder, David Gordon told us that a new API version will be implemented for parental verification to setup minor accounts.&lt;/p&gt;  

&lt;p&gt;The site is currently in &quot;beta&quot;, which means it's allowing public testing, but not quite ready for production.  &lt;/p&gt;

&lt;p&gt;Tru.ly uses &quot;verification partners&quot; to authenticate your identity. This is done by matching your submitted information with that in a national database of government and public data. In order to become verified, specific pieces of information must match. They report to use proprietary technology to flag users who may be trying to conduct fraud.&lt;/p&gt;

&lt;p&gt;At this time the site asks for &lt;/p&gt;

&lt;pre&gt;
Email
Legal First Name
Legal Last Name
Last Four SSN digits
Birthdate
Permanent street addresss
Permanent zip code
&lt;/pre&gt;

&lt;p&gt;According to their website, Tru.ly's goal is to provide users with a single, verified identity on the internet.  The service enables verified users to generate their own QR code &lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/tru.ly.qr.code.png&quot; alt=&quot;qr code image&quot;/&gt; enabling users to provide an ID without divulging details.  How  this will be accomplished is not stated.  Tru.ly also promises a browser plugin to see what profiles are verified on social networks.  The plug in also has very limited details.  &lt;b&gt;Update 1-Nov-2011&lt;/b&gt;  We asked co-founder David Gordon about this, and he told us: &quot;We didn't see much traction on it so we took it down and will plan on relaunching it with a larger audience.&quot; &lt;/p&gt;

&lt;p&gt;Should you trust tru.ly with your identity?  We're not sure yet.  We see no warning flags.  No single piece of required information is highly sensitive alone, yet combined, they compromise more than many may wish to entrust to an internet company.   &lt;b&gt;1-Nov-2011 Update&lt;/b&gt; We asked co-founder David Gordon about this and he said: &quot;We use a high level SSL certification. user personal identifiable data is never stored on tru.ly servers. Third party accreditation is in process.&quot;&lt;/p&gt;

&lt;p&gt;To our knowledge tru.ly is the first company to offer such a service.  A March 2011 &lt;a href=&quot;http://www.nytimes.com/2011/03/12/technology/internet/12underage.html?pagewanted=all&quot; target=&quot;_blank&quot;&gt; estimate by ComScore&lt;/a&gt; surmised that 3.6 million of Facebook’s 153 million monthly visitors in the United States are under 12.  Facebook's terms of service require a minimum age of 14.  A large component of tru.ly's offering is an API (Application Programming Interface), businesses can use to verify someone's identity.  If Facebook, twitter, gambling, and adult content sites begin using the service, the internet may become a much safer place for kids.    &lt;p&gt;

&lt;p&gt;One complication with kids is raised when reviewing the tru.ly terms of service.  According to those terms, you must be at least 18 to be verified.  This leaves a four year gap between the Facebook policy and the tru.ly policy.&lt;/p&gt;
</description>
					<pubDate>Tue, 01 Nov 2011 23:05:59 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Authentication.20111101230559.news.MiddleCenter.html</guid>
                </item>

<item><title>Bloggtoppen.se 90000 Passwords Revealed </title>
                    <link>http://www.healthypasswords.com/Breach.Website.20111026070944.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img width=&quot;50%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/bloggtoppen.se.breach.password.wordcloud.png&quot; alt=&quot;Sweden Icon&quot;/&gt;Popular Swedish blogging site Bloggtoppen.se suffered a security breach compromising 90000 user passwords.  The attackers allegedly publicly announced the password file details using a compromised Twitter account William Petzall, a former scandalized politician.&lt;/p&gt;

&lt;p&gt;The passwords were encrypted using an unsalted MD5 hash.  (For more on hashes see &lt;a href=&quot;/content.What_are_hashes_and_Rainbow_Tables.html&quot;&gt;See what are hashes and rainbow tables.&lt;/a&gt;) This means that users who had a strong password are less vulnerable than users using weak passwords.  Strong passwords have mixed case, special characters, 10+ character length, no dictionary words. (&lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_Qualities_of_a_Strong_Password.html&quot;&gt;See qualities of a strong password&lt;/a&gt;) According to analysis by &lt;a href=&quot;https://www.dlitz.net/blog/2011/10/most-common-losenord/&quot; target=&quot;_blank&quot;&gt;dlitz.net&lt;/a&gt;, the most common password from the file was &quot;super123&quot;.  &lt;/p&gt;

&lt;pre&gt;
#1  (995): super123
#2  (141): hejsan
#3  (118): 123456
#4  (111):
#5  (102): hejhej
#6  (96) : bajskorv
#7  (93) : sommar
#8  (69) : hemligt
#10 (60) : blomma
#11 (54) : dinmamma
#12 (52) : cocacola
#13 (51) : stockholm
#14 (50) : johanna
#15 (45) : kalleanka
#16 (44) : sverige
#17 (43) : mammapappa
#18 (43) : amanda
#19 (43) : losenord
#20 (43) : apelsin
#21 (41) : qwerty
#22 (41) : sommarlov
#23 (40) : hundar
#24 (39) : smulan
#25 (38) : iloveyou
#26 (38) : lösenord
#27 (38) : password
#28 (37) : abc123
#29 (35) : internet
#30 (35) : fotboll
**Analysis credit: https://www.dlitz.net/blog/2011/10/most-common-losenord/
&lt;/pre&gt;

&lt;p&gt;According to a notice at the site:&lt;/p&gt;
&lt;pre&gt;
Blog Top is closed until further notice due to system maintenance alleged hacking.
Unknown perpetrators have come across the user database with user names, email addresses
 and hashed passwords, which means that if you, the user has used the same login 
information for other services on the web so likely these accounts to be hijacked. We 
recommend all users to immediately change passwords on all accounts use the same login 
information here.

Further information will come when we have had time to investigate and resolve the 
interference.
&lt;/pre&gt;

&lt;p&gt; If you ever had an account at Bloggtoppen.se, and reuse passwords at multiple sites, start changing passwords.  Always start with your email password and work back from there.  Follow Healthy Password rules when creating your new passwords.&lt;/p&gt;





</description>
					<pubDate>Wed, 26 Oct 2011 07:09:44 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20111026070944.news.MiddleCenter.html</guid>
                </item>

<item><title>Order and Chaos Online Hacked</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111020094854.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img width=&quot;25%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/OrderAndChaosBanner.png&quot; alt=&quot;Order and Chaos Banner&quot;/&gt; &lt;br/&gt;
According to &lt;a href=&quot;http://toucharcade.com/2011/10/19/order-its-a-good-idea-to-change-your-passwords/&quot; target=&quot;_blank&quot;&gt;TouchArcade.com&lt;/a&gt;, online gaming site, Order and Chaos, has been hacked.  &lt;/p&gt;

&lt;p&gt;Users of all versions, including facebook and mobile, are reporting compromised accounts.  &lt;/p&gt;

&lt;p&gt;If you have ever used this site, or the Gameloft live service, and share passwords, change your passwords.  Start with email and work back from there.  As always, remember to follow healthy password rules&lt;/p&gt;





</description>
					<pubDate>Thu, 20 Oct 2011 09:48:54 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111020094854.news.MiddleCenter.html</guid>
                </item>

<item><title>iPhone 4s Siri Bypasses Password Security</title>
                    <link>http://www.healthypasswords.com/Vulnerability.IOS.20111020090143.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img width=&quot;20%&quot;  src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/iPhone4s.png&quot; alt=&quot;iPhone 4s&quot;/&gt;&lt;br/&gt;Graham Cluley of Sophos exposed a new iPhone vulnerability in a &lt;a href=&quot;http://nakedsecurity.sophos.com/2011/10/19/siri-iphone-4s-unlocked/&quot; target=&quot;_blank&quot;&gt;blog post&lt;/a&gt; yesterday. &lt;/p&gt;

&lt;p&gt;The vulnerability is with the new voice assistant Siri.  Siri will respond to any stranger while the phone is locked and bypasses some password security.&lt;/p&gt;

&lt;p&gt;Strangers can Compose and send email, compose and send text messages, and change calendar entries.&lt;/p&gt;

&lt;p&gt;Fixing the problem is easy by navigating to &quot;Settings/General/Passcode Lock&quot; and changing the Siri setting to OFF.&lt;br/&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/iPhoneSiriPasswordLock.png&quot; alt=&quot;Siri Password Off&quot;/&gt;&lt;/p&gt;





</description>
					<pubDate>Thu, 20 Oct 2011 09:01:43 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.IOS.20111020090143.news.MiddleCenter.html</guid>
                </item>

<item><title>A New Way to Steal Smart Phone Passwords</title>
                    <link>http://www.healthypasswords.com/Exploits.IOS.20111018095419.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/SmartPhoneImages.png&quot; alt=&quot;Smart Phone Collage&quot;/&gt;Researchers from Georgia Tech have found a way to triangulate your passwords by using your smart phone's accelerometer.  The accelerometer is a sensor that enables your phone's screen to re-orient itself when you turn the phone.  According to &lt;a href=&quot;http://www.technologyreview.com/computing/38913/?p1=A2&quot;&gt; an article in MIT Technology Review&lt;/a&gt;, it is possible for malware to determine your password with 80% accuracy when the password is entered with the device laying on a flat surface.&lt;/p&gt;

&lt;p&gt;You don't need to worry yet, but in the near future, it may be &quot;smart&quot; to only enter passwords into your smart phone while holding it in your not-so-steady hands.&lt;/p&gt;





</description>
					<pubDate>Tue, 18 Oct 2011 09:54:19 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Exploits.IOS.20111018095419.news.MiddleCenter.html</guid>
                </item>

<item><title>Fake Android Netflix App Steals Credentials</title>
                    <link>http://www.healthypasswords.com/Malware.Mining.20111013201302.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img width=&quot;15%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/AndroidNetflixAppPirate.png&quot; alt=&quot;Android Netflix Pirate&quot;/&gt;A new credential stealing fake Android Netflix app is floating around.  The app looks nearly identical to the real one.  Instead of taking you to content, the app will just ask you to authenticate.  &lt;p&gt;

&lt;p&gt;If you've recently installed the netflix android app and failed to see your content, get to netflix right away an change your credentials.  Also change passwords at any other sites sharing that password.  Always start with your email and work down from there.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/AndroidNetflixAppCompare2.png&quot; alt=&quot;Fake Netflix Android Screen Comparison&quot;/&gt; Credit: &lt;a href=&quot;http://www.symantec.com/connect/blogs/will-your-next-tv-manual-ask-you-run-scan-instead-adjusting-antenna&quot;&gt;Symantec.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Netflix customers that are looking for a legitimate Android Application developed by Netflix, Inc. can find it on the official Android Market. Downloading from trusted sources is part of practicing good security for your mobile device.&lt;/p&gt;









</description>
					<pubDate>Thu, 13 Oct 2011 20:13:02 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Malware.Mining.20111013201302.news.MiddleCenter.html</guid>
                </item>

<item><title>BlueHomes.com breached over 150,000 plain text passwords exposed</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111012232356.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/bluehomes.png&quot; alt=&quot;bluehomes.com logo&quot;/&gt; Over 150,000 plain text passwords and usernames were breached from popular European properties site, bluehomes.com.  The hacker posted a link to the dump on pastebin yesterday.  The hacker claims the dump contains more than 500,000 passwords, but our best estimate is more like 150,000&lt;/p&gt;

&lt;p&gt;&lt;img width=&quot;50%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/bluehomes_wordcloud.png&quot; alt=&quot;bluehomes.com wordcloud&quot;/&gt; *Wordcloud credit &lt;a href=&quot;wordle.net&quot; target=&quot;_blank&quot;&gt;wordle.net&lt;/a&gt;&lt;br/&gt;*Note: pure numeric passwords were omitted.&lt;/p&gt;

&lt;p&gt;In addition to usernames and passwords, the dump also includes over 80 megabytes of sensitive customer, employee data, and infrastructure data.  &lt;/p&gt;





</description>
					<pubDate>Wed, 12 Oct 2011 23:23:56 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111012232356.news.MiddleCenter.html</guid>
                </item>

<item><title>Patch Tuesday Again</title>
                    <link>http://www.healthypasswords.com/Patches.Microsoft.20111012195437.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Windows users need to remember to check that windows last night or sometime in the next day or two.  This patch Tuesday Apple released an iTunes patch for Windows.  To get the iTunes patch, run iTunes.  &lt;/p&gt;

&lt;p&gt;The best reference for seeing what's included in patch Tuesday is &lt;a href=&quot;http://krebsonsecurity.com/2011/10/critical-security-updates-from-microsoft-apple/&quot; target=&quot;_blank&quot;&gt;Krebsonsecurity.com&lt;/a&gt;&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PatchTuesdayOct.png&quot; alt=&quot;Windows 7 64bit with Office 2010 update Screen&quot;/&gt;

&lt;p&gt;Corporate users may not see update notifications.  For more on how to update your Windows system, see &lt;a href=&quot;http://www.healthypasswords.com/content.How_to_Check_Windows_Update.html&quot;&gt; http://www.healthypasswords.com/content.How_to_Check_Windows_Update.html &lt;/a&gt;. &lt;/p&gt;




</description>
					<pubDate>Wed, 12 Oct 2011 19:54:37 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Patches.Microsoft.20111012195437.news.MiddleCenter.html</guid>
                </item>

<item><title>WineHQ breach exposes contributor usernames and passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111012100851.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/WineHQWebsite.png&quot; alt=&quot;WineHQ Website Banner&quot;/&gt; WineHQ is a website supporting Wine.  Wine lets user run Windows software on other operating systems. With Wine, users can install and run these applications just like they would in Windows.&lt;/p&gt;

&lt;p&gt;According to &lt;a href=&quot;http://www.thinq.co.uk/2011/10/12/winehq-breached-passwords-downloaded/&quot; target=&quot;_blank&quot;&gt;thinq.co.uk&lt;/a&gt;, &quot;This means that they have all of those emails, as well as the passwords,&quot; Jeremy White of project organiser CodeWeavers confirms in his mailing list post. &quot;The passwords are stored encrypted, but with enough effort and depending on the quality of the password, they can be cracked.&lt;/p&gt;

&lt;p&gt;This breach will impact a narrow band of technical users, who hopefully know better than to share usernames and passwords between sites.&lt;/p&gt;

</description>
					<pubDate>Wed, 12 Oct 2011 10:08:51 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111012100851.news.MiddleCenter.html</guid>
                </item>

<item><title>Sony breach impacts 93000 users</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111012095542.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PlaystationNetwork.png&quot; alt=&quot;Playstation Protection Logo&quot;/&gt;

Sometime between October 7 and October 10, The Sony Playstation Network detected a high volume of unauthorized logins.   Sony locked about 93,000 accounts whose IDs and passwords were successfully breached.&lt;/p&gt;

&lt;p&gt;Sony sent email notifications and password reset procedures to breached account holders.  Sony reports that no credit card data was taken&lt;/p&gt;

&lt;p&gt;If you have been notified by Sony, or hold a playstation network account, change your password and any other site passwords sharing the same user/password.  Always start by changing with your email.  Email is always the first target after any breach.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Update 2011-10-12 16:30 GMT&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;According to recent reports, the usernames and passwords used against the Sony network were not obtained from Sony, but from another source.  &lt;/p&gt;

&lt;p&gt;In an April breach, Sony was criticized for taking weeks to notify users.  In this case, Sony may have notified users with too little information.  Sony appears to be a target and not a source.  Playstation users should still take precautions and change passwords.  Hopefully Sony will provide the email addresses to security experts, who can bounce the attempted logins against known breach lists to determine the source.&lt;/p&gt; 

&lt;p&gt;&lt;em&gt;References&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://blog.us.playstation.com/2011/10/11/an-important-message-from-sonys-chief-information-security-officer/&quot; target=&quot;_blank&quot;&gt;Playstation blog entry&lt;/a&gt;&lt;/p&gt;
</description>
					<pubDate>Wed, 12 Oct 2011 09:55:42 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111012095542.news.MiddleCenter.html</guid>
                </item>

<item><title>Only 38% of account holders know how their account was compromised</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111007161545.news.MiddleCenter.html</link>
                    <description>&lt;img width='25%' src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/webmail_compromise_wordcloud.png&quot; alt=&quot;webmail target word cloud&quot;/&gt;

&lt;p&gt;According to &lt;a href=&quot;http://www.commtouch.com/state-of-hacked-accounts&quot; target=&quot;_blank&quot;&gt;recent research by commtouch&lt;/a&gt;, a leading messaging and Web security technology company, few account holders ever find out how their account was compromised.  A more alarming 23% of compromised account holders did nothing to remedy the problem. &lt;/p&gt;

&lt;p&gt;How was your account compromised?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;62% - Not sure&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;15% - Clicked Facebook Link&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;15% - Public WiFi&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;4% - Clicked on an Email Virus&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Only one in eight compromised email accounts resulted in the classic &quot;I'm stuck in a foreign country please send money&quot; message to friends.&lt;/p&gt;

&lt;p&gt;What was done with your Hacked account?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;54% - Send Spam&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;23% - Not Sure&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;12% - Scams&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;8% - Phony facebook post&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you hear your account was hacked?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;54% - Friends told me&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;31% - Noticed Myself&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;15% - Official Email from Provider&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you fix your hacked account?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;65% - Changed Password&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;31% - Ran Anti-Virus&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;23% - Did Nothing&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;








</description>
					<pubDate>Fri, 07 Oct 2011 16:15:45 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111007161545.news.MiddleCenter.html</guid>
                </item>

<item><title>Unijobs.com.au hack exposes over 600 passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Website.20111007091010.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/unijobs-dot-com-dot-au_logo.png&quot; alt=&quot;Unijobs.com.au logo&quot;/&gt;

The popular Australian university job website, UniJobs.com.au was hacked.  &lt;/p&gt;

&lt;p&gt;The usernames (email addresses) and hashed passwords (&lt;a href=&quot;/content.What_are_hashes_and_Rainbow_Tables.html&quot;&gt; what are password hashes&lt;/a&gt;)are posted on pastebin at &lt;a href=&quot;http://pastebin.com/Nrd8MaKD&quot; target=&quot;_blank&quot;&gt;http://pastebin.com/Nrd8MaKD&lt;/a&gt; yesterday.&lt;/p&gt;

&lt;p&gt;The post included MD5 hashes and plain text password for cracked passwords.  Most of the passwords in the list appeared to be the initial system generated passwords.  They were mostly six digit passwords using mixed case letters and numbers.  There were several dozen real passwords in the list.  These are the people who are probably vulnerable to other compromised accounts.  &lt;/p&gt;

&lt;p&gt;The post only showed 629 of the 780 cracked, but that appears to be where the cracking was at when the post occurred.  Most likely the rest of the list has been cracked by now.&lt;/p&gt;

&lt;p&gt;Because these posts quickly disappear from pastebin, we have posted just the email addresses &lt;a href=&quot;/content.unijobs_dot_com_dot_au_password_pastebin_email_addresses.html&quot;&gt;here &lt;/a&gt;.&lt;/p&gt;






</description>
					<pubDate>Fri, 07 Oct 2011 09:10:10 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20111007091010.news.MiddleCenter.html</guid>
                </item>

<item><title>Associated Press-MTV poll finds 3 in 10 teens and young adults impersonated online</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20111006095437.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.google.com/hostednews/ap/article/ALeqM5g1fEjazyzv-eNFrIVgX64hHzHHeg?docId=c42f19aa2f7749b6a78a6cf88dbaa2ad&quot; target=&quot;_blank&quot;&gt; the Associated Press&lt;/a&gt;, a new Associated Press / MTV poll found that 3 of 10 teens reported being impersonated or monitored online.&lt;/p&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/AP-MTV-YouthHackingPoll010.png&quot; alt=&quot;poll two-thirds of those who had been hacked said at some point they've changed their password&quot;/&gt;

&lt;p&gt;In the AP-MTV poll, two-thirds of those who had been hacked said at some point they've changed their password in response to digital abuse. 46 percent have altered their email address, screen name or phone number, and 25 percent have deleted a social networking profile.&lt;/p&gt;

&lt;p&gt;The poll cites several cases where roommates or friends impersonated each other as pranks.  In two cited cases, the incidents were considered harmless and fun.  In other cited cases, the intent appears cruel.  &lt;/p&gt;

&lt;p&gt;In our opinion the 3 in 10 number may not translate the same for adults.  Adults don't typically room together in dorms, or hang out in friends bedrooms where access to open browser sessions or saved logins are as easy.  For most adults, the biggest equivalent risk is leaving a laptop open or an unlocked desktop at work.  The lesson everyone should take away from this poll is to not save logins for convenience and follow healthy password practices.&lt;/p&gt;


</description>
					<pubDate>Thu, 06 Oct 2011 09:54:37 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20111006095437.news.MiddleCenter.html</guid>
                </item>

<item><title>Why Would Anyone Want My Password?</title>
                    <link>http://www.healthypasswords.com/Breach.Authentication.20111005093737.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;We talk to a lot of different people about passwords every day.  Most users always say, &quot;Who would want my password?&quot;.  We then explain how most people share passwords and a compromised email can compromise other more important accounts.  Sadly, most people don't get it until it happens to them.&lt;/p&gt;

&lt;p&gt; &lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PayPal_blackmarket.png&quot; alt=&quot;Courtesy Krebsonsecurity.com&quot;/&gt;
&lt;br&gt;Image Credit: Krebsonsecurity.com&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://krebsonsecurity.com/2011/10/how-much-is-that-phished-paypal-account/&quot; target=&quot;_blank&quot;&gt;This recent report from Brian Krebs&lt;/a&gt; shows how your compromised information get's sold.  These types of online market places exist for every type of credential:  Credit Cards, Online Payments, Email Accounts, Social Networking accounts, and more.&lt;/p&gt;

&lt;p&gt;Don't wait until it's too late.  Create a password strategy, review and adjust it twice a year.&lt;/p&gt;


</description>
					<pubDate>Wed, 05 Oct 2011 09:37:37 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Authentication.20111005093737.news.MiddleCenter.html</guid>
                </item>

<item><title>Passmywill.com figures out when you die</title>
                    <link>http://www.healthypasswords.com/Estate.Authentication.20111003132035.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;
A new website from Russia, passmywill.com, will keep all your encrypted passwords and monitor your social networking feeds to figure out when you expire.
&lt;/p&gt;

&lt;p&gt;
This &lt;a href=&quot;http://techcrunch.com/2011/10/02/passmywill-is-a-will-for-your-online-assets-and-passwords/&quot; target=&quot;_blank&quot;&gt; Techcrunch Interview&lt;/a&gt; with founder, Danil Kozyatnikov gives more details on the service.
&lt;/p&gt;

&lt;p&gt;
Any service offering to keep all your online credentials should be viewed skeptically.  According to the interview, the site only keeps your encrypted data.  But their website raises some security flags in our opinion.  We briefly looked at the site and found a few warning signs.  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The site does not use a secure connection, yet it's suggesting that users enter social security and credit card numbers.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; The site suggest users use a social security number or credit card number as an encryption key.  We didn't dig into the page to see if that data stayed local or went back to the server, but as a general rule, unless you are applying for credit you should never put your social security number into a web page.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The site asks you to save a plain text email body to send when you die and it again suggest using social security or credit card.&lt;/p&gt;&lt;/li&gt;

&lt;/ol&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PassMyWill.dot.com.png&quot; alt=&quot;Passmywill.com configure page image&quot;/&gt;






</description>
					<pubDate>Mon, 03 Oct 2011 13:20:35 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Estate.Authentication.20111003132035.news.MiddleCenter.html</guid>
                </item>

<item><title>ElcomSoft Password Recovery Tool Recovers Blackberry Passwords</title>
                    <link>http://www.healthypasswords.com/Hacking-Tools.Authentication.20110930064438.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to a &lt;a href=&quot;http://www.prnewswire.com/news-releases/elcomsoft-recovers-blackberry-device-passwords-130767498.html&quot; target=&quot;_blank&quot;&gt;press release&lt;/a&gt; by Elcomsoft Co. Ltd. on 9/29/2011, their  Phone Password Breaker software may be able to recover your blackberry password.&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/ElcomSoftPhonsePasswordRetailBox.png&quot; alt=&quot;Elcomsoft retail box image&quot;/&gt;

&lt;p&gt; Blackberry normally only allows ten tries before wiping data.  ElcomSoft exploits a user-selectable &quot;Security Password&quot; option to encrypt media card data.  This encrypts the media card in the blackberry using the same password as the phone.  The software may then bypass the blackberry operating system and directly use a brute force attack against the memory card instead of the phone.  According to Elcomsoft, a typical 7 character password can be cracked in less than an hour. &lt;/p&gt;

&lt;p&gt;According to the elcomsoft &lt;a href=&quot;http://www.elcomsoft.com/eppb.html&quot; target=&quot;_blank&quot;&gt; website &lt;/a&gt;, the password recovery tool also works on Apple iOS platforms including iPhone, iPad and iPod Touch devices of all generations released to date, including the latest iPhone 4 and iOS 4.3.&lt;/p&gt;

&lt;p&gt;North American Home users may purchase the software for $79.00.  A Professional license is $199.00&lt;/p&gt;



</description>
					<pubDate>Fri, 30 Sep 2011 06:44:38 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hacking-Tools.Authentication.20110930064438.news.MiddleCenter.html</guid>
                </item>

<item><title>UKChatterbox Users Urged to Change Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Website.20110928113639.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;The popular UK chat site, &lt;a href=&quot;http://www.ukchatterbox.co.uk/article/170&quot;&gt; UKChatterbox.co.uk &lt;/a&gt;, is urging users to change passwords.  &lt;/p&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/ukchatterbox.png&quot; alt=&quot;ukchatterbox banner&quot;/&gt;

&lt;p&gt;The site reports:&lt;/p&gt;

&lt;div class=&quot;Indented&quot;&gt;
&lt;p&gt;The UKChatterbox website has recently been the target of several attacks intended to disrupt services, and as part of an ongoing security update, all UKChatterbox users are being asked to change their passwords as a precautionary measure.&lt;/p&gt;
&lt;/div&gt;

&lt;p&gt;UKChatterbox has not disclosed any breaches, but the mere fact they are suggesting the change, means you should treat your previous password as if a breach had occurred.  &lt;p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Change any other sites using the same password&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a password unique to this site&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href=&quot;/content.Healthy_Passwords_Qualities_of_a_Strong_Password.html&quot;&gt;Create a strong password&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


</description>
					<pubDate>Wed, 28 Sep 2011 11:36:39 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20110928113639.news.MiddleCenter.html</guid>
                </item>

<item><title>Council on Government Ethics Laws COGEL.ORG Breached</title>
                    <link>http://www.healthypasswords.com/Breach.Website.20110927194452.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;
The council on Governmental Ethics Laws (cogel.org) was breached today.  The entire drupal database was posted on &lt;a href=&quot;http://pastebin.com/xK41pxem&quot; target=&quot;_blank&quot;&gt;pastebin&lt;/a&gt; today.  We have not analyzed the database, but it is supposedly the entire sites content.  If you have an ID at COGEL.ORG, change your password at any sites sharing the same password.
&lt;/p&gt;

</description>
					<pubDate>Tue, 27 Sep 2011 19:44:52 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20110927194452.news.MiddleCenter.html</guid>
                </item>

<item><title>Middle School Sleep-over Facebook Hijacking</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Passwords.20110924093651.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;A &lt;a href=&quot;http://www.lohud.com/article/20110924/NEWS04/109240353/Kent-girls-harass-friend-10-make-lewd-posts-her-Facebook-account?odyssey=mod|newswell|text|News|p&quot;&gt;lohud.com article&lt;/a&gt; from Kent, NY hit home the need to teach kids password safety.  &lt;/p&gt;

&lt;p&gt;The most important lessons kids learn are usually from parents and grandparents.  What kid hasn't learned to not take candy from a stranger by the time they are four?  At what age are kids taught to not share passwords?  Are kids ever taught to log out of Facebook before a sleep-over?  Kids are rarely taught these things.  Because parents and grandparents do not understand password security, and schools rarely put much more than the qualities of a strong password into their curriculum.  Kids are left to learn passwords the hard way.  As this 10 year old girl learned the hard way.&lt;/p&gt;

&lt;p&gt;According to Kent Police, on September 9th, a 10 year old girl hosted a sleep over for about 10 5th and 6th grade girls.  An 11 year old accessed the girls facebook account, changed the password, sent out salacious comments and signed the girl up for dating services.&lt;/p&gt;

&lt;p&gt;The incident was discovered the next day when the victim's father, who monitors her Facebook activity, got a message that his daughter's password had been changed, then started getting angry phone calls from other parents about the posts. Because the 11-year-olds also signed up the victim for dating services, so she was getting messages from men, police said.&lt;/p&gt;

&lt;p&gt;The details of how the password was obtained is unclear.  It's most likely that the girl had set the checkbox to save the password, granting access to anyone with physical access to the computer.&lt;/p&gt;

&lt;p&gt;Parents take note that the minimum age to join facebook is 13.  &lt;/p&gt;
</description>
					<pubDate>Sat, 24 Sep 2011 09:36:51 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Passwords.20110924093651.news.MiddleCenter.html</guid>
                </item>

<item><title>Lastpass Offering Students Free Six Month Premium Service</title>
                    <link>http://www.healthypasswords.com/Authentication.Third-Party.20110923200730.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Lastpass just announced on their blog six month free premium use to University Students.  For a limited time, students with a valid university email address can go to lastpass.com/edu to upgrade their LastPass account.
&lt;/p&gt;
&lt;img src=&quot;http://4.bp.blogspot.com/-Vqqd-4G_4zY/Tnjh2ts7LOI/AAAAAAAAArk/oynwRqNjjMs/s1600/ZUkW2.png&quot;/&gt;

&lt;p&gt;Full details can be found at &lt;a href=&quot;http://blog.lastpass.com/2011/09/free-6-months-premium-for-all.html&quot;&gt; http://blog.lastpass.com/2011/09/free-6-months-premium-for-all.html&lt;/a&gt;&lt;/p&gt;


</description>
					<pubDate>Fri, 23 Sep 2011 20:07:30 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Third-Party.20110923200730.news.MiddleCenter.html</guid>
                </item>

<item><title>Fire Someone Lately? Change Your Password!</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Passwords.20110922103925.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;a href=&quot;http://walyou.com/social-media-ghost-writing/&quot; target=&quot;_blank&quot;&gt; walyou.com &lt;/a&gt; details  an individual with 50,000+ twitter followers who fired one his ghost writers.  He did not change the Twitter password, and the fired ghost writer started tweeting embarrassing comments after having a few drinks.&lt;/p&gt;


</description>
					<pubDate>Thu, 22 Sep 2011 10:39:25 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Passwords.20110922103925.news.MiddleCenter.html</guid>
                </item>

<item><title>Microsoft Patents Sketch Based Passwords</title>
                    <link>http://www.healthypasswords.com/Authentication.Microsoft.20110921094404.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Yesterday Microsoft was awarded patent &lt;a href=&quot;http://patft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&amp;Sect2=HITOFF&amp;d=PALL&amp;p=1&amp;u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&amp;r=1&amp;f=G&amp;l=50&amp;s1=8,024,775.PN.&amp;OS=PN/8,024,775&amp;RS=PN/8,024,775&quot;&gt;United States Patent #8,024,775&lt;/a&gt; for sketch based passwords.  This patent had been applied for in 2008, Two years after first revealing their first incarnation of picture passwords.&lt;/p&gt;

&lt;p&gt;According to the patent abstract, this patent covers: &quot;A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of the user and an input edge orientation pattern from an input sketch of the user, compares the similarity between the two edge orientation patterns, and makes an authentication decision based on the similarity.&quot;&lt;/p&gt;

&lt;p&gt;This patent covers more than what has been revealed in the latest Windows 8 UMPC development.  For more information on picture passwords, see &lt;a href=&quot;http://www.healthypasswords.com/news.Microsoft_Improves_Picture_Passwords_in_Windows_8.html&quot;&gt;Microsoft Improves Picture Passwords in Windows 8&lt;/a&gt;&lt;/p&gt;

</description>
					<pubDate>Wed, 21 Sep 2011 09:44:04 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Microsoft.20110921094404.news.MiddleCenter.html</guid>
                </item>

<item><title>OS-X Lion Gets A Second Black Eye</title>
                    <link>http://www.healthypasswords.com/OS-X.Authentication.20110920095707.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;a href=&quot;http://reviews.cnet.com/8301-13727_7-20108261-263/os-x-lion-passwords-can-be-changed-by-any-local-user/&quot; target=&quot;_blank&quot;&gt;CNet details&lt;/a&gt; a new vulnerability in the newest OS-X verstion, Lion.  This vulnerability allows anyone with terminal access to your OS-X instance (Locally or remotely) to change any password on the system by issuing a simple command:&lt;br/&gt;
&lt;br/&gt;dscl localhost -passwd /Search/Users/USERNAME
&lt;/p&gt;

&lt;p&gt; Protecting your system is impossible, but you can greatly deter access by disabling SSH access, disabling auto-login, enabling screensaver and sleep passwords, and disabling guest accounts.  The original CNet article has details on most of these&lt;/p&gt;


&lt;p&gt;OS-X's first black eye was obtained by &lt;a href=&quot;news.Apple_OS-X_Lion_Still_Exposes_All_Enterprise_LDAP_Resources.html&quot;&gt; Exposes all Enterprise LDAP Resources&lt;/a&gt;.  This vulnerability is also related to LDAP changes made in Lion.&lt;/p&gt;



</description>
					<pubDate>Tue, 20 Sep 2011 09:57:07 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/OS-X.Authentication.20110920095707.news.MiddleCenter.html</guid>
                </item>

<item><title>Patch Tuesday Again</title>
                    <link>http://www.healthypasswords.com/Patches.Microsoft.20110914092837.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Windows users need to remember to check that windows updates sometime over the next day or two.  The number of updates varies by OS.  Most users will see three or more updates available.  One Windows 7, 64 bit system with office 2010 at our office, showed the following update notification:&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PatchTuesdaySept.png&quot; alt=&quot;Windows 7 64bit with Office 2010 update Screen&quot;/&gt;

&lt;p&gt;Corporate users may not see update notifications.  For more on how to update your Windows system, see &lt;a href=&quot;http://www.healthypasswords.com/content.How_to_Check_Windows_Update.html&quot;&gt; http://www.healthypasswords.com/content.How_to_Check_Windows_Update.html &lt;/a&gt;. &lt;/p&gt;

</description>
					<pubDate>Wed, 14 Sep 2011 09:28:37 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Patches.Microsoft.20110914092837.news.MiddleCenter.html</guid>
                </item>

<item><title>Mixed Case Facebook Passwords work With or Without Caps Lock</title>
                    <link>http://www.healthypasswords.com/Facebook.Passwords.20110914083650.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;&lt;a href=&quot;http://www.zdnet.com/blog/facebook/facebook-passwords-are-not-case-sensitive-update/3612?tag=search-results-rivers;item1&quot; target=&quot;_blank&quot;&gt;Emil Protalinski at ZDNET&lt;/a&gt; made an interesting discovery the other day when logging into facebook.  He found that his mixed case password still worked when caps lock was on. &lt;p&gt;

&lt;p&gt;After breaking the story, Emil Protalinski interviewed Fred Wolens at the Facebook PR security team and confirmed this is by design.  He learned there three possible combinations to authenticate with facebook:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Your original Password&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Your original password with the first letter capitalized (this covers mobile devices which automatically change the first letter to upper-case)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Your original password with the case reversed (this covers accidental caps-lock use)&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;According to Wolens, this doesn't impact security.  We disagree.  To put this into simple, but less precise terms, if your mixed case password only uses letters, this can make it twice as easy to crack.  As you add numbers and special characters, it keeps getting harder, but still will remain much easier to crack.  &lt;/p&gt;





</description>
					<pubDate>Wed, 14 Sep 2011 08:36:50 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Passwords.20110914083650.news.MiddleCenter.html</guid>
                </item>

<item><title>Microsoft Improves Picture Passwords in Windows 8</title>
                    <link>http://www.healthypasswords.com/Authentication.Passwords.20110913200919.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.slashgear.com/picture-password-revealed-by-microsoft-some-sort-of-new-os-mentioned-as-well-13179387/&quot; target=&quot;_blank&quot;&gt;slashgear.com&lt;/a&gt;, Microsoft will be introducing picture based passwords.  This really isn't new, but is different than what was released in 2008 as part of the Origami Experience 2 (now called UMPC [Ultra Mobile PC]) on Windows Vista.  &lt;/p&gt;

&lt;p&gt;Like the older incarnations, it only works with touch screens.  You may configure your own image and then draw with your finger on top of the image in a pattern only you know. If you used the original version you touched a series of points rather than drawing a continuous line.  &lt;em&gt;Note:  We're not sure if the line method was available with the Windows 7 version of UMPC.  If you know, please comment!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Our sample picture was used for our Lastpass review.  We overlaid it with a possible picture password.  In real life, you will select a picture and use your finger on the touch screen to trace a pattern over the picture.&lt;/p&gt; 

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PicturePasswordSample.png&quot; alt=&quot;Picture password sample&quot;/&gt;

&lt;p&gt; We started by tracing from the bottom corner to the top corner of the black Amazon FOB then traced down to the key-press area of the YubiKey (Lastpass) and finally stopped at the LED of the IronKey.&lt;/p&gt;


&lt;p&gt;Picture passwords are not new.  The National Institute of Standards and Technology, released &lt;a href=&quot;http://csrc.nist.gov/publications/nistir/nistir-7030.pdf&quot;&gt;NISTIR 7030&lt;/a&gt; in July 2003.  This specification has become dated and was much more simplistic than the current picture password implemented by Microsoft.&lt;/p&gt;


&lt;p&gt;Microsoft has not revealed details behind this authentication method, but it has the potential to be a very strong and secure system.  The biggest drawback right now is lack of hardware support.  Touchscreen devices have recently taken a huge leap thanks to tablet devices like the IPAD, but Microsoft does not have a large installed base of touchscreen devices. &lt;/p&gt;

&lt;p&gt;This type of authentication is one step closer to the tried-and-true signature used since the feather quill, but only gets you onto the tablet.  It won't help you to log in to your favorite website yet.&lt;/p&gt;


</description>
					<pubDate>Tue, 13 Sep 2011 20:09:19 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Passwords.20110913200919.news.MiddleCenter.html</guid>
                </item>

<item><title>Google Urges Iranians to Change Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110909104612.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Google has urged iranian users to change their Google passwords.  This is in direct response to the compromise of Dutch SSL certificate authority DigiNotar.  The fake credentials were used to deploy man-in-the-middle attacks against Iranian users. &lt;/p&gt;

&lt;p&gt;Compromised accounts may have had forwarding enabled or also accessed any sites your google ID is entrusted to.  To learn more about checking your account settings, see &lt;a href=&quot;/Content.Healthy_Passwords_See_if_Someone_is_Using_Your_Gmail.html&quot;&gt;How to See if Somone is Using Your GMail&lt;/a&gt; and &lt;a href=&quot;/Content.Healthy_Passwords_Gmail_Forwarding_Safety.html&quot;&gt; How to Check your GMail Forwarding&lt;/a&gt; for more details on protecting your Google accounts.&lt;/p&gt;


&lt;p&gt;Source: &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-in-iran.html&quot; target=&quot;_blank&quot;&gt; http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-in-iran.html&lt;/a&gt;&lt;/p&gt;





</description>
					<pubDate>Fri, 09 Sep 2011 10:46:12 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110909104612.news.MiddleCenter.html</guid>
                </item>

<item><title>Myjob.ie customers urged to change passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110909101046.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.rte.ie/news/2011/0909/myjob.html&quot; target=&quot;_blank&quot;&gt;RTE&lt;/a&gt;, Ireland's national public broadcaster, after two arrests this week, the website  MyJobie.com emailed customers asking them to change their passwords.  myJobie.com says their website was not the primary source of the breach.&lt;/p&gt;

&lt;p&gt; If you are a Myjobie user and you share that password at other sites, change all shared passwords.&lt;/p&gt;

&lt;p&gt;If your email password was used at the breached site, start by changing it first.  Email is the first target, and holds the keys to many other sites.&lt;a href=&quot;http://www.healthypasswords.com/news.A_Big_Risk_with_Online_Email.html&quot;&gt;(See A Big Risk with Online Email.)&lt;/p&gt;







</description>
					<pubDate>Fri, 09 Sep 2011 10:10:46 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110909101046.news.MiddleCenter.html</guid>
                </item>

<item><title>California Updates Data Breach Law</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110906201219.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://californianewswire.com/2011/08/31/CNW9770_231706.php&quot;&gt; California Newswire&lt;/a&gt;, California Gov. Jerry Brown signed into law a bill defining data breach protocols.  The bill (&lt;a href=&quot;http://www.leginfo.ca.gov/pub/11-12/bill/sen/sb_0001-0050/sb_24_bill_20110819_enrolled.pdf&quot;&gt;SB-24&lt;/a&gt;) will go into effect Jan 1, 2012.  &lt;/p&gt;

&lt;p&gt;Most states have laws requiring consumer notification.  This law will go one step further by mandating notification of the California State Attorney General for breaches affecting 500 or more people.  Firms affected by data breaches must provide information including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The name and contact information of the entity reporting the breach.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;A list of the types of personal information believed to be the subject of the breach.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;The estimated date and date range of the breach.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Whether notification was delayed as a result of a law enforcement investigation.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;A general description of the breach.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Information on the credit reporting agencies involved.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;A good summary of the bill can be found at &lt;a href=&quot;http://www.eweek.com/c/a/Security/California-Updates-Data-Breach-Law-to-Require-More-Incident-Details-194955/&quot;&gt; http://www.eweek.com/c/a/Security/California-Updates-Data-Breach-Law-to-Require-More-Incident-Details-194955/&lt;/a&gt;.&lt;/p&gt;

</description>
					<pubDate>Tue, 06 Sep 2011 20:12:19 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110906201219.news.MiddleCenter.html</guid>
                </item>

<item><title>Mobile APP Network Forum Hack Exposes 15000 User Accounts</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110906161520.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to Hacker News, the Mobile App Network forum was hacked.  The usernames and hashed passwords were shared on Pastebin in two parts.   &lt;a href=&quot;http://pastebin.com/grHm9mbD&quot;&gt; Part 1 &lt;/a&gt; | &lt;a href=&quot;http://pastebin.com/2h4QfgLA&quot;&gt; Part 2 &lt;/a&gt; &lt;/p&gt;

&lt;p&gt; If you have an account at the mappn.com, change your password.&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/maapn.com.pastebin.png&quot; alt=&quot;Pastebin Image&quot;/&gt;

</description>
					<pubDate>Tue, 06 Sep 2011 16:15:20 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110906161520.news.MiddleCenter.html</guid>
                </item>

<item><title>SWGalaxies.net Breach Exposes 21 Thousand Plain Text Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110830214142.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://venturebeat.com/2011/08/30/hackers-steal-21000-mostly-weak-user-passwords-from-star-wars-game-fan-site/&quot; target=&quot;_blank&quot;&gt;Venturebeat.com&lt;/a&gt;, &lt;a href=&quot;http://swgalaxies.net/&quot; target=&quot;_blank&quot;&gt;swgalaxies.net&lt;/a&gt;, a Star Wars Galaxies fan site, was hacked today.  The hackers posted 21,000 plain text usernames and passwords.&lt;/p&gt;

&lt;p&gt;If you've ever had an account there, or reuse passwords, it's time to change your passwords.  For more password ideas, see &lt;a href=&quot;/content.Healthy_Passwords_Password_Ideas.html&quot;&gt;Healthy Password Ideas&lt;/a&gt; for some good password ideas.&lt;/p&gt;


</description>
					<pubDate>Tue, 30 Aug 2011 21:41:42 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110830214142.news.MiddleCenter.html</guid>
                </item>

<item><title>How to Avoid the Mordo Worm</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Passwords.20110830191317.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Last week the Mordo Worm hit the news.  We originally passed on linking this story because we felt our readers would be unlikely targets.  Disabling the vulnerability is so easy it doesn't hurt to just do it.  This worm only targets Windows.  Protecting yourself from this worm is easy.  Just avoid simple passwords for your computer login.  &lt;/p&gt;

&lt;p&gt;If you want to be absolutely sure you're protected, disable remote access.  Disabling remote access varies slightly by Windows version, but they are all very similar.  Here's the process in Windows 7&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Click on the start menu, then right clicking on &quot;My Computer&quot; or &quot;Computer&quot; then selecting &quot;Properties&quot;.&lt;/p&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/Windows7rdpDisable010.png&quot; alt=&quot;Windows 7 Start Menu Properties&quot;/&gt;
&lt;/li&gt;

&lt;li&gt;&lt;p&gt; Find remote settings and click on it.  In XP, this is a tab on the top of the dialog&lt;/p&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/Windows7rdpDisable020.png&quot; alt=&quot;Windows 7 Security System Properties&quot;/&gt;
&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Deselect &quot;Allow Remote Assistance Connections to the Computer&quot; and Select &quot;Don't Allow connections to this computer&quot;.&lt;/p&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/Windows7rdpDisable030.png&quot; alt=&quot;Windows 7 Security System Properties&quot;/&gt;
&lt;/li&gt;

&lt;p&gt;If you need these instructions for a different Windows version, just leave a comment and we'll be happy to put the other screens together.&lt;/p&gt;

&lt;p&gt;2011-09-06 - Update: If you require Remote Desktop Access, you can increase security by changing your default RDP port from 3389 to a different port.  See &lt;a href=&quot;http://www.ghacks.net/2011/09/05/improve-pc-security-by-changing-the-rdp-port/&quot; target=&quot;_blank&quot;&gt;Ghacks.net - Improve PC Security by Changing the RDP Port&lt;/a&gt;&lt;/p&gt;</description>
					<pubDate>Tue, 30 Aug 2011 19:13:17 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Passwords.20110830191317.news.MiddleCenter.html</guid>
                </item>

<item><title>OS-X Lion Exposes All Enterprise LDAP Resources</title>
                    <link>http://www.healthypasswords.com/OS-X.Passwords.20110826172651.news.MiddleCenter.html</link>
                    <description>&lt;img width=&quot;35%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/OSXLionPromo.png&quot; alt=&quot;OS-X Lion Promo Image&quot;/&gt; 

&lt;p&gt;The new version of OS-X (Lion) has a major authentication vulnerability.  Once logged into an LDAP server (Servers commonly used for business Single Sign On: SSO), the user can access any device on the network without any password.  For businesses, this is an enormous security risk.  For most home users, this is not an issue.&lt;/p&gt;

&lt;p&gt;This means a user authenticated to LDAP running OS-X Lion, can probably look at any network share or computer hard drive on the corporate network.   After the initial login, Lion users can log into any other LDAP resource with any password.&lt;/p&gt;

&lt;p&gt;According to &lt;a href=&quot;http://www.h-online.com/security/news/item/Mac-OS-X-Lion-fails-to-check-passwords-when-authenticating-via-LDAP-1328704.html&quot; target=&quot;_blank&quot;&gt;The H Security&lt;/a&gt;,  Apple has been informed of the problem and has successfully reproduced it.  &lt;/p&gt;

&lt;p&gt;Apple has known of this problem for over a month and has not yet issued a patch.&lt;/p&gt;






</description>
					<pubDate>Fri, 26 Aug 2011 17:26:51 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/OS-X.Passwords.20110826172651.news.MiddleCenter.html</guid>
                </item>

<item><title>Patching more than Windows, Flash, Adobe</title>
                    <link>http://www.healthypasswords.com/Exploits.Third-Party.20110825104215.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Hopefully many of our readers are better at patching the biggest vulnerabilities such as Windows, Flash, Adobe and Java.  This advisory from Secunia reminded us that vulnerabilities are abound and when the masses get good at patching the big vulnerabilities, the criminals will move to other low hanging fruit.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://secunia.com/advisories/45676/&quot; target=&quot;_blank&quot;&gt;Secunia Advisory SA45676&lt;/a&gt; warns of an HP Easy Printer Care Active-X vulnerability that probably has a very wide installed base.  If you are concerned about it, just uninstall it.&lt;/p&gt;

&lt;p&gt;Presently there is no patch for this vulnerability.  Keeping up with patches goes beyond the biggest vulnerabilities.   The easiest way to keep track of patches is by using third party utilities.  We regularly recommend Secunia's PSI and Qualys BrowserCheck.  For more on these utilities see &lt;a href=&quot;/content.Healthy_Passwords_Patching_Popular_Software_Vulnerabilities.html&quot;&gt;Patching Popular Software Vulnerabilities&lt;/a&gt;&lt;/p&gt;




</description>
					<pubDate>Thu, 25 Aug 2011 10:42:15 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Exploits.Third-Party.20110825104215.news.MiddleCenter.html</guid>
                </item>

<item><title>Twitter Petition is a Phishing Scam </title>
                    <link>http://www.healthypasswords.com/Hoaxes.Phishing.20110819092336.news.MiddleCenter.html</link>
                    <description>&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/twitter_url_bar.png&quot; alt=&quot;twitter url&quot;/&gt;

&lt;p&gt;According to Sophos security, a new Twitter phishing scam has been making it's rounds.  The scam claims Twitter will begin charging for service in October and asks users to &quot;Sign a petition&quot; to keep the service free.  &lt;/p&gt;

&lt;p&gt;Following the link will require a fake Twitter login, where your password will be stolen.&lt;/p&gt;

&lt;p&gt;Source:&lt;a href=&quot;http://nakedsecurity.sophos.com/2011/08/18/twitter-is-not-charging-in-october-there-is-no-petition-youre-being-phished/&quot; target=&quot;_blank&quot;&gt; Sophos Naked Security Blog &lt;/a&gt;&lt;/p&gt;


</description>
					<pubDate>Fri, 19 Aug 2011 09:23:36 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hoaxes.Phishing.20110819092336.news.MiddleCenter.html</guid>
                </item>

<item><title>University of Wisconsin Exposes 75000 SSNs </title>
                    <link>http://www.healthypasswords.com/Breach.Mining.20110811100306.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Less than a year after suffering a breach of &lt;a href=&quot;http://www.universitybusiness.com/newssummary.aspx?news=yes&amp;postid=24938&quot;&gt;60,000 Social Security Numbers&lt;/a&gt;, The University of Wisconsin just suffered another breach losing 75,000 more Social Security Numbers.&lt;/p&gt;

&lt;p&gt;According to a University &lt;a href=&quot;http://www4.uwm.edu/univ_rel/computer_security.cfm&quot;&gt;FAQ&lt;/a&gt;, On May 25, 2011, the University of Wisconsin shut down an imaging system after finding suspicious programs on a server.  &lt;/p&gt;

&lt;p&gt;The University reports to have launched an investigation with the help of a national security expert.  &lt;/p&gt;

&lt;p&gt;On June 30, 2011 investigators found that a database was included on the system.  The database stored names and social security numbers on 75,000 staff members and students of UW-Milwaukee.  According to the university, the system also contained other files containing personal data; however, &quot;based on forensic analysis, they believe it extremely unlikely that hackers actually accessed any of the other files&quot;.  &lt;/p&gt;

&lt;p&gt;The university’s investigators theorize the motive was not identity theft, and could find no evidence of attempts to download names or social security numbers.  The university is not offering free monitoring or any type of help to affected individuals.  &lt;/p&gt;


</description>
					<pubDate>Thu, 11 Aug 2011 10:03:06 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Mining.20110811100306.news.MiddleCenter.html</guid>
                </item>

<item><title>Legitimate Company Representatives will Never Ask for Your Password</title>
                    <link>http://www.healthypasswords.com/Email.Phishing.20110810124054.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;A &lt;a href=&quot;http://windowsteamblog.com/windows_live/b/windowslive/archive/2011/08/10/i-will-never-ask-for-your-password.aspx&quot; target=&quot;_blank&quot;&gt;blog post&lt;/a&gt; by Microsoft's hotmail manager, Dick Craddock, shows a sample phishing email using his name, picture, and signature.  Craddock brings up a good point.  No legitimate company will ever ask for your password.  When systems housing passwords are created, they build in mechanisms for administrators to reset passwords, so asking a user for their password is not necessary.  They simply need to reset it.  &lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/hotmail_phishing_sample.png&quot; alt=&quot;Hot Mail Phishing Sample&quot;/&gt;

&lt;p&gt; The only common example of a person needing your password is maybe a local support person who's sitting at your desk fixing a problem.  Even then, they should slide the keyboard over and ask you to type it.  Asking someone their password is like asking them their weight.  It's personal and they may not want to share it.&lt;/p&gt;

&lt;p&gt; According to Craddock, hotmail account hijacking is on the rise.  They credit the rise to new security procedures implemented by hotmail over the past months.  The new procedures make it too difficult to create fake accounts, so spammers are finding it easier to hijack existing accounts.  &lt;/p&gt;

&lt;p&gt;Don't fall for this type of ploy.  The first warning sign is them asking for your password.  Beyond that, them asking for your username and date of birth conveniently gives them some added information to compromise your other accounts after hijacking your email. &lt;/p&gt;

&lt;p&gt;If a legitimate company ever asks for personal information such as address, date of birth, phone numbers, social security numbers or account numbers in email, don't send it.  Look up the company number from another source and then call and give the information verbally to a company representative.  Think of email as you would a postcard.  Everyone who touches the email between you and the recipient can read the contents.  If you would't put it on a postcard, don't put it in an email.&lt;/p&gt;  









</description>
					<pubDate>Wed, 10 Aug 2011 12:40:54 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Email.Phishing.20110810124054.news.MiddleCenter.html</guid>
                </item>

<item><title>Citigroup Japan Breach Exposes 92,408 Customer Records</title>
                    <link>http://www.healthypasswords.com/Breach.Website.20110810100621.news.MiddleCenter.html</link>
                    <description>&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/citi_logo.png&quot; alt=&quot;CitiJp Logo&quot;/&gt;

&lt;p&gt;In a &lt;a href=&quot;http://www.citigroup.jp/english/press_release/2011/20110805_en.pdf&quot; target=&quot;_blank&quot;&gt;press release dated August 5, 2011&lt;/a&gt;, Citigroup Japan announced that certain personal information of 92,408 customers had allegedly been obtained and illegally sold to a third party.&lt;/p&gt;

&lt;p&gt;The compromised information includes account numbers, names, addresses, phone numbers, date of birth, gender and the date the account was opened.  The breach only affects Citigroup Japan cardholders&lt;/p&gt;

&lt;p&gt;Citigroup JP says they are taking necessary precautions to notify customers.  If you ever had a Citigroup Japan account, be prepared for &lt;a href=&quot;http://www.healthypasswords.com/content.What_is_Phishing.html&quot;&gt;spear phishing&lt;/a&gt; attacks in coming months.&lt;/p&gt;



</description>
					<pubDate>Wed, 10 Aug 2011 10:06:21 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20110810100621.news.MiddleCenter.html</guid>
                </item>

<item><title>Facebook Implementing new Mobile Password Reset Option</title>
                    <link>http://www.healthypasswords.com/Facebook.Passwords.20110809192636.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Facebook's security blog just posted an mobile password reset announcement&lt;/p&gt;

&lt;img width=&quot;25%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/Facebook_Mobile_Password_Reset.png&quot; alt=&quot;facebook mobile password reset&quot;/&gt;

&lt;p&gt;According to their blog:  &quot;If you ever forget your password or get locked out of your account, we want to make it easy to get back on Facebook.  We are testing improvements to resetting your password from your mobile device.  You can now choose the email address where you want to receive recovery links, and we are offering additional ways to confirm your identity. We will roll this out slowly to gather feedback from people as they use this.&quot;&lt;/p&gt;








</description>
					<pubDate>Tue, 09 Aug 2011 19:26:36 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Passwords.20110809192636.news.MiddleCenter.html</guid>
                </item>

<item><title>Firefox Spam Scam Steals Passwords</title>
                    <link>http://www.healthypasswords.com/Hoaxes.Passwords.20110809172840.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://nakedsecurity.sophos.com/2011/08/08/fake-firefox-update-email-malware/&quot;&gt;Sophos Security&lt;/a&gt;, a new spam email tricks users to install a password stealing trojan . The email body is:&lt;/p&gt;

&lt;pre&gt;
Subject: New version released.

Message body:

Important notice
A Firefox software update is a quick download of 
small amounts of new code to your existing Firefox 
browser. These small patches can contain security 
fixes or other little changes to the browser to 
ensure that you are using the best version of Firefox
available. Firefox is constantly evolving as our 
community finds ways to make it better, and as we 
adjust to the latest security threats. Keeping your 
Firefox up-to-date is the best way to make sure that 
you are using the smartest, fastest and . most 
importantly . safest version of Firefox available. A 
Firefox update will not make any changes to your 
bookmarks, saved passwords or other settings. However, 
there is a possibility that some of your Add-ons won.t 
be immediately compatible with new updates.

For security reasons please update your firefox version 
now

&lt;/pre&gt;

&lt;p&gt;All popular browsers (firefox, internet explorer, opera, chrome, and Firefox) update themselves, so you not have to download updates.  &lt;/p&gt;



</description>
					<pubDate>Tue, 09 Aug 2011 17:28:40 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hoaxes.Passwords.20110809172840.news.MiddleCenter.html</guid>
                </item>

<item><title>Today is Patch Tuesday for Windows Users</title>
                    <link>http://www.healthypasswords.com/Patches.Microsoft.20110809164923.news.MiddleCenter.html</link>
                    <description>&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/PatchTuesday.png&quot; alt=&quot;Windows 7 Windows Update Screen&quot;/&gt;

&lt;p&gt;The second Tuesday of every month is when Microsoft sends security updates through Windows Update.  Be sure to leave your computer on or see &lt;a href=&quot;http://www.healthypasswords.com/content.How_to_Check_Windows_Update.html&quot;&gt; How to Check Windows Update&quot;&lt;/a&gt; if you'd rather not wait.&lt;/p&gt;

&lt;p&gt;To see the details behind these, Brian Krebs at KrebsonSecurity.com creates a nice summary anyone can understand.  See it at &lt;a href=&quot;http://krebsonsecurity.com/2011/08/22-reasons-to-patch-your-windows-pc/&quot;&gt;http://krebsonsecurity.com/2011/08/22-reasons-to-patch-your-windows-pc/&lt;/a&gt;&lt;/p&gt;







</description>
					<pubDate>Tue, 09 Aug 2011 16:49:23 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Patches.Microsoft.20110809164923.news.MiddleCenter.html</guid>
                </item>

<item><title>Researchers Find Lastpass Vulnerbility on Chrome OS</title>
                    <link>http://www.healthypasswords.com/Exploits.Passwords.20110808095856.news.MiddleCenter.html</link>
                    <description>&lt;img width=&quot;50%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/ChromeLastpass.png&quot; alt=&quot;Lastpass and Chrome&quot; /&gt;
&lt;p&gt;According to Information week, a White Hat team lead by Matt Johansen and application security specialist Kyle Osborn found a LastPass vulnerability on the new Google Chrome Operating System.  This exploit allowed the researches to steal the local Crypto key and database for the users Lastpass netting all their userids and passwords.  Lastpass has since changed application behavior making the exploit more difficult, but other exploits may still be possible.  Read the full article at &lt;a href=&quot;http://www.informationweek.com/news/231300157&quot; target=&quot;_blank&quot;&gt; informationweek.com &lt;/a&gt;&lt;/p&gt;

Edited: 2011-08-08 - 09:58AM EST &lt;a href=&quot;/news.20110803.Researchers_Find_Lastpass_Vulnerbility_on_Chrome_OS.html&quot;&gt;Original Article&lt;/a&gt;




</description>
					<pubDate>Mon, 08 Aug 2011 09:58:56 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Exploits.Passwords.20110808095856.news.MiddleCenter.html</guid>
                </item>

<item><title>Google Chrome now has Print Preview</title>
                    <link>http://www.healthypasswords.com/Patches.Website.20110804171052.news.MiddleCenter.html</link>
                    <description>&lt;h3&gt; From the off the password topic, but very cool department &lt;/h3&gt;

&lt;p&gt;Today Google pushed an update to Chrome which includes a much anticipated preview.  Hopefully the days of printing 20 pages of comments for a one page article are over!&lt;/p&gt;
&lt;img width=&quot;75%&quot;  src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/GoogleChromePrintPreview.png&quot; alt=&quot;Chrome Print Preview Image&quot;/&gt;




</description>
					<pubDate>Thu, 04 Aug 2011 17:10:52 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Patches.Website.20110804171052.news.MiddleCenter.html</guid>
                </item>

<item><title>Change.GOV website hacked</title>
                    <link>http://www.healthypasswords.com/Breach.Website.20110729222404.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.thehackernews.com/2011/07/changegov-donor-list-2010-leaked-by.html&quot; targetj=&quot;_blank&quot;&gt;hacker news&lt;/a&gt; on 7/26, 60804 names, employer, City, state, zip and donation amounts were leaked via twitter.  No passwords were leaked.&lt;/P&gt;


</description>
					<pubDate>Fri, 29 Jul 2011 22:24:04 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20110729222404.news.MiddleCenter.html</guid>
                </item>

<item><title>Google Expands Two-Step Authentication to 40 Countries</title>
                    <link>http://www.healthypasswords.com/Authentication.Passwords.20110728230142.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;In an &lt;a href=&quot;http://googleonlinesecurity.blogspot.com/2011/07/2-step-verification-stay-safe-around.html&quot; target=&quot;_blank&quot;&gt;online security blog entry today&lt;/a&gt;, Google announced expansion of the two-step authentication program to more than 40 countries. &lt;/p&gt;

&lt;p&gt;Google two-step verification is a form of multi-factor authentication.  
Multi-Factor Authentication not only requires a username and password, it also requires something you have or something you are.  Googles offering uses voice or text phone messages.  Impersonating a user without the device is not possible.  Multi-factor devices include key chain tokens, voice or text phone messaging, USB devices, printed cipher grids, and biometric readers.
&lt;/p&gt;
  
&lt;p&gt;For step-by-step instructions on setting up two-step authentication, see &lt;a href=&quot;/content.Healthy_Passwords_How_To_Setup_Google_2-Step_verification.html&quot;&gt;Healthy_Passwords_How_To_Setup_Google_2-Step_verification.html&lt;/a&gt;


</description>
					<pubDate>Thu, 28 Jul 2011 23:01:42 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Passwords.20110728230142.news.MiddleCenter.html</guid>
                </item>

<item><title>Mac OSX Passwords Less Secure Than You Think</title>
                    <link>http://www.healthypasswords.com/Authentication.Passwords.20110728204852.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to the &lt;a href=&quot;http://www.lostpassword.com/news/pnl58.htm&quot;&gt;latest passware newsletter #058&lt;/a&gt;, their forensic version can read the OSX lion or Snow Leopard keychain from it's firewire port.  This option is only available in their forensic version, which retails for $995.00.&lt;/p&gt;

&lt;p&gt;The mac keychain saves passwords (for websites, network shares, wireless networks), private keys, certificates, etc.&lt;/p&gt;

&lt;p&gt;According to Passware, the security risk is averted by  turning off the computer instead of putting it to sleep, and disabling the &quot;Automatic Login&quot; setting. This way, passwords will not be present in memory and cannot be recovered.&lt;/p&gt;  

&lt;h3&gt;How to Disable Auto Login&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt; Go into system preferences by clicking on the system preferences icon from the bottom of the desktop.  &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; If the small padlock icon is locked, unlock it by clicking on it then entering an administrator username and password. &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; Click on Login Options &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; Uncheck Automatically log in as.  Be sure you know your password before doing this.  &lt;/p&gt;&lt;/li&gt;

&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/mac_preferences_login_disable_auto.png&quot; alt=&quot;Mac Login Preferences&quot;/&gt;&lt;/p&gt;

&lt;/ol&gt;


&lt;p&gt;We have always found keychain to be annoying in safari.  If you wish to disable it for Safari, follow these steps&lt;/p&gt;

&lt;h3&gt;Diable Keychain for Safari&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt; &lt;p&gt; Start or switch focus to Safari. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt; &lt;p&gt; Select Preferences from the Safari menu.  The Preferences dialog will appear. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt; &lt;p&gt; Click on AutoFill &lt;/p&gt;&lt;/li&gt;
&lt;li&gt; &lt;p&gt; Disable all autofill options. &lt;/p&gt; &lt;/li&gt;
&lt;li&gt; &lt;p&gt; Click the red X to close the window. &lt;/p&gt; &lt;/li&gt;
&lt;p&gt; &lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/mac_safari_preferences_keychain.png&quot; alt=&quot;Mac Safari Keychain Preferences&quot; /&gt;&lt;/p&gt;
&lt;/ol&gt;




</description>
					<pubDate>Thu, 28 Jul 2011 20:48:52 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Passwords.20110728204852.news.MiddleCenter.html</guid>
                </item>

<item><title>When Did You Last Change your iTunes Password?</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Passwords.20110719132053.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;A recent &lt;a href=&quot;http://www.globaltvbc.com/Recent+hacks+iTunes+accounts+raising+concerns/5121102/story.html&quot; target=&quot;_blank&quot;&gt;article by Global News&lt;/a&gt;, suggested recent iTunes account hijacking.   They state: &quot;more and more users are noticing unauthorized purchases on their iTunes accounts and seeing online credits from their gift cards disappear&quot; &lt;/p&gt;

&lt;p&gt;We have been searching for instances of iTunes hacks, but can only find rumors.  In early July, &lt;a href=&quot;https://twitter.com/#!/AnonymousIRC/status/87426935390609408&quot; target=&quot;_blank&quot;&gt;Anonymous hacked iTunes&lt;/a&gt;, but the information they posted did not include user account information.  In all likelihood users who find their iTunes accounts hacked may have had their email / password compromised at another site, and never bothered changing all their passwords. &lt;/p&gt;

&lt;p&gt;If you rarely purchase from iTunes, you may forget they hold your payment details.  iTunes, like most other sites, don't require regular password changes.  If you don't remember the last time you changed your iTunes password, now is a good time to change it. &lt;/p&gt;



</description>
					<pubDate>Tue, 19 Jul 2011 13:20:53 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Passwords.20110719132053.news.MiddleCenter.html</guid>
                </item>

<item><title>Toshiba America Consumer Products Hacked</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110718113158.news.MiddleCenter.html</link>
                    <description>&lt;p&gt; According to the &lt;a href=&quot;http://online.wsj.com/article/SB10001424052702304203304576449553285779220.html?mod=googlenews_wsj&quot;&gt;Wall Street Journal&lt;/a&gt;, the Toshiba America Consumer Products (TACP) website (tacp.com or tacp.toshiba.com) was hacked. Toshiba has notified customers, but they did not say if they notified affected customers or all customers.&lt;/p&gt;

&lt;p&gt;The information stolen was registration information on over 7500 customers.  According to a &lt;a href=&quot;http://www.4-traders.com/TOSHIBA-CORPORATION-6493713/news/TOSHIBA-Concerning-Illegal-Server-Access-at-a-Toshiba-Group-Company-in-the-U-S-13710788/&quot; target=&quot;_blank&quot;&gt; 4-traders.com &lt;/a&gt; release, &quot;To date, TAIS’s investigation has confirmed data theft of e-mail addresses and passwords affecting 681 customers.&quot;  Toshiba reports no credit card or social security information was taken.&lt;/p&gt;







</description>
					<pubDate>Mon, 18 Jul 2011 11:31:58 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110718113158.news.MiddleCenter.html</guid>
                </item>

<item><title>Stevens Institute of Tech Hacked - Plain text user names  and passwords compromised</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110718111822.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Acording to &lt;a href=&quot;http://www.securitypronews.com/insiderreports/insider/spn-49-20110714237234RecordsBreachedOperationAntiSecContinuesOperationGreenRightsBegins.html&quot; target=&quot;_blank&quot;&gt;SecurityPro News&lt;/a&gt;, Last Thursday, the Stevens Institute of Technology was hacked by @p0keu. At least part of its database leaked on PasteBin containing 31 records with the full names of users, email addresses, and plain text passwords.&lt;/p&gt;





</description>
					<pubDate>Mon, 18 Jul 2011 11:18:22 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110718111822.news.MiddleCenter.html</guid>
                </item>

<item><title>IOS Password Snooping App</title>
                    <link>http://www.healthypasswords.com/Vulnerability.IOS.20110715210506.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Here's an interesting article on PCWorld.com abount IOS password entries.  The on-screen keyboard lights up when keys are pressed making it impossible to hide a password as you type it.  An app has been made to use your ipod's camera to record another users keyboard entry to steal their password.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.pcworld.com/article/235847/ipad_app_reads_passwords_exposes_flaws_in_asterisk_protection.html&quot;&gt; PCWorld - July 15, 2011 - iPad App Reads Passwords, Exposes Flaws in Asterisk Protection&lt;/a&gt;&lt;/p&gt;


</description>
					<pubDate>Fri, 15 Jul 2011 21:05:06 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.IOS.20110715210506.news.MiddleCenter.html</guid>
                </item>

<item><title>Mozilla Announces BrowserID - Single Password Authentication</title>
                    <link>http://www.healthypasswords.com/Authentication.Passwords.20110715100818.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Yesterday Mozilla, the same organization that produces FireFox, announced a new authentication service called BrowserID.  This is a service similar to OpenID, (&lt;a href=&quot;/content.What_Is_OpenID.html&quot;&gt;See What is OpenID&lt;/a&gt;), but slightly different.  &lt;/p&gt;

&lt;p&gt;Rather than a user proving they have control of a website, as OpenID does, BrowserID uses email.  According to &lt;a href=&quot;https://wiki.mozilla.org/Labs/Identity/VerifiedEmailProtocol&quot;&gt; Mozilla: &lt;/a&gt; &quot;a very simple web-centric binding to a well-understood identity token.  Specifically: this proposal defines a way for a user to prove to a website that they control an email address.&quot; &lt;/p&gt;

&lt;p&gt;As promising as OpenID has been, it's use of a website has proven too difficult for most users.  Our first thought was that email is too insecure as a means for authentication, but as Mozilla points out, a user may choose an email provider which offers more security.  For example, if you use an email provider offering multi-factor authentication (See &lt;a href=&quot;/content.Healthy_Passwords_What_is_Multi-Factor_Authentication.html&quot;&gt;What is Multi-Factor Authentication&lt;/a&gt;), you end up with a very secure solution.&lt;/p&gt;

&lt;p&gt;It's ironic that every scheme to end passwords creates another password.  One key difference between authentication providers like BrowserID or OpenID and password managers is that they truly eliminate a password for each configured site.  You still have profiles at those sites holding your personal data, but those sites will just keep your ID and not require a separate password.  Password Managers (lastpass, keypass, 1password, etc) actually just create a new password and let you forget about all the others, but behind the scenes you still have a huge keychain with all your passwords. Mozilla's offering permanently removes keys from your keychain for every configured site.   &lt;/p&gt;

&lt;object style=&quot;height: 390px; width: 640px&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/l0t9yDLAmFo?version=3&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/l0t9yDLAmFo?version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;390&quot;&gt;&lt;/object&gt;
</description>
					<pubDate>Fri, 15 Jul 2011 10:08:18 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Passwords.20110715100818.news.MiddleCenter.html</guid>
                </item>

<item><title>Hotmail Improves Password Security</title>
                    <link>http://www.healthypasswords.com/Authentication.Website.20110714213114.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;/p&gt;

&lt;p&gt;Today Microsoft announced two new Hotmail security features.  &lt;/p&gt;

&lt;p&gt; 
First, they will begin restricting common passwords such as 123456, monkey, password, and many more.  According to Microsoft's Dick Craddock:&lt;/p&gt;

&lt;div class=&quot;Indented&quot;&gt;
&lt;p&gt;
&quot;If you're already using a common password, you may, at some point in the future, be asked to change it to a stronger password.&quot;
&lt;/p&gt;
&lt;/div&gt;

&lt;p&gt;
Second, they have added a new option, &quot;My Friend's been Hacked!&quot;, to the &quot;Mark As&quot; Menu.  When a user starts getting strange email from a friend, they simply select this option.  Microsoft's system will be alerted.  Microsoft has made agreements with other email providers.  According to Microsoft's Dick Craddock:  
&lt;/p&gt;

&lt;div class=&quot;Indented&quot;&gt;
&lt;p&gt;&quot;We did the work to enable other email providers like Yahoo! and Gmail to receive these compromise reports from Hotmail including those submitted by you, and those providers will now be able to use the reports in their own systems to recover hacked accounts.&quot; 
&lt;/p&gt;
&lt;/div&gt;

&lt;p&gt;
These innovative steps by Microsoft are inching it towards better security.  If they can add a &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_What_is_Multi-Factor_Authentication.html&quot;&gt;Multi-Factor Authentication&lt;/a&gt;, they could be the one of the most secure webmail provider today.  &lt;/p&gt;

&lt;p&gt;Keep up the good work, Microsoft!&lt;/p&gt;






</description>
					<pubDate>Thu, 14 Jul 2011 21:31:14 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Website.20110714213114.news.MiddleCenter.html</guid>
                </item>

<item><title>Booz Allen Hamilton - Learning Systems and Human Nature</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110713091746.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.reuters.com/article/2011/07/12/boozallen-idUSL3E7IC3LF20110712&quot; target=&quot;_blank&quot;&gt; Reuters&lt;/a&gt;, Booz Allen's &lt;a href=&quot;/news.90000_Military_Passwords_Stolen_from_Booz_Allen_Hamilton.html&quot;&gt;recent breach &lt;/a&gt; was for a &quot;learning management system for a government agency&quot;.  This implies only test data was leaked.&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/troy_hunt_PasswordReusePieChart.png&quot; alt=&quot;Pie Chart showint 92 percent password reuse&quot;/&gt;&lt;br/&gt;&lt;em&gt;Credit: Troy Hunt http://www.troyhunt.com/2011/06/brief-sony-password-analysis.html &lt;/em&gt;

&lt;p&gt;Even if these were usernames and passwords from a test system, unless the test participants were explicitly told to create false emails and passwords, human nature will prevail.  Breach after breach repeatedly demonstrates that people reuse the same passwords over and over.   &lt;a href=&quot;/content.Troy_hunt_Password_Analysis.html&quot;&gt;Recent analysis by Troy Hunt&lt;/a&gt; comparing the Gawker breach to the several LulzSec breaches showed a 92% occurrence of password reuse.&lt;/p&gt;


&lt;p&gt;If you had any dealings with Booz Allen Hamilton or work for a government agency that contracted Booz Allen Hamilton, you should change your passwords.  A little more than 66,000 of the compromised emails have been added to the &lt;a href=&quot;/content.How_to_find_out_of_your_password_was_stolen.html&quot;&gt;shouldichangemypassword.com breach database&lt;/a&gt;.  You can go there and enter your emails to see if they were part of the breach.&lt;/p&gt;


</description>
					<pubDate>Wed, 13 Jul 2011 09:17:46 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110713091746.news.MiddleCenter.html</guid>
                </item>

<item><title>90000 Military Passwords Stolen from Booz Allen Hamilton</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110712070636.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;On Monday, July 11, 2011 the hacker group Antisec announced they had infiltrated Booz Allen Hamilton and stolen over 90,000 email addresses and passwords.&lt;/p&gt;

&lt;p&gt;In their announcement, they said: “We infiltrated a server on their network that basically had no security measures in place. We were able to run our own application, which turned out to be a shell and began plundering some booty. Most shiny is probably a list of roughly 90,000 military emails and password hashes (md5, non-salted of course!).”&lt;/p&gt;

&lt;p&gt;Their comment about non-salted md5 hashes, means these passwords will be decrypted and viewable very quickly.  A non-salted md5 hash is just one step above plain text password storage.  Not what one would expect of such a company.  To learn more abount hashes and salting see &lt;a href=&quot;/content.What_are_hashes_and_Rainbow_Tables.html&quot;&gt;Healthy Passwords Explains hashes and salting.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you or someone you know may have been affected, they can start by changing all email passwords.  Once those are secure they need to start with highest risk sites and move down the list by priority.  See &lt;a href=&quot;/content.Healthy_Passwords_the_four_password_strategy_options.html&quot;&gt; Password Strategies&lt;/a&gt; for more ideas on securing your passwords. &lt;/p&gt;

&lt;h3&gt;2011-07-12 Update&lt;/h3&gt;

&lt;p&gt;According to Daniel Grzelak, founder of ShouldIChangeMyPassword.com, &quot;Looks like Booz Allen Hamilton kept password histories so not only do users need to change their passwords, they need to be something new&quot;.  &lt;/p&gt;

&lt;p&gt;Many people cycle through passwords adding unique numbers or letters to slightly change it every month.  People who use this strategy may need to re-architect their base password to prevent compromise.&lt;/p&gt;

&lt;p&gt;ShouldIChangeMyPassword.com just posted 69,691 records.  &lt;a href=&quot;http://www.healthypasswords.com/content.How_to_find_out_of_your_password_was_stolen.html&quot;&gt;See our article for instructions&lt;/a&gt;&lt;/p&gt;

</description>
					<pubDate>Tue, 12 Jul 2011 07:06:36 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110712070636.news.MiddleCenter.html</guid>
                </item>

<item><title>Solutions for Big Business Twitter Breaches</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110707171428.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;/p&gt;

&lt;p&gt;The 3rd Twitter password breach this week illustrates weakness in business Twitter use.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; &lt;p&gt; July 4, 2011 - &lt;a href=&quot;http://www.reuters.com/article/2011/07/04/us-cybersecurity-fox-idUSTRE7632JF20110704&quot; target=&quot;_blank&quot;&gt;Fox News Twitter Account Hijacked &lt;/a&gt;&lt;/p&gt; &lt;/li&gt;
&lt;li&gt; &lt;p&gt; July 5, 2011 - &lt;a href=&quot;http://uk.reuters.com/article/2011/07/05/uk-paypal-twitter-cyberattack-idUKTRE7646RZ20110705&quot; target=&quot;_blank&quot;&gt;Paypal UK Twitter Account Hijacked &lt;/a&gt;&lt;/p&gt; &lt;/li&gt;
&lt;li&gt; &lt;p&gt; July 7, 2011 - &lt;a href=&quot;http://kstp.com/news/stories/S2189336.shtml?cat=1&quot; target=&quot;_blank&quot;&gt;Hennepin Co. Library Twitter Account Hijacked&lt;/a&gt; &lt;/p&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Twitter lacks delegate functionality.  This forces businesses into insecure practices such as: &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Account access by multiple individuals.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using weak passwords so multiple individuals may remember them.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Infrequent password changes so no updater is locked out. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; Until Twitter can address the problem, business account holders must take steps to protect their brand.  Here are a few possibilities:&lt;/p&gt;

&lt;ul&gt;

&lt;li&gt;&lt;p&gt; Have account updaters create Lastpass accounts.  Have one person create and change the password daily.  That one person can share the password with the &quot;delegates&quot; through Lastpass, which allows the others to use the password without having to see the password.  Lastpass offers multi-factor authentication, so this solution solves the problem on two fronts. &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; Create one person, ideally a helpdesk manager role, responsible for daily password changes.    Create a list of authorized users.  When a user needs to update twitter, they will call the helpdesk or password keeper to get the password of the day.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; Limit updates to no more than three people, which is enough to cover a 24x7 rotation.  Change the password daily or weekly.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt; Our business is passwords and we don't normally recommend password managers for highest risk accounts, but in this circumstance, LastPass uniquely meets all the requirements for a perfect stop-gap Business Twitter solution.&lt;/p&gt;

&lt;p&gt; A Twitter breach to a large business like Fox News or Paypal may be more damaging than losing bank account passwords.  It's time for management to recognize these risks and implement processes to prevent losses.&lt;/p&gt;







</description>
					<pubDate>Thu, 07 Jul 2011 17:14:28 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110707171428.news.MiddleCenter.html</guid>
                </item>

<item><title>Facebook and Skype Offer Video Calling</title>
                    <link>http://www.healthypasswords.com/Facebook.Website.20110706163641.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;br/&gt;
July 7, 2011 5:00PM EDT&lt;/p&gt;

&lt;p&gt;Facebook announced new options for communicating with your friends today.  There are three major components, the biggest being video chat.  They are also rolling out a new group chat and chat interface.&lt;/p&gt;

&lt;p&gt;The new video chat added to Facebook is powered by a Skype plug-in, which is supposed to work on all browsers.  When a user clicks on the icon for Video chat, it will download the plug-in and connect to the other user.  No Skype account is required.  The demonstration made the process look very easy to use.  &lt;/p&gt;

&lt;p&gt;Facebook software engineer Philip Su said &quot;Video chat has been around for years now, but it's still not an everyday activity for most people.  Sometimes it's too difficult to set up, or the friends you want to talk to are on different services.  So a few months ago, we started working with Skype to bring video calling to Facebook. We built it right into chat, so all your conversations start from the same place. To call your friend, just click the video call button at the top of your chat window.&quot;&lt;/p&gt;

&lt;p&gt;When you click to call a friend, the friend will see the call coming and choose to accept or reject the call.  Once accepted they will see a video screen showing you, and you will see them.  You will both be able to talk and hear each other using your microphone and speakers.  The user will, of course, require a webcam, microphones and speaker.&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/Facebook_Chat010.png&quot; alt=&quot;Facebook Chat Image&quot;/&gt;

&lt;p&gt;No mentions were made about security settings around these new features and whether users can turn control the ability for other users to make video calls.  It sounds like video calls will only be available for users you have in chat groups.&lt;/p&gt;

&lt;p&gt;Chat groups have been  part of facebook for about six months.  According to Su, &quot;Now when your friends can't figure out what movie to see, you can just add them to a chat and decide together&quot;. They have enhanced it to allow ad-hoc groups to chat instead of predetermined groups.  The new group chat rolls out today.&lt;/p&gt;

&lt;p&gt;A new chat design is being integrated where if a users browser screen is wide enough, a new side bar will show your chat users on the right side of the screen&lt;/p&gt;

&lt;p&gt;In another part of the same press conference, related another new feature.  See: &lt;a href=&quot;/news.Facebook_Becomes_a_Message_Hub.html&quot;&gt; Facebook Becomes a Message Hub &lt;/a&gt;&lt;/p&gt;</description>
					<pubDate>Wed, 06 Jul 2011 16:36:41 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Website.20110706163641.news.MiddleCenter.html</guid>
                </item>

<item><title>Facebook Becomes a Message Hub</title>
                    <link>http://www.healthypasswords.com/Facebook.Website.20110706161051.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;br/&gt;
July 6, 2011 4:30PM EDT&lt;/p&gt;

&lt;p&gt; One of the big announcement from Facebook today is a new messaging system.  Facebook is integrating seamless messaging between IM, Email, SMS, Facebook and  other formats.  To communicate with a facebook user, you won't have to be on facebook.  Likewise, a facebook user will be able to send a facebook message to a non-facebook user.&lt;/p&gt;

&lt;p&gt;The system is being deployed in waves, so you may not see it for several weeks or months.  Once you migrate to the new system, you will have the ability to receive email to YourScreenName@facebook.com.  These emails will come into your facebook in one new feed.  The feed will be organized by individual and will show a chronological history of every message with that person.  &lt;/p&gt;

&lt;p&gt;A key feature stressed by the Facebook team was automatic message segregation through the social hierarchy.  For example, your main feed will show messages from friends.  There will be other feeds for non-friend items.  As you receive messages, you can move non-facebook users to your main feed so they will be treated as friends. &lt;/p&gt;

&lt;p&gt;The innovative part of this announcement is the variety of inputs which facebook will aggregate into your feeds.  To a facebook user on the new system, an SMS, IM, email, or other supported messages will look like a facebook message to the receiver.  When the facebook user replies, it will respond via the same messaging system the user sent the message in.  For example, if my friend sends me a text message to myScreenName@fb.com, and I reply, they will receive an IM back from me.  I will not need to know how the message was sent to reply.  &lt;/p&gt;

&lt;p&gt;In another part of the same press conference, related another new feature.  See: &lt;a href=&quot;/news.Facebook_and_Skype_Offer_Video_Calling.html&quot;&gt; Facebook announces Video Conferencing &lt;/a&gt;&lt;/p&gt;
</description>
					<pubDate>Wed, 06 Jul 2011 16:10:51 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Website.20110706161051.news.MiddleCenter.html</guid>
                </item>

<item><title>Hackers Create their Own URL Shortening Service</title>
                    <link>http://www.healthypasswords.com/Internet.Phishing.20110705164409.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to Symantec's May message labs report, For the First Time, Spammers established their own fake URL-shortening services.  These services first use a commercial shortener to then link to their own shortener which finally points to a malicious site. &lt;/p&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/SymantecMessageLabsShortUrl.png&quot; alt=&quot;Symantec Message Labs Short URL Chart&quot; /&gt;

&lt;p&gt;
According to Symantec, once the user has arrived at the site, they will be bombarded with attacks probing for vulnerabilities.
&lt;/p&gt;

&lt;p&gt;
We did a short experiment to see how bit.ly would react to a tinyurl.  Bit.ly handled it well.  Although, we suppose that an unknown URL shortner may not invoke a warning as our test did.

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;We used TinyUrl.com to create http://tinyurl.com/3bzuc8v from http://www.healthypasswords.com/&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; We then used bit.ly to create http://bit.ly/qSQEk1 from the tinyurl url.  &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt; We tried the second short url, which issued the following warning from bit.ly &lt;/p&gt; &lt;/li&gt;


&lt;p&gt;&lt;img width=&quot;75%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/SymantecMessageLabsShortUrl020.png&quot; alt=&quot;bit.ly warning&quot;&gt;&lt;/p&gt;

&lt;/li&gt;


&lt;/ol&gt;




</description>
					<pubDate>Tue, 05 Jul 2011 16:44:09 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Internet.Phishing.20110705164409.news.MiddleCenter.html</guid>
                </item>

<item><title>Tumblr Phishing Scam Compromises Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110629211159.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to &lt;a href=&quot;http://www.eweek.com/c/a/Midmarket/Phishing-Scam-on-Tumblr-Blogging-Site-Harvests-Thousands-of-Passwords-248801/&quot; target=&quot;_blank&quot;&gt;eWeek&lt;/a&gt;, security researchers at GFI Labs analyzed a Tumblr Phishing scam.  If you don't know what phishing is, see &lt;a href=&quot;http://www.healthypasswords.com/content.What_is_Phishing.html&quot;&gt;What is Phishing&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Tumblr is considered a micro blogging service.  This means users can post their writings, pictures, videos, favorite sites, and audio for other to see.  It's a cross between traditional blogs and twitter.  It's like a personal multimedia hub allowing you to publish your works.  Like Twitter, users follow other Tumblr users.  To learn more about Tumblr, see &lt;a href=&quot;/content.What_is_Tumblr.html&quot;&gt;What is Tumblr&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; According to the GFI researchers, &quot;Once a user has been compromised, the scammers hijack the user's Tumblr site and turns it into the fake login page. The account then &quot;follows&quot; other users. When users see a new follower and click on the name to see more information, they are shown the fake login page, restarting the attack cycle all over again.&quot;&lt;/p&gt;

&lt;p&gt;If you are a Tumblr user, we searched Tumblr a bit and found several references to the attack.  Tumblr user &quot;Positrons&quot; had this post about it&lt;/p&gt;

&lt;div class=&quot;Indented&quot;&gt;
Gained a new follower today. When I clicked their url to go to their page it said ‘this page has adult content blardy blah, please reenter your credentials’ so I did, email and password to tumblr. Then I looked at the url and it was ‘tumblrsecurity.com’ whenever you clicked any buttons like ‘about’ or whatever it lead to ‘this page does not exist’ I believe I may have just become the victim of a scam. At least I changed my password.&lt;br/&gt;&lt;br/&gt;
Tumblr user &quot;Positrons&quot; 
&lt;/div&gt;

&lt;p&gt;GFI and everal other Tumblr user posts indicated it was a confirmation for adult content that was the phishing page that stole their password.&lt;/p&gt;









</description>
					<pubDate>Wed, 29 Jun 2011 21:11:59 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110629211159.news.MiddleCenter.html</guid>
                </item>

<item><title>LastPass and ID Watchdog Announce Joint Venture to Deliver Credit Information</title>
                    <link>http://www.healthypasswords.com/Authentication.Passwords.20110628145317.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;br/&gt;
June 27, 2011 3:00PM EDT&lt;/p&gt;

&lt;p&gt; A &lt;a href=&quot;http://www.prnewswire.com/news-releases/id-watchdog-announces-agreement-with-lastpass-124620338.html&quot; target=&quot;_blank&quot;&gt; press release &lt;/a&gt; by ID Watchdaog, Inc of Denver, CO (TSXV:IDW) (OTC:IDWAF) announced an agreement with Lastpass to distribute credit alerts through the lastpass service.  
&lt;/p&gt;

&lt;p&gt; 
According to the release: &quot;Once the product integration is complete, LastPass customers will be able to routinely monitor their credit report with credit alerts distributed directly through the LastPass application at no additional cost to them.&quot;
&lt;/p&gt;

&lt;p&gt;
Lastpass has already built a very secure offering, requiring a unique password only known by the account owner, and not saved anywhere in the system.  If the account owner loses their password, the only option is to lose all vault data.  &lt;/p&gt;

&lt;p&gt;From a security standpoint, Laspass account owners can feel confident knowing they hold the only key to their password vault.  If however, the owner fails to protect their account by using poor passwords or allowing malware to install keyboard loggers, they could further compromise their security by combining credit information with password information.&lt;/p&gt;

&lt;p&gt;A big plus to the venture is &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_What_is_Multi-Factor_Authentication.html&quot;&gt; multi-factor authentication&lt;/a&gt;.  Lastpass offers several forms of multi-factor authentication, which could make the offering more secure than other credit monitoring services that only use email alerts or standard password authentication.&lt;/p&gt;

&lt;p&gt;Until Lastpass and ID Watchdaog announce more details of their offering everything is  speculation.&lt;/p&gt;

</description>
					<pubDate>Tue, 28 Jun 2011 14:53:17 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Passwords.20110628145317.news.MiddleCenter.html</guid>
                </item>

<item><title>Email May Be Your Most Important Password</title>
                    <link>http://www.healthypasswords.com/Email.Passwords.20110628114506.news.MiddleCenter.html</link>
                    <description>Ken Klein, Healthy Passwords&lt;br/&gt;
June 28, 2011 11:40 AM EDT&lt;/p&gt;

&lt;p&gt;Did you know your email account may be the most important account you have?  &lt;/p&gt;

&lt;p&gt;When hackers get your email login, they can sit back and watch your email.  If they are patient, they will see what banks you use and what friends you correspond with.  They will slowly learn your daily habits.  When the time is just right, they can strike.&lt;/p&gt;

&lt;p&gt;The classic email hack is when someone gets access and immediately send email to every person in the address book.  They impersonate you, claiming to be out of the country traveling, robbed and asking for a wire transfer.  Most of your friends and associates won’t fall for this trick any more.&lt;/p&gt;

&lt;p&gt;When a smart criminal gains access to email, they don’t immediately act.  They sit back and watch a while.  Most people book travel online and get the details in email.  If they wait to they see you’re on vacation.  They can then easily send the email to all your friends and sound very credible.  They know where you went, when you left, when you got there.  If your friends know you just went to Aruba and the next morning they see an email from you saying you were robbed, are stranded, and need a wire-transfer, they’re likely to run to western union right away.&lt;/p&gt;

&lt;p&gt;When you lose your password and click “forgot my password”, how is the account reset?  For most things they send a temporary password to your email account.  If someone has your email account, they can easily start forgetting passwords and getting access to your important things.  Luckily, most financial institutions have stopped using email as a primary password reset.  But many other sites still use it.  &lt;/p&gt;

&lt;p&gt;If you want an easy way to secure your email, try using  &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_What_is_Multi-Factor_Authentication.html&quot;&gt;2-step authentication&lt;/a&gt;.  It’s only offered by a few email providers.  Google is the biggest.  We have step-by-step directions at &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_How_To_Setup_Google_2-Step_verification.html&quot;&gt;Healthy Passwords&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Do you have a story to share or good idea on this topic?  Please share if you do.&lt;/p&gt;

&lt;p&gt;###&lt;/p&gt;






</description>
					<pubDate>Tue, 28 Jun 2011 11:45:06 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Email.Passwords.20110628114506.news.MiddleCenter.html</guid>
                </item>

<item><title>Are You Trading Convenience for Security</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Website.20110625155843.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;br/&gt;
June 25, 2011 4:00 PM EDT&lt;/p&gt;

&lt;p&gt;You’re at a website and want to participate.  You have a choice to create a new account or use Facebook to login.  Which do you choose?&lt;/p&gt;

&lt;p&gt;If you’re like most people, you pick the easier way.  According to research by unsubscribe.com users use Facebook to login at third-party sites, every three days.  This grants long-term access to more than you think.  &lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/FacebookAppSecurity060.png&quot; alt=&quot;Too Much Access Granted&quot;/&gt; &lt;/p&gt;

&lt;p&gt;From an authentication (user name / password) perspective, fewer logins means fewer places your email and password are stored.  Using one password is better than leaving breadcrumbs all over the internet waiting for the next big breach, isn’t it?  &lt;/p&gt;

&lt;p&gt;Logins using social network accounts just swaps risk.   Every time a social network ID, such as Facebook, is used to authenticate at another site, the user provides long-term access to their social networking data.   The amount of access varies, but it’s not uncommon to grant access to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;	Your Posts &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt; Your Favorites &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;	Your Friends &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;	Your Important Dates  &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By granting access to third parties you &lt;em&gt;legally&lt;/em&gt; give corporations access to your data.  Besides being a dream for marketers, this type of access can also add additional cross site scripting vulnerabilities to your linked social network account while on the third party site.   
Most apps only can access your data while you’re at their site, but some apps require “Access My Data at Any Time”. &lt;/p&gt;

&lt;p&gt;It’s a tough decision.  Businesses are being compromised at alarming rates.  A recent New York Times Blog Post sites a new Ponemon Institute survey of 581 security professionals broadly agreeing that cyber attacks are getting more frequent, more severe, and harder to detect and stop.  Ponemon also shows that many breaches are caused by human error.  Too much access increases risk.&lt;/p&gt;

&lt;p&gt;Most people use a single password for multiple logins, exposing them to potential loss.  Creating an account at every site you contribute to multiplies this risk.  On the other hand, Facebook and Twitter have adequate staffing to secure user credentials.  They’re not infallible, but they are less likely to lose your password than many other sites.  What’s a good balance?&lt;/p&gt;

&lt;p&gt;Two options are:  Login using the social network credentials, and revoke access after your done (instructions for this are at Healthy Passwords).    Use a password manager to generate unique passwords.  We don’t advocate using password managers for high risk sites, but they can be a good tool for low to moderate risk sites.  Just be sure to look at password manager reviews before choosing one.&lt;/p&gt;






</description>
					<pubDate>Sat, 25 Jun 2011 15:58:43 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Website.20110625155843.news.MiddleCenter.html</guid>
                </item>

<item><title>Wireless Router Freeloaders Can Get You in Trouble</title>
                    <link>http://www.healthypasswords.com/WiFi.Encryption.20110624201034.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;br/&gt;
March 24, 2011 (Last Updated 6/24/2011)&lt;/p&gt;

&lt;p&gt;A few months ago, there were two stories where innocent persons were arrested because someone else used their wireless access point.  Police seem to have finally wised up and do a little research before busting down doors now, but you still need to be careful.  This is a listing we keep updated.
&lt;/p&gt;

&lt;ul&gt;

	&lt;li&gt;

		&lt;a href=&quot;http://timonium.patch.com/articles/man-used-neighbors-internet-network-to-access-child-porn&quot; target=&quot;_blank&quot;&gt;Timonium, Maryland - June 24, 2011&lt;/a&gt;

	&lt;/li&gt;

	&lt;li&gt;

		&lt;a href=&quot;http://www.corrections.com/news/article/28268-child-pornography-conviction-reveals-disturbing-national-trend-&quot; target=&quot;_blank&quot;&gt;Fort Wainwright, Alaska - March 24, 2011&lt;/a&gt;

	&lt;/li&gt;

	&lt;li&gt;

		&lt;a href=&quot;http://www.kplctv.com/Global/story.asp?S=14282489&quot; target=&quot;_blank&quot;&gt;Portland, OR Arrest - March 19, 2011&lt;/a&gt;

	&lt;/li&gt;



	&lt;li&gt;

		&lt;a href=&quot;http://www.wivb.com/dpp/news/crime/Police-seeking-pedophile-raid-wrong-home&quot; target=&quot;_blank&quot;&gt;Buffalo, NY Arrest - March 18, 2011&lt;/a&gt;

	&lt;/li&gt;

	&lt;li&gt;

		&lt;a href=&quot;http://www.heraldtribune.com/article/20110131/ARTICLE/101311038?p=1&amp;tc=pg&amp;tc=ar&quot; target=&quot;_blank&quot;&gt;Sarasota, FL Arrest - January 30, 2011&lt;/a&gt;

	&lt;/li&gt;

&lt;/ul&gt;




&lt;p&gt;Locking down your wireless network is one of the most important things you can do to keep your home safe.  Following is an excerpt from page 65-66 and 127-129 of Healthy Passwords about wireless security:&lt;/p&gt;



&lt;iframe width=&quot;80%&quot; height=&quot;300px&quot; src=&quot;http://www.healthypasswords.com/excerpts/wirelesslockdown.html&quot;&gt;&lt;/iframe&gt;


&lt;iframe src=&quot;http://rcm.amazon.com/e/cm?t=healtpassw-20&amp;o=1&amp;p=8&amp;l=as1&amp;asins=B002TLTG9E&amp;ref=tf_til&amp;fc1=45382C&amp;IS2=1&lt;1=_blank&amp;m=amazon&amp;lc1=294A49&amp;bc1=000000&amp;bg1=EDEDA9&amp;f=ifr&quot; style=&quot;width:120px;height:240px;&quot; scrolling=&quot;no&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; frameborder=&quot;0&quot;&gt;&lt;/iframe&gt;








</description>
					<pubDate>Fri, 24 Jun 2011 20:10:34 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/WiFi.Encryption.20110624201034.news.MiddleCenter.html</guid>
                </item>

<item><title>Microsoft Phone Scam Gets More Believable</title>
                    <link>http://www.healthypasswords.com/Hoaxes.Phone.20110623104223.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to a recent &lt;a href=&quot;http://www.healthypasswords.com/content.Idaho_Press_Tribune-Computer_Virus_Scammers_can_call_you_on_the_phone.html&quot; &gt;article in the Idaho Press-Tribune&lt;/a&gt;, virus phone scammers may be making their phone ploy much more believable.  &lt;/p&gt;

&lt;p&gt;Dale Dixon, the president/CEO of the Better Business Bureau, received a call from a user who was working on his computer when a fake virus warning popped up.  He recognized it as a scam and turned off the computer.  His phone then rang and someone with a foreign accent, claiming to be from Microsoft Support, was calling to help fix the problem for a fee.&lt;/p&gt;

&lt;div class=&quot;IndentedLarge&quot;&gt;
&lt;p&gt;Dale then spoke to the owner of a local computer repair company, who told him they have been hearing of this same thing.&lt;/p&gt;
&lt;/div&gt;

&lt;p&gt;It will be interesting to see if this truly is a new level of the old scam, or just a creepy coincidence.   It is possible for this to work:  If the malware first mines your computer and finds a phone number, it can alert the &quot;Call Center&quot; telling them when to call you.  This will of course most likely be immediately after the fake pop-up appears on your screen. &lt;/p&gt;

&lt;p&gt;No legitimate company monitors for viruses and calls when they happen.  If you get a pop-up like this, get your computer checked by a local professional you trust.  The best way to find a good local computer repair person is by asking friends and other business who they use.  Don't trust ads in the paper.  If you do try someone from an ad, do a little research first.  It's worth the time to drive to their office and see what it looks like.  Also keep in mind the the big box electronics store technical support does not always have the best trained personnel.&lt;/p&gt;





</description>
					<pubDate>Thu, 23 Jun 2011 10:42:23 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hoaxes.Phone.20110623104223.news.MiddleCenter.html</guid>
                </item>

<item><title>Wordpress Proactively Finds Tampering, Resets all User Passwords</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Website.20110621212006.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Wordpress.org just released a &lt;a href=&quot;http://wordpress.org/news/2011/06/passwords-reset/&quot; target=&quot;_blank&quot;&gt; blog entry &lt;/a&gt; describing suspicious comments about cleverly disguised backdoors in three word press add ons.  As a proactive measure, they reset all wordpress passwords.&lt;/p&gt;

&lt;p&gt;We applaud WordPress for their diligence!&lt;/p&gt; 





</description>
					<pubDate>Tue, 21 Jun 2011 21:20:06 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Website.20110621212006.news.MiddleCenter.html</guid>
                </item>

<item><title>Dropbox Security Flaw Allowed Open Access to All Accounts</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Storage.20110620201459.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;According to a &lt;a href=&quot;http://pastebin.com/yBKwDY6T&quot; target=&quot;_blank&quot;&gt;post on pastbin&lt;/a&gt; by Christopher Soghoian, a Washington, DC Security and Privacy Researcher, for a four hour period yesterday, any dropbox account could be accessed using any password.&lt;/p&gt;

&lt;p&gt;According to &lt;a href=&quot;http://www.geek.com/articles/news/dropbox-security-glitch-meant-any-password-worked-yesterday-20110620/,&quot;&gt;Geek.com&lt;/a&gt;, Dropbox found out because a friend of Christopher Soghoian accidentally fat fingered their password and noticed it.  That person tried it again then tried a different person's account with the same result.  Had that person not contacted dropbox's helpdesk, the problem may have gone on for much longer. &lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/DropBox_Logo.png&quot; alt=&quot;Drop Box Logo&quot;/&gt;&lt;/p&gt;

&lt;p&gt;DropBox has posted a &lt;a href=&quot;http://blog.dropbox.com/?p=821&quot; target=&quot;_blank&quot;&gt; blog response &lt;/a&gt; detailing the incident.&lt;/p&gt;

&lt;div class=&quot;Indented&quot;&gt; 

&lt;p&gt;Yesterday we made a code update at 1:54pm Pacific time that introduced a bug affecting our authentication mechanism. We discovered this at 5:41pm and a fix was live at 5:46pm.&lt;/p&gt;

&lt;p&gt;We’re conducting a thorough investigation of related activity to understand whether any accounts were improperly accessed. If we identify any specific instances of unusual activity, we’ll immediately notify the account owner. If you’re concerned about any activity that has occurred in your account, you can contact us at support@dropbox.com.&lt;/p&gt;

&lt;/div&gt;

&lt;p&gt;If you're not familiar with Dropbox.  It is an online file backup, sharing service.  Once you create a Dropbox account, you can copy files to your Dropbox from one computer and they will automatically synchronize across multiple devices and be available in a web Dropbox via browser. 
&lt;p&gt;












</description>
					<pubDate>Mon, 20 Jun 2011 20:14:59 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Storage.20110620201459.news.MiddleCenter.html</guid>
                </item>

<item><title>Sega Pass Website Breached</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110618085821.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;On Thursday, June 16, 2011, Sega shutdown public access to it's Sega Pass network.  Sega sent emails to it's users explaining breach including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;emails addresses&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;dates of birth&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;encrypted passwords&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; In the announcement, Sega said &quot;To stress, none of the passwords obtained were stored in plain text.&quot;&lt;/p&gt;

&lt;p&gt;Encrypted passwords are much better than other recent breaches at Sony and Writerspot, where the passwords were stored in plain text.  Coming days will reveal the strength of the encryption used.  If weak, publicly known, hashing algorithms were used, we may still see posted password lists in the near future.&lt;p&gt;

&lt;p&gt;It's time for companies to wise up.  They should store usernames in a different place than passwords and join the two using meaningless keys.  This makes it much harder to compromise a system, since the attackers must compromise two different systems to join the data.  See &lt;a href=&quot;http://www.healthypasswords.com/news.It_is_Time_for_Website_Login_Credential_Compliance_Programs.html&quot;&gt;It is Time for Website Login Credential Compliance Programs &lt;/a&gt;for ideas websites can use to improve authentication security. 
&lt;/p&gt;

&lt;h3&gt;June 20, 2011 - Update&lt;/h3&gt;

&lt;p&gt;According to &lt;a href=&quot;http://www.reuters.com/article/2011/06/19/us-sega-hackers-idUSL3E7HJ01520110619&quot;&gt;Reuters&lt;/a&gt;, 1.3 million customers had data stolen&lt;/p&gt;</description>
					<pubDate>Sat, 18 Jun 2011 08:58:21 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110618085821.news.MiddleCenter.html</guid>
                </item>

<item><title>It is Time for Website Login Credential Compliance Programs</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110617113000.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;By Ken Klein, Healthy Passwords&lt;br/&gt;
June 17, 2011 11:30AM EST&lt;/p&gt;

&lt;p&gt;Yesterday's posting of 66,000 stolen email and passwords by a prominent hacker group illustrates a huge problem.  Password reuse is as bad as leaving your credit cards laying on your car dashboard.  
&lt;/p&gt;

&lt;p&gt;It's time to talk about reforming website regulation around authentication.  In 2004 the Payment Card Industry Security Standards Council (PCI SCC) was formed to combat this same problem with credit card data.  Because a handful of large card issuers had a big stake in the problem, getting them to join forces and create standards was easier than any state sponsored or voluntary effort.  &lt;/p&gt;

&lt;p&gt;If a website accepts credit cards as payment, they must meet the PCI requirements.  These are enforced by annual questionnaire for low volume vendors and audited by third parties for large volume vendors.  &lt;/p&gt;

&lt;p&gt;The high level requirements set by the standard include a few common-sense practices such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;	Storing cardholder data on the non-public side of a firewall.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Encryption of cardholder data across open public networks.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Business policies restricting cardholder data access.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Regularly testing security systems and processes.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;There are many more, but the key is first having a set of standards then auditing for compliance.  &lt;/p&gt;

&lt;p&gt;The nature of the web has been innovation.  Web entrepreneurs don’t have to create business plans, find investors, lawyers, and accountants before starting their business.  They just need a credit card, 5.99 a month and a developer.  For the technically inclined, starting a web business is easy.  They can cobble together a website that looks as good as any other.  If they happen to time it right, or hit a niche that others missed, they can take off and before you know it, they have collected a few hundred thousand email addresses and passwords that are ripe for hacking.  &lt;/p&gt;

&lt;p&gt;The proper way doesn’t have to take a big budget.  It does however, require knowledge.  Secure sites architect a secure solution before they start building the site.  They think about how “authentication” (usernames and passwords) will happen and they think about how to secure them.  &lt;/p&gt;

&lt;p&gt;PCI works for credit cards because card issuers can revoke a sites ability to accept their when sites fail to comply.  There is no such luxury for the authentication problem.  &lt;/p&gt;

&lt;p&gt;The best way to solve this problem is for users to ask websites about their security before giving any information.  The questions you should ask are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;	Is your login screen completely hosted on an encrypted connection?
&lt;li&gt;&lt;p&gt;Do you store username/email and passwords on the same server the website runs on?&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Do you hash or encrypt passwords?&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Do you separate the authentication pairs (username / password) onto different systems, making one compromised credential useless without the other? &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Do you outsource authentication.  If so, do they adhere to the previous four rules?&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Sending an email and waiting for a response that may never come is not practical when the site has something you need.  If enough people start asking questions, sites will begin to feel threatened if they cannot answer them, and start fixing their problems.  &lt;/p&gt;

&lt;p&gt;The best option for you is this:  If you visit a site that wants your username and password. Send them the email asking the five questions.  Then use a junk email account that you use for nothing important or even create an email account just for that site.  Use the junk email and an appropriate junk password counterpart.  If they are compromised, you will not be jeopardizing anything.  You also will reduce your primary inbox spam.&lt;/p&gt;






</description>
					<pubDate>Fri, 17 Jun 2011 11:30:00 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110617113000.news.MiddleCenter.html</guid>
                </item>

<item><title>And the winner once again is 123456</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110616130226.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;LulzSec Disclosed 66000 user emails and passwords.  We just crunched the numbers and here are the top ten results:&lt;/p&gt;
&lt;p&gt;
Password -&gt; Count
&lt;br/&gt; 123456 -&gt; 569
&lt;br/&gt; 123456789 -&gt; 184
&lt;br/&gt; password -&gt; 133
&lt;br/&gt; romance -&gt; 88
&lt;br/&gt; 102030 -&gt; 68
&lt;br/&gt; mystery -&gt; 67
&lt;br/&gt; ajcuivd289 -&gt; 62 (55 used a lower and 7 used AjcuiVd289)
&lt;br/&gt; shadow -&gt; 62
&lt;br/&gt; tigger -&gt; 62 
&lt;br/&gt; 123 -&gt; 55 
&lt;/p&gt;
&lt;p&gt;Note:  Case sensitivity was not considered in this comparison. &lt;/p&gt;

&lt;p&gt; Slots one two and three are expected.  Lulzsec did not specify where this data came, and many times passwords can be derived by the context of the site they are for.  Looking at this data, it looks like many of the passwords may have come from a source related to books and reading.  In the top ten, only romance and mystery fit that theme, but going through the long list, there were many other indications leaning this way. &lt;/p&gt;


&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-2913918306276089&quot;;
/* ajcuivd2892 */
google_ad_slot = &quot;3212386111&quot;;
google_ad_width = 234;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;



&lt;p&gt; One very strange password in the top 10 was ajcuivd289.  Going through the source, this is legitimately listed for 62 different emails (note: 7 of these used the mixed case variant of AjcuiVd289). &lt;/p&gt;

&lt;p&gt; We tried doing some google searches for ajcuivd289 to see what it may be, and surprisingly, this led to the discovery of many sites which have google indexed password lists.  We won't disclose those here, but we suggest anyone using that password to change it.
&lt;/p&gt;

&lt;h3&gt;Password Length&lt;/h3&gt;

&lt;p&gt; Password length was decent.  67% of the passwords in the file were longer than six characters and 50% were at least eight characters.  Here's the breakdown on password length:&lt;/p&gt;
&lt;p&gt;
31% -&gt; 6 characters&lt;br/&gt;
26% -&gt; 8 characters&lt;br/&gt;
17% -&gt; 7 characters&lt;br/&gt;
10%  -&gt; 9 characters&lt;br/&gt;
6.5%  -&gt; 10 characters&lt;br/&gt;
&lt;/p&gt;

&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-2913918306276089&quot;;
/* ajcuivd2892 */
google_ad_slot = &quot;3212386111&quot;;
google_ad_width = 234;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;


&lt;h3&gt;Complexity&lt;/h3&gt;

&lt;p&gt; Password complexity was very bad in this data.  

&lt;p&gt; From worst to best &lt;br/&gt;
numbers only --&gt; 20% &lt;br/&gt;
letters only --&gt; 44% &lt;br/&gt;
numbers and letters --&gt; 35% &lt;br/&gt;
letters and special characters --&gt; 1% &lt;br/&gt;
Numbers, letters, and special characters --&gt; 1% &lt;br/&gt;
&lt;/p&gt;



&lt;script type=&quot;text/javascript&quot;&gt;&lt;!--
google_ad_client = &quot;ca-pub-2913918306276089&quot;;
/* ajcuivd2892 */
google_ad_slot = &quot;3212386111&quot;;
google_ad_width = 234;
google_ad_height = 60;
//--&gt;
&lt;/script&gt;
&lt;script type=&quot;text/javascript&quot;
src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot;&gt;
&lt;/script&gt;







</description>
					<pubDate>Thu, 16 Jun 2011 13:02:26 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110616130226.news.MiddleCenter.html</guid>
                </item>

<item><title>Phone Virus Scams</title>
                    <link>http://www.healthypasswords.com/Hoaxes.Phone.20110616121501.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;This was a story we originally posted in early April.  Around mid May we stopped seeing these stories in the US news, but they continued main in the Ireland, the United Kingdom, Australia, and New Zealand.  This week, Microsoft released a study on this subject.  You can view the study titled, Microsoft Survey Reveals Extent of Emerging Internet Phone Scam, &lt;a href=&quot;http://www.microsoft.com/Presspass/press/2011/jun11/06-16MSPhoneScamPR.mspx&quot; target=&quot;_blank&quot;&gt; here&lt;/a&gt;.  &lt;/p&gt;

&lt;p&gt;Microsoft surveyed 7,000 computer users in the U.K., Ireland, U.S. and Canada.  Here are some details from the Survey:&lt;p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;p&gt;The survey showed that across all four countries, 15 percent of people had received a call from scammers. In Ireland this rose to 26 percent.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt; &lt;p&gt;Of those who received a call, 22 percent, or 3 percent of the total survey sample, were deceived into following the scammers’ instructions, which ranged from permitting remote access to their computer and downloading software code provided by the criminals to providing credit card information and making a purchase.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt; &lt;p&gt; The vast majority (79 percent) of people deceived in this way suffered some sort of financial loss. Seventeen percent said they had money taken from their accounts, 19 percent reported compromised passwords and 17 percent were victims of identity fraud. More than half (53 percent) said they suffered subsequent computer problems.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Across all four countries surveyed, the average amount of money stolen was $875 (U.S.), ranging from $82 (U.S.) in Ireland up to $1,560 (U.S.) in Canada. The average cost of repairing damage caused to computers by the scammers was $1,730 — rising to $4,800 in the U.S.&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;We will continue to update this post whenever we see a news related to this.&lt;/p&gt;

&lt;h3&gt;Original Healthy Passwords Post&lt;h3&gt;
&lt;p&gt;
This is a daily story hitting local newspapers all over.  A person receives a phone call from someone claiming to be from Microsoft, McAfee, Norton, or some other legitimate sounding company.  They tell the user they have a virus and they will remove it for them over the phone. If the victim falls for it, they will stay on the phone while the person sits down at the computer and gives them access.  Once they have access, they install malware and viruses and try talking the user into paying them for their service.  
&lt;/p&gt;

&lt;p&gt; Don't ever fall for this type of scam.  &lt;/p&gt;

&lt;br/&gt;References:

&lt;br/&gt;&lt;a href=&quot;http://www.police.govt.nz/news/release/29249.html&quot; target=&quot;_blank&quot;&gt;09/01/2011 - NZ - Tauranga&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.woodstocksentinelreview.com/ArticleDisplay.aspx?e=3269753&quot; target=&quot;_blank&quot;&gt; 8/23/2011 - CA - Woodstock &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.lacdubonnetleader.com/ArticleDisplay.aspx?e=3267053&quot; target=&quot;_blank&quot;&gt; 8/22/2011 - CA - North Eastman&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.gladstoneobserver.com.au/story/2011/08/22/beware-microsoft-phone-scam-gladstone/&quot; target=&quot;_blank&quot;&gt; 8/22/2011 - AU - Gladstone&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://winnipeg.ctv.ca/servlet/an/local/CTVNews/20110818/wpg_virus_scam_110818/20110818/?hub=WinnipegHome&quot; target=&quot;_blank&quot;&gt; 8/18/2011 - CA - Winnipeg &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.therecord.com/news/local/article/579638--police-warn-of-phone-scam-offering-anti-virus-software&quot; target=&quot;_blank&quot;&gt; 8/17/2011 - CA - Waterloo - Trial Subscription Expired &lt;/a&gt; This one is a bit different: According to the article, the caller cautions that a three-month trial has expired and requests payment via credit card to continue the service. He or she then asks residents to go online and visit the company website to download the update, which police say allows the perpetrators to access computers remotely.

&lt;br/&gt;&lt;a href=&quot;http://www.fox10tv.com/dpp/news/local_news/baldwin_county/scammers-use-public-sites-to-gain-info&quot; target=&quot;_blank&quot;&gt; 8/16/2011 - US - FL - Pensacola &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.baldwincountynow.com/articles/2011/08/16/local_news/doc4e4a88e90a1f2011029078.txt&quot;&gt;8/16/2011 - US - Alabama - Fairhope &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.hemeltoday.co.uk/news/local/keep_an_eye_out_for_computer_conmen_1_2961277&quot; target=&quot;_blank&quot;&gt; 8/12/2011 - UK - Hertfordshire&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.hemeltoday.co.uk/news/local/keep_an_eye_out_for_computer_conmen_1_2961277&quot; target=&quot;_blank&quot;&gt; 8/11/2011 - CA - Orangeville

&lt;br/&gt;&lt;a href=&quot;http://cowracommunitynews.com/viewnews.php?newsid=7777&amp;id=47&quot; target=&quot;_blank&quot;&gt; 8/6/2011 - AU - Cowra, Albury &lt;/a&gt;
&lt;br/&gt;&lt;a href=&quot;http://www.localnews8.com/news/28758429/detail.html&quot; target=&quot;_blank&quot;&gt; 8/4/2011 - US - ID - Bonneville County &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.nipawinjournal.com/ArticleDisplay.aspx?e=3242213&quot; target=&quot;_blank&quot;&gt; 8/3/2011 - CA - Saskatchewan &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.dorsetecho.co.uk/news/9172342.Dorset_pensioners_warned_to_beware_phone_scam/&quot; target=&quot;_blank&quot;&gt; 8/2/2011 - UK - Dorset &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://thenelsondaily.com/news/general/microsoft-not-calling-12830&quot; target=&quot;_blank&quot;&gt; 7/31/2011 - CA - BC - Nelson&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.bclocalnews.com/news/125781683.html&quot; target=&quot;_blank&quot;&gt; 7/19/2011 - CA - BC - 
 White Rock&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.wgil.com/localnews.php?xnewsaction=fullnews&amp;newsarch=072011&amp;newsid=123&quot; target=&quot;_blank&quot;&gt; 7/16/2011 - US - Illinois - Galesburg - This article adds a detail no others have, which is the caller directs the victim to go to ammyy.com to download the remote support application.&lt;/a&gt;

&lt;h3&gt;Scammers have been using Ammyy.com&lt;/h3&gt;
&lt;img width=&quot;75%&quot; src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/ammy_com_image.png&quot; alt=&quot;Scammers use Ammyy.com for remote control&quot;&gt;
&lt;p&gt;Ammyy.com may be a legitimate site, although a quick google search for it reveals more references to scams than legitimacy.  Also keep in mind that scammers could just as easily use gotomypc or logmein or any other reputable remote control software.  &lt;/p&gt;

&lt;br/&gt;&lt;a href=&quot;http://ashburn.patch.com/articles/sheriffs-office-warns-of-computer-tech-phone-scam&quot; target=&quot;_blank&quot;&gt; 7/16/2011 - US - Virginia - Ashburn&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.woai.com/news/local/story/Fake-Microsoft-technicians-behind-a-new-telephone/1PcwZ9K7GEOP0y2fEAWYKg.cspx&quot; target=&quot;_blank&quot;&gt; 7/15/2011 - US - Texas - San Antonio&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.globalregina.com/Anti+Virus+Software+Scam+sweeps+Alberta/5091669/story.html&quot; target=&quot;_blank&quot;&gt; 7/14/2011 - CA - Alberta - Calgary&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.kktv.com/home/headlines/Computer_Virus_Scam_Circulating_Southern_Colorado_125614123.html&quot;_blank&quot;&gt; 7/14/2011 - US - Colorado &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.leaderpost.com/business/Phone+scam+targets/5093557/story.html&quot; target=&quot;_blank&quot;&gt; 7/13/2011 - CA - Saskatchewan  &lt;/a&gt;


&lt;br/&gt;&lt;a href=&quot;http://www.democratherald.com/news/local/article_958a8e78-a9cf-11e0-a9a0-001cc4c002e0.html&quot; target=&quot;_blank&quot;&gt; 7/9/2011 - US - New York - Albany&lt;/a&gt; - This one sounds a little different than the Microsoft scammers with India accents.  These scammers pretend to be from computer support companies in New York.

&lt;br/&gt;&lt;a href=&quot;http://hqcomoxvalley.com/news/local/news/Local/11/07/8/TELUS-warns-of-recent-computer-security-phone-scam/&quot; target=&quot;_blank&quot;&gt; 7/8/2011 - CA - BC - Comox Valley &lt;/a&gt; 

&lt;br/&gt;&lt;a href=&quot;http://www.portageonline.com/index.php?option=com_content&amp;task=view&amp;id=22911&amp;Itemid=468&quot; target=&quot;_blank&quot;&gt; 7/8/2011 - CA - Manitoba - Phone Scammers At Work Again &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.northernadvocate.co.nz/local/news/virus-scammers-leave-couple-at-risk/3958510/&quot; target=&quot;_blank&quot;&gt; 7/7/2011 - NZ - Whangarei - Northern Advocate - Virus scammers leave couple at risk&lt;/a&gt;


&lt;br/&gt;&lt;a href=&quot;http://cd989.com/2011/07/another-phone-scam-hits-norfolk-county/&quot; target=&quot;_blank&quot;&gt; 7/4/2011 - CA - Ontario - Another phone scam hits Norfolk County.&lt;/a&gt;


&lt;br/&gt;&lt;a href=&quot;http://www.lfpress.com/news/london/2011/07/03/18369016.html&quot; target=&quot;_blank&quot;&gt; 7/4/2011 - UK - London - Microsoft scam in our area&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.loudountimes.com/index.php/news/article/sheriffs_office_warns_of_telephone_scam123/&quot; target=&quot;_blank&quot;&gt; 6/29/2011 - US - Virginia - Sheriff’s Office warns of telephone scam&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.bendigoadvertiser.com.au/news/local/news/general/phone-scammers-targeting-bendigo/2207244.aspx&quot; target=&quot;_blank&quot;&gt; 6/26/2055 - Canada - Bendigo - Phone scammers targeting Bendigo&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.thebramptonnews.com/articles/5268/1/Fraud-Bureau-Warning-Residents-of-Computer-Scam/Page1.html&quot; target=&quot;_blank&quot;&gt;6/25/2011 - Canada - Brampton - Fraud Bureau Warning Residents of Computer Scam&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.northernlife.ca/news/policeandCourt/2011/06/24-scam-computer-virus-malware-sudbury.aspx&quot; target=&quot;_blank&quot;&gt;6/24/2011 - Canada - Phone scam leads to computer hacking&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.newson6.com/story/14635517/computer-scam&quot; target=&quot;_blank&quot;&gt;5/12/2011 - US, Oklahoma Oklahomans Hit By Scam Targeting Computers With Viruses &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://icperthshire.icnetwork.co.uk/tm_headline=beware-of-01764-phone-scam%26method=full%26objectid=28555881%26siteid=64054-name_page.html#story_continue&quot; target=&quot;_blank&quot;&gt; 4/22/2011 - UK, Strath - Beware of 01764 phone scam&lt;/a&gt;
&lt;br/&gt;&lt;a href=&quot;http://www.therepublic.com/view/local_story/Sheriff_warns_of_computer_viru_1302797331/&quot; target=&quot;_blank&quot;&gt; 4/14/2011 - US, Columbus IN - Sheriff warns of computer-virus scam&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.techwatch.co.uk/2011/04/12/users-warned-of-windows-support-centre-scam/&quot; target=&quot;_blank&quot;&gt; 4/12/2011 - UK - Users warned of Windows Support Centre scam&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.globalsaskatoon.com/Strathmore+falls+victim+Virtual+Doctor/4577954/story.html&quot; target=&quot;_blank&quot;&gt; 4/8/2011 - CA - Strathmore man falls victim to Virtual PC Doctor &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.wirralglobe.co.uk/news/8961405.Warning_over_computer_virus_phone_scam/&quot; target=&quot;_blank&quot;&gt; 4/7/2011 - UK - Warning over computer virus phone scam &lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.warwickdailynews.com.au/story/2011/04/07/fake-company-scams-residents-warwick-phone-calls/&quot; target=&quot;_blank&quot;&gt; 4/7/2011 - AU - Fake company scams residents&lt;/a&gt;

&lt;br/&gt;&lt;a href=&quot;http://www.kget.com/news/local/story/Contact-17-Investigation-New-computer-hacking-scam/hqU5eMVHxE-v40sbHvTyvg.cspx&quot; target=&quot;_blank&quot;&gt;3/30/2011 - US - Contact 17 Investigation - New computer hacking scam &lt;/a&gt;


&lt;p&gt;This Symantec video details one phone scam type.  Symantec contacted a suspected illegitimate online support service.  Most of the incidents documented in this article involve you being called by the perpetrator&lt;/p&gt;

&lt;object style=&quot;height: 390px; width: 640px&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/WhV6rIgyQ-s?version=3&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/WhV6rIgyQ-s?version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;390&quot;&gt;&lt;/object&gt;


&lt;p&gt; If you receive one of these calls, please leave a comment below. &lt;/p&gt;




































</description>
					<pubDate>Thu, 16 Jun 2011 12:15:01 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hoaxes.Phone.20110616121501.news.MiddleCenter.html</guid>
                </item>

<item><title>It is Monthly Patch Time Windows Users</title>
                    <link>http://www.healthypasswords.com/Patches.Microsoft.20110616095047.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein&lt;br/&gt;
2011-06-16 9:50 EST&lt;/p&gt;

&lt;p&gt;The Information Technology world knows that the second Tuesday of every month is &quot;Microsoft patch Tuesday&quot;.  By Thursday, you should have been prompted to update Windows.  If you did not get prompted, you should check your settings.  See &lt;a href=&quot;http://www.healthypasswords.com/content.How_to_Check_Windows_Update.html&quot;&gt;how to check for Windows Update&lt;/a&gt; for more details.&lt;/p&gt;

&lt;p&gt;For details on what's in the patches this month see &lt;a href=&quot;http://krebsonsecurity.com/2011/06/microsoft-patches-fix-34-security-flaws/&quot; target=&quot;_blank&quot;&gt;Brian Krebs KrebsOnSecurity - Microsoft Patches Fix 34 Security Flaws&lt;/a&gt;&lt;?p&gt;

&lt;p&gt;Adobe also released a large patch for Acrobat and Reader.  &lt;a href=&quot;http://krebsonsecurity.com/2011/06/adobe-ships-security-patches-auto-update-feature/&quot; target=&quot;_blank&quot;&gt;KrebsOnSecurity, has a great explanation.&lt;/a&gt;  The important thing about this update from Adobe is it includes a new updater, which will automatically take care of future updates.  If you use Secunia PSI and/or Qualys Browser Check, you should have been warned first there when your browser came up this morning.  See &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_Patching_Popular_Software_Vulnerabilities.html&quot;&gt; Patching Popular Software Vulnerabilities &lt;/a&gt; For more information on these.&lt;/p&gt;
</description>
					<pubDate>Thu, 16 Jun 2011 09:50:47 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Patches.Microsoft.20110616095047.news.MiddleCenter.html</guid>
                </item>

<item><title>Phone Apps expose user passwords</title>
                    <link>http://www.healthypasswords.com/Vulnerability.IOS.20110611115418.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein&lt;br/&gt;
June 11, 2011 14:05PM EST&lt;/p&gt;

&lt;p&gt;
According to Security firm viaForensics many popular iPhone and Android apps have major security flaws in the way they store user data.  You can look at their listing at &lt;a href=&quot;http://viaforensics.com/appwatchdog/&quot; target=&quot;_blank&quot;&gt;viaforensics.com/appwatchdog/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Browsing through the listings on 6/11/2011, the two worst one's we could find are listed.  According to viaForensics, they both store unencrypted password data.
&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;
&lt;a href=&quot;http://viaforensics.com/appwatchdog/android-mail-exchange-android.html&quot;&gt;Android Mail (Exchange)&lt;/a&gt; - The password is stored without encryption on the device.
&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;&lt;a href=&quot;http://viaforensics.com/appwatchdog/android-mail-hotmail-android.html&quot;&gt;Android Mail (Hotmail)&lt;/a&gt; - The password is stored without encryption on the device.
&lt;/p&gt;&lt;/li&gt;

&lt;/ol&gt;





</description>
					<pubDate>Sat, 11 Jun 2011 11:54:18 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.IOS.20110611115418.news.MiddleCenter.html</guid>
                </item>

<item><title>Computer repairman accused of taking nude pictures of women remotely</title>
                    <link>http://www.healthypasswords.com/Hoaxes.Webcams.20110610112811.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein&lt;br/&gt;
June 10, 2011 18:11 EST&lt;/p&gt;

&lt;p&gt;The &lt;a href=&quot;http://latimesblogs.latimes.com/lanow/2011/06/computer-repairman-arrested-for-allegedly-taking-hundreds-of-nude-pictures-of-women-remotely.html&quot; target=&quot;_blank&quot;&gt;Los Angelos Times reported&lt;/a&gt; on a computer repairman allegedly arrested for collecting nude pictures from his customer's laptop webcams.&lt;/p&gt;

&lt;p&gt;This is a bit far-fetched for most people, but webcam jacking can happen to anyone infected by  malware.  There have even been incidents where rental stores use stealth &lt;a href=&quot;http://www.healthypasswords.com/content.Definition_What_is_a_Rootkit.html&quot;&gt;rootkits&lt;/a&gt; to monitor their rented laptops by snapping webcam photos.  See AJC story: &lt;a href=&quot;http://www.ajc.com/business/aarons-franchisee-denies-it-970980.html&quot; target=&quot;_blank&quot;&gt;Aaron's franchisee denies it spies on computer customers&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Webcams are on almost every model of laptop sold.  There is a very easy solution to this problem.  Simply get a small peice of cardstock and tape it over your camera using painters tape.  When you want to use the webcam, remove the tape. Be sure to use cardstock where the camera lens is to keep from gumming up the lens with adhesive.  Painters tape is best because it comes off easier.  If your worried about your laptop finish, be warned that the adhesive could leave a mark on the plastic.&lt;/p&gt;






</description>
					<pubDate>Fri, 10 Jun 2011 11:28:11 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hoaxes.Webcams.20110610112811.news.MiddleCenter.html</guid>
                </item>

<item><title>RSA to Replace SecureID Tokens</title>
                    <link>http://www.healthypasswords.com/Authentication.Tokens.20110607065006.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken S. Klein&lt;br/&gt;
June 7, 2011 11:47AM EDT&lt;/p&gt;

&lt;p&gt; An &lt;a href=&quot;http://www.rsa.com/node.aspx?id=3891&quot; target=&quot;_blank&quot;&gt;open letter to customers&lt;/a&gt; from RSA announced RSA will replace tokens due to the security breach they incurred in march.  (See &lt;a href=&quot;http://www.healthypasswords.com/news.Hackers_Steal_Secure_Token_Data.html&quot;&gt; Healthy Passwords News - Hackers Steal Secure Token Data - 2011-03-18&lt;/a&gt;.
&lt;/p&gt;

&lt;p&gt;If you are an normal, non-technical user, you only need to pay attention to this story if:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;  You use an RSA branded secure token.
&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;  You are a Citizen of a Country that uses RSA security and are highly concerned with national security matters.
&lt;/p&gt;&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;If you use RSA tokens, the best advise is to ensure you are working on a clean system and then get a new token issued.  The breach at Lockheed Martin was only possible because the attackers were able to install a key logger on a machine.  Once they had the key logger, they only needed a user to authenticate using their token on the compromised machine.  This gave them the user's password information to reuse the same credential using their own security key based off the stolen algorithms.  If you're running anything older than Windows 7, upgrade to windows 7.  The likelihood of getting a keylogger on Windows 7, is much lower than any previous Windows version.&lt;/p&gt;

&lt;p&gt;If your companies corporate infrastructure group has not yet approved Windows 7, chances are good that they have already locked down your account in a manner to deter keyloggers.  You can help them by only using your work machine for work and avoiding personal surfing or social networking.  The last thing any employee wants to be is the one who caused a network breach.  Don't play where you work!&lt;/p&gt;

&lt;p&gt;The RSA open letter from June 6th confirms the May Lockheed Martin breach as a direct result of the March RSA breach.  This possibility was reported by &lt;a href=&quot;http://www.networkworld.com/news/2011/052611-lockheed-martin-outage.html&quot; target=&quot;_blank&quot;&gt; Network World on May 26th&lt;/a&gt;, citing Robert Cringely who learned of an RSA security token replacement at Lockheed Martin.
&lt;/p&gt;

&lt;p&gt;If RSA was a large provider of consumer based tokens, a ten day delay would be disturbing.  Considering that RSA is provider of large government , government contractor, and corporate tokens; withholding this fact makes sense.  It gave RSA time to redistribute new hardware to it's most sensitive customers.  
&lt;/p&gt;

&lt;p&gt;Regardless of this breach, we still advise the use of &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_What_is_Multi-Factor_Authentication.html&quot;&gt;multi-factor authentication &lt;/a&gt; as the most secure form of authentication.  Hopefully the multi-factor key-masters will do a better job of guarding their keys in the future.&lt;/p&gt;



</description>
					<pubDate>Tue, 07 Jun 2011 06:50:06 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Tokens.20110607065006.news.MiddleCenter.html</guid>
                </item>

<item><title>Adobe Flash Security Advisory</title>
                    <link>http://www.healthypasswords.com/Patches.Flash.20110606195426.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Every computer user needs to pay attention to this update.  Nearly every computer has a copy of flash installed.  Flash is is a required integral component used by many websites.  Criminals know that most people don't update Flash on a timely basis, so they target any vulnerabilities as quickly as possible.  &lt;/p&gt;

&lt;p&gt;The easiest way to update flash is by using a third-party patching tool like Qualys Browser Check and/or Secunia PSI.  Learn more at &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_Patching_Popular_Software_Vulnerabilities.html&quot;&gt; Healthy Passwords - Patching Popular Software Vulnerabilities &lt;/a&gt;.

Here is the  Adobe advisory issued 6/5/2011:&lt;/p&gt;


&lt;iframe width=&quot;95%&quot; height=&quot;500px%&quot;  src=&quot;http://www.adobe.com/support/security/bulletins/apsb11-13.html&quot;&gt;&lt;/iframe&gt;



</description>
					<pubDate>Mon, 06 Jun 2011 19:54:26 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Patches.Flash.20110606195426.news.MiddleCenter.html</guid>
                </item>

<item><title>Oracle to Fix Several Security Flaws -- Protect Yourself by Updating</title>
                    <link>http://www.healthypasswords.com/Vulnerability.Third-Party.20110606161337.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein&lt;br/&gt;
June 6, 2011 4:23 PM EST&lt;/p&gt;

&lt;p&gt;
Java vulnerabilities are the primary method used by malware to steal from you.  Popular crimeware kits target Java for two reasons:
&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Many don't know they have Java on their computer, so they don't update it.&lt;/p&gt;
&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Many computers have multiple Java versions including very old versions.  Old versions have many more vulnerabilities than newer ones.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Oracle announced its June Critical Patch Update will be released on Tuesday, June 7, 2011.  It will contain 17 new security fixes for security vulnerabilities in Oracle Java SE.&lt;/p&gt;

&lt;p&gt;The easiest way to keep Java up to date is by using a third party utility such as Secunia PSI or Qualys Browser Check.  To learn more about these, see &lt;a href=&quot;http://www.healthypasswords.com/content.Healthy_Passwords_Patching_Popular_Software_Vulnerabilities.html&quot;&gt; Healthy Passwords - Patching Popular Software Vulnerabilities&lt;/a&gt;&lt;/p&gt;









</description>
					<pubDate>Mon, 06 Jun 2011 16:13:37 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Vulnerability.Third-Party.20110606161337.news.MiddleCenter.html</guid>
                </item>

<item><title>Thousands Attend Birthday Party Due to Improper Facebook Security Settings</title>
                    <link>http://www.healthypasswords.com/Facebook.Mining.20110605152328.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;
A Teenage girl from Germany accidentally posted a birthday party invitation with the security settings of &quot;Everybody&quot;.  More than 1,500 guests showed up and around 100 police officers, some on horses, were needed to keep the crowd under control.
&lt;/p&gt;

&lt;p&gt;
Many say they don’t care who sees their photos. Why does anyone want your family pictures, birthdays or other information? Most people don't care about those things. But increasingly there are incidents where criminals &quot;mine&quot; personal data solely for the purpose of planning a physical crime.  In this case, no crime was intended, but the end result was still devastating for a sixteen year old girl.  
&lt;/p&gt;

&lt;p&gt;
If you leave your FACEBOOK wide open, messages to your friends and family are visible. Do you really want the creepy guy down the street to know you’re going on vacation?
&lt;/p&gt;

&lt;p&gt;
Another misconception is &quot;Friends of Friends&quot;. You only need one family member or friend who friends every person in the world to suddenly open your information up to thousands of strangers.
&lt;/p&gt;
</description>
					<pubDate>Sun, 05 Jun 2011 15:23:28 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Mining.20110605152328.news.MiddleCenter.html</guid>
                </item>

<item><title>New Phone App for Android Makes Stealing Sessions Easy</title>
                    <link>http://www.healthypasswords.com/WiFi.Mining.20110602194802.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;
There's a new Android Phone App for stealing your facebook, twitter, Amazon and other web sessions.  It's called FaceNiff.  The scary part of this is it works on secured WiFi Networks, not just open ones.  
&lt;/p&gt;

&lt;p&gt;This YouTube video shows how it works:&lt;br/&gt;
&lt;object style=&quot;height: 390px; width: 640px&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/3bgwVM7t_s4?version=3&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/3bgwVM7t_s4?version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;390&quot;&gt;&lt;/object&gt;
&lt;/p&gt;

&lt;h3&gt;How can you protect yourself?&lt;/h3&gt;

&lt;p&gt;You can also ensure that you only use secure sessions to access web apps while on public WiFi networks.  The most secure way is by using VPN or some similar service.  See &lt;a href=&quot;http://www.healthypasswords.com/ThirdPartyRatings.html#vpn&quot;&gt;http://www.healthypasswords.com/ThirdPartyRatings.html#vpn&lt;/a&gt; for more details on VPN.  This utility will not work if the WiFi network is configured for WPA/EAP, but EAP is more commonly used in business WiFi.&lt;/p&gt;

&lt;p&gt;If you have your own home or small business wifi using WPA/2, only a person with the shared key has the ability to use this utility.  Someone walking by cannot steal your session without the WPA key.&lt;/p&gt;  




</description>
					<pubDate>Thu, 02 Jun 2011 19:48:02 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/WiFi.Mining.20110602194802.news.MiddleCenter.html</guid>
                </item>

<item><title>Fake Linked In Invitations Lead to Malware</title>
                    <link>http://www.healthypasswords.com/Malware.Website.20110602175412.news.MiddleCenter.html</link>
                    <description>&lt;p&gt; Trusteer, a leading security firm, released a warning for Spear-Phishing email attacks disguised as linked in invitations.&lt;/p&gt;

&lt;p&gt;The fake email invitation is nearly identical to the real email invitation.&lt;/p&gt;

&lt;p&gt;Fake Invitation&lt;br/&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/LinkedIn_Trusteer_fake.jpg&quot; alt=&quot;Fak LinkedIn Invitation&quot;/&gt;
&lt;/p&gt;
&lt;p&gt;Real Invitation&lt;br/&gt;
&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/LinkedIn_Trusteer_real.jpg&quot;  alt=&quot;Real LinkedIn Invitation&quot;/&gt;
&lt;/p&gt;

&lt;p&gt;If you click on the fake invitation you are directed to a malware site trying to look like salesforce.com.  The url they send you to is salesforceappi.com.  If you visit this site, there is a very good chance you will get infected. &lt;/p&gt;

&lt;p&gt;If you've recently accepted a linked in invitation, look at your browser history to see if you can find salesforceappi in the history.  If you find this URL in your history, you need to get your computer cleaned.  That may take some time, and even a visit to a local professional, so in the meantime do the following:&lt;/p&gt;

&lt;ol&gt;

&lt;li&gt;&lt;p&gt;Print your browser history in chronological order from the time of visiting salsforceappi.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;If you don't already have a live CD, download and create one.  See &lt;a href=&quot;http://www.healthypasswords.com/LiveDistroList.html&quot;&gt;http://www.healthypasswords.com/LiveDistroList.html&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Boot from your live CD and start going down the list of sites you visited after salsforceappi.  Pick the highest risk sites first and start changing passwords.  While doing this, check balances.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Go to any online email accounts and change your password.  Be sure to check forwarding, POP, and IMAP settings while there.  &lt;a href=&quot;http://www.healthypasswords.com/Content.Healthy_Passwords_See_if_Someone_is_Using_Your_Gmail.html&quot;&gt;See How to See if Somone is Using Your GMail&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;If you use your computer for business, contact your employer's IT or Loss Prevention department and explain the situation.  If you have access to financial accounts, be sure they take action and change passwords accordingly.&lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;Until the computer is cleaned or re-installed, don't be tempted to use your computer without the Live CD.  The malware installed by this site is particularly hard to remove, and most likely includes a keylogger.  If you're computer is running windows Vista or XP, consider this a good opportunity to do a clean install of Windows 7 and maybe even just upgrading to a new hard-drive.  &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;If your employers IT department or your local computer professional thinks you are over-reacting, refer them to this Trusteer communication &lt;a href=&quot;http://www.trusteer.com/blog/linkedin-spam-emails-download-malware&quot;&gt;http://www.trusteer.com/blog/linkedin-spam-emails-download-malware&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;


</description>
					<pubDate>Thu, 02 Jun 2011 17:54:12 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Malware.Website.20110602175412.news.MiddleCenter.html</guid>
                </item>

<item><title>Facebook Vacation Burglary</title>
                    <link>http://www.healthypasswords.com/Facebook.Mining.20110528223649.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken S. Klein&lt;br/&gt;
May 28, 2011 22:45 EST&lt;/p&gt;

&lt;p&gt;The Billings Gazette just reported a story that jumped off the page for us.  &lt;a href=&quot;http://billingsgazette.com/news/state-and-regional/montana/article_8dd5a7cc-8962-11e0-9e20-001cc4c03286.html&quot; target=&quot;_blank&quot;&gt;Great Falls burglary victims rue sharing travel plans on Facebook&lt;/a&gt;.  Here's a paragraph out of Chapter 2 of our Password Book, Healthy Passwords:&lt;/p&gt;

&lt;p&gt;If you feel compelled to broadcast every move you make via social networking or messaging sites, do not be surprised if someone visits your home after you tell everyone that you are having a wonderful weekend away.  Likewise, you should not tell the world that just part of your family is away and a few vulnerable ones are home alone.&lt;/p&gt;




</description>
					<pubDate>Sat, 28 May 2011 22:36:49 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Mining.20110528223649.news.MiddleCenter.html</guid>
                </item>

<item><title>IPOD, IPHONE, IPAD Decryption Tools on Market</title>
                    <link>http://www.healthypasswords.com/Hacking-Tools.IOS.20110525171619.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Ken Klein, Healthy Passwords&lt;br/&gt;
May 25, 2011&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://arstechnica.com/apple/news/2011/05/russian-company-releases-commercial-ios-decryption-toolset.ars?&quot; target=&quot;_blank&quot;&gt; ArsTechnica &lt;/a&gt; has reported on a Russion security firm selling IOS decryption tools on the open market.  Presently they are only selling to law enforcement.&lt;/p&gt;

&lt;p&gt;The good news is that to use the tool, they must have possession of your device (iPhone, iPad, or iPod). The tool employs a brute-force approach to breaking the encryption, so if you use a very long complex password, it may still be virtually impossible to get in.&lt;/p&gt;




</description>
					<pubDate>Wed, 25 May 2011 17:16:19 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hacking-Tools.IOS.20110525171619.news.MiddleCenter.html</guid>
                </item>

<item><title>Symantec / Verisign Personal Identity Portal Beta</title>
                    <link>http://www.healthypasswords.com/Authentication.Third-Party.20110524194957.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;By Ken S. Klein, Healthy Passwords&lt;br/&gt;
May 24, 2011 8:00PM EST&lt;/p&gt;

&lt;p&gt;Symantec recently acquired Verisign’s VIP authentication service.  Verisign launched the service in 2009.  Symantec’s offering folds the older VIP service into a new “Personal Identity Portal” promising one-click sign-in for all websites.  This offering from Symantec has five basic features:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;OpenID provider support.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;One Click sign-on via a new cloud based password manager service. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Your own customizable PIP page. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Online File Vault to store your sensitive documents securely. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Several multi-factor authentication offerings. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/SymantecPipPromo.png&quot;/&gt;

&lt;h3&gt;Pip Account Protection&lt;/h3&gt;
&lt;p&gt;Setting up your PIP account involves going to PIP.verisignlabs.com, entering a username, password, and email address.  Only the OpenID is created from the basic signup.  &lt;/p&gt;

&lt;h3&gt;OpenID&lt;/h3&gt;

&lt;p&gt;Users login to PIP once and then access any configured OpenID compatible website without passwords while they remain logged into PIP.  If every site supported OpenID, users would only use a password to login once per day.&lt;/p&gt;

&lt;p&gt;As promising as OpenID sounds, it’s adoption rate has been slow.  A site can only be a provider or consumer of OpenID credentials.  Many large sites, such as PIP, Google and Yahoo have chosen to be providers rather than consumers.  That means that if a user creates an OpenID on PIP, they can’t use OpenID to login to Google or Yahoo. &lt;/p&gt;

&lt;p&gt;Some consumer sites like Facebook have chosen to implement it in strange ways.  For Facebook, you need to go into your profile and link your OpenID with Facebook.  Facebook then uses browser cookies to login a user when they go to the Facebook login page.  Different browsers behave differently with their cookies resulting in people who can never get OpenID working with Facebook.  Because of the many issues around OpenId, PIP added one-click sign-on.  &lt;/p&gt;

&lt;h3&gt;One Click Sign-on&lt;/h3&gt;

&lt;p&gt;Symantec’s one-click sign-in is a free cloud based password manager service.  Symantec is marketing this as a bridge for sites without OpenID support.  It is a very basic password management service.  An extra password is required to use and access one-click.  This password is not stored anywhere.  If you lose the password, Symantec will not be able to recover your one-click information.  Some of it’s limitations are:&lt;/p&gt;

&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/SymantecPipOneClick.png&quot;/&gt;

&lt;ol&gt;

&lt;li&gt;&lt;p&gt;It only stores username, password and one large notes field per site.  Many other password managers allow complex databases to store much more about sites than just password data. &lt;/p&gt;&lt;/li&gt;

&lt;li&gt;&lt;p&gt;It only allows one credential per site, and You cannot add a site more than once.  For users who have multiple accounts at a site, this will limit functionality. &lt;/p&gt;&lt;/li&gt;

&lt;/ol&gt;


&lt;h3&gt;Your own Customizable PIP Page&lt;/h3&gt;
&lt;p&gt;The page used for OpenID is also available for anyone to see.  This doesn’t mean anyone can see your usernames and passwords.  Symantec let’s you add links to your websites and social networks so others can find you from this page.  Symantec states that the page will be indexed by popular search engines, so if you have a struggling website, a link from verisignlabs.com may or may not help your search engine ranking.&lt;/p&gt;
&lt;h3&gt;Online File Vault&lt;/h3&gt;
&lt;p&gt;Symantec is including a free secure file vault for your sensitive documents.  The offering allows user 2 gigibytes of space.   The only limitation on the vault is you must configure your pip account for a Verisign VIP credential in order to use it, which is a very good thing to do. &lt;/p&gt;
&lt;h3&gt;VIP Credentials&lt;/h3&gt;
&lt;p&gt;VIP Credentials enable multi-factor authentication.  This is the most secure way to login.  If an attacker gains access to your VIP account username and password (for example, through a successful phishing attack), they still will not be able to login without the device.   Symantec offers three varieties of multi-factor authentication: Browser Certificates, Phone Apps, and keychain token / FOB.  A fourth option for Ironkey USB devices is not promoted on the PIP site, but is promoted by IronKey.  &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Browser Certificates - According to Symantec, A browser certificate is a unique digital ID that VeriSign installs in your browser or user certificate store. PIP uses Browser Certificates to limit access to your account to only the computers and browsers you authorize. This greatly reduces risk for a compromised account.   Browser certificates are free and require no special hardware on your machine.   They are only supported on Firefox, Internet Explorer, and Safari.  These are not as secure as a hardware token, since anyone who gains physical access to your computer and browser may still impersonate you. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Phone Apps – Phone apps are a form of multi-factor authentication that runs on your phone or PDA.  VIP supports Android, BlackBerry, Iphone, iPad, iPod Touch, Windows Mobile, and Other phones.  According to Symantec, “VIP Access for Mobile now supports more than 90 popular mobile phone models including all the popular BlackBerry models as well as the Motorola, Nokia and Sony Ericsson” &lt;/p&gt;

&lt;p&gt;We tested this using a plain old Verizon BREW-enabled clamshell phone.  To find the software, we had to use the phones browser and go to m.verisign.com.  It then instructed us to use the phone’s search for software feature to search for “VIP Access”.  We found the application, and were able to download and install it with just a few button presses on the phone.  We then added VIP Access application to a shortcut key.  The application works great.  Running it displays the number just as the tokens do.  &lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://s3.amazonaws.com/images.healthypasswords.com/phone_generic.jpg&quot;/&gt;&lt;/p&gt;
&lt;/li&gt;


&lt;li&gt;&lt;p&gt;The process for using a keychain token / FOB is identical to the phone, except instead of a phone you order a little device with a small LED display.   Hardware Tokens range from $30.00 for a keychain FOB to 48.00 for wallet card. &lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;http://images.healthypasswords.com.s3-website-us-east-1.amazonaws.com/vip_card.gif&quot;/&gt; &lt;img src=&quot;http://images.healthypasswords.com.s3-website-us-east-1.amazonaws.com/vip_fob2.gif&quot;/&gt; &lt;img src=&quot;http://images.healthypasswords.com.s3-website-us-east-1.amazonaws.com/VIP_fob1.gif&quot;/&gt;&lt;/p&gt;

&lt;p&gt;The process for using an Ironkey requires plugging the device into the computer, logging into the ironkey, then running the VIP application on the ironkey.  The device must be registered the same as any other device. &lt;/p&gt;&lt;/li&gt;

&lt;/ol&gt;


</description>
					<pubDate>Tue, 24 May 2011 19:49:57 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Third-Party.20110524194957.news.MiddleCenter.html</guid>
                </item>

<item><title>Facebook Dislike Button Scam</title>
                    <link>http://www.healthypasswords.com/Facebook.Phishing.20110517155345.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;By K. Klein, Healthy Passwords&lt;br/&gt;
May 17, 2011 3:00 PM EST&lt;/p&gt;

&lt;p&gt;
&lt;a href=&quot;http://nakedsecurity.sophos.com/2011/05/16/facebook-dislike-button-spreads-fast-but-is-a-fake-watch-out/&quot;&gt;Sophos Security recently reported on a Facebook threat&lt;/a&gt; in the form of a dislike button.  
You receive a Facebook message about something.  Partway down the message is text describing a new dislike &quot;Thumbs Down&quot; feature.  To use the new feature, you must enable it by clicking the link.  When you click the link, you’ve unwittingly sent the same message to all your friends by allowing a malicious script to post the same message to your profile.  The good news is the malicious script appears to do no more than replicate the original message.  
&lt;/p&gt;

&lt;p&gt;There are two things you can do to protect against this type of scam.    
&lt;/p&gt;

&lt;ol&gt;

&lt;li&gt;
&lt;p&gt;Modify your facebook security settings to limit who can send you messages.&lt;/p&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Modify your behavior to understand that facebook system change notices will not come to you in messages from friends.  They will come from Facebook directly.&lt;/p&gt;
&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;Even if you modify your security to limit messages to friends only, you will only be as strong as your weakest direct friend.  If your cousin friends everyone and clicks on everything, then you may still get these types of scams.  Changing it will, however, limit your exposure.
&lt;/p&gt;

&lt;p&gt;If you’d like to modify who can send you Facebook messages and email:&lt;/p&gt;

&lt;ol&gt;

&lt;li&gt;
&lt;p&gt;Go to the Account drop-down menu at the top of any Facebook page and select &quot;Privacy Settings.&quot;&lt;/p&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Select &quot;View settings&quot; in the &quot;Basic Directory Information&quot; section.&lt;/p&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Change the setting for &quot;Send me messages.&quot; Your options include Everyone, Friends and Friends of Friends.&lt;/p&gt;
&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;Only emails from people that fall within the message privacy setting you choose will be delivered to your Facebook Messages. For example, if you select the &quot;Friends Only&quot; setting, you will not receive messages from email addresses that are not confirmed to be one of your friends. Instead, those senders will receive automatic bounce-back replies.&lt;/p&gt;

&lt;p&gt;For step-by-step instructions with screenshots see &lt;a href=&quot;http://www.healthypasswords.com/Facebook.Content.20110517191906.content.MiddleCenter.html&quot;&gt;How To Restrict Messages to Only Friends&lt;/a&gt;&lt;/p&gt;



</description>
					<pubDate>Tue, 17 May 2011 15:53:45 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Facebook.Phishing.20110517155345.news.MiddleCenter.html</guid>
                </item>

<item><title>Is it Time To Replace Your Battered Email Box?</title>
                    <link>http://www.healthypasswords.com/Email.Passwords.20110513231144.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;By: Ken Klein, Healthy Passwords&lt;br/&gt;
May 13, 2011 10:30 PM EST &lt;/p&gt;

&lt;p&gt;Rural residents go through the new mailbox ritual every few years.  It usually happens around graduation time or July Fourth.  A car drives down the street while geniuses with baseball bat in hand destroy your mailbox.  &lt;/p&gt;

&lt;p&gt;The digital equivalent of the Battered mailbox may have just happened.  According to the Privacy Rights Clearinghouse database, it started in early April 2011.  First, Epsilon, a very large email provider lost millions of user account information.  Then on April 14, Wordpress, the engine driving much of the blogging world, was hacked revealing 18 million usernames and passwords.  Five days later on April 19 the Sony Playstation network (PSN) was hacked losing another 77 million customers information, Sony failed to report this until April 27.  &lt;/p&gt;

&lt;p&gt;Rural residents are constantly looking for the better mailbox.  I personally use one that requires a key.  Not only does it keep snoopers out, it is much stronger.  Mine has already survived a baseball bat and a garbage truck.  The email equivalent to this type of box is one using multi-factor authentication.  &lt;/p&gt;

&lt;p&gt;Multi-Factor Authentication not only requires a username and password. It also requires a hardware device. Someone cannot impersonate you without the device. Multi-factor devices include key chain tokens, voice or text messaging, USB devices, and printed cipher grids.  You can learn more about multi-factor authentication at &lt;a href=&quot;http://www.healthypasswords.com/multi-factor-authentication.html&quot;&gt; http://www.healthypasswords.com/multi-factor-authentication.html. &lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;If your web email is your only email or the email you have linked to password resets, you need the most secure email possible.  Think about it.  If someone compromises your email, they can sit back and watch your emails until they know the sites you use most often.  Then when the time is right, they simply login to your account and request a password reset.  &lt;/p&gt;

&lt;p&gt;If you read your mail in Thunderbird, Outlook Express, or Outlook, it usually uses something called POP or IMAP.  If you use outlook for work, there’s a good chance it uses an exchange server and will be more secure than POP or IMAP.  POP or IMAP can be unsecure.  Most POP or IMAP mail travels through the network as plain text.  If you use a laptop and your email is running while on an open WiFi network, it’s not very difficult to see your email.  This can include your username and password.  If you use this type of email, contact your email provider or ISP and request instructions to set is up using secure protocols.  If they don’t offer it, then look for a new email provider.&lt;/p&gt;

&lt;p&gt;Many banks no longer use email for password resets.   If you want to see how yours handles it, just go to it and click the &quot;forgot password&quot; button.  Just remember to check other accounts such as Facebook, Myspace, Twitter, Turbotax online, iTunes, Amazon, and all the various cloud based services. &lt;/p&gt;

&lt;p&gt;If you determine you are vulnerable, it is time to change to a more secure email provider.  At this time, Google is the only webmail offering free multi-factor authentication.  We have assembled instructions for setting up GMail 2-Step Authentication at &lt;a href=&quot;http://www.healthypasswords.com/gmail-2step-setup.html&quot;&gt;www.healthypasswords.com/gmail-2step-setup.html&lt;/a&gt;.  Yahoo mail offers it through a third party, but there is a monthly fee involved.  &lt;/p&gt;

&lt;p&gt;To make an easier transition to secure email, temporarily forward existing email to the new account.  This process varies by provider.  For Yahoo, you can upgrade to mail plus for 19.99 a year and either download your email to a local client or setup forwarding.  Hotmail offers free forwarding.  Be sure to setup forwarding so it does not keep a copy of the email in your account.  Only use forwarding at as a short-term measure.  If your old account is compromised, forwarding can be disabled.  &lt;/p&gt;






</description>
					<pubDate>Fri, 13 May 2011 23:11:44 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Email.Passwords.20110513231144.news.MiddleCenter.html</guid>
                </item>

<item><title>Too Much Java Can Be Bad</title>
                    <link>http://www.healthypasswords.com/Malware.Worms.20110512074614.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;By: Ken Klein, Healthy Passwords&lt;br/&gt;
May 11, 2011 8:21 PM EST&lt;/p&gt;

&lt;p&gt;Recent reports of another &lt;a href=&quot;http://fastflip.googlelabs.com/search?client=news&amp;q=java+malware&quot; target=&quot;_blank&quot;&gt;Java based worm &lt;/a&gt; abound.  This worm can take over your computer giving perpetrators access to see your screen, move your mouse, turn on your webcam, or do many other things.  This program can conceivably  affect Mac and Linux users.  &lt;/p&gt;

&lt;p&gt;This is a good reason to improve your online security.  Ask yourself, do I need Java on my computer?  Most people don't know.  There is one way to find out:  Remove it.   Any program needing it will either install it again, or tell you.  In the process you will eliminate older insecure versions.&lt;/p&gt;

&lt;p&gt; To uninstall java from windows, follow this procedure: &lt;a href=&quot;http://www.java.com/en/download/uninstall.jsp&quot; target=&quot;_blank&quot;&gt; Oracle's Uninstall Procedures for Windows &lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Java notoriously leaves older, less-secure copies behind.  The safest way to find old copies of Java is by using Secunia PSI.  See &lt;a href=&quot; PasswordStrategies.Content.20110506082211.content.MiddleCenter.html&quot;&gt;Healthy Passwords, Patching Popular Software Vulnerabilities Article&lt;/a&gt; for more information on Secunia PSI.  You will also find a YouTube video there showing how to install and use PSI.  &lt;/p&gt;

&lt;p&gt; Mac users have no easy way to remove Java.  In October 2010, Apple announced they will remove Java from future versions of OS-X, but the details are incomplete.  At this time, java is still part of OS-X.  &lt;/p&gt;

&lt;p&gt;&lt;i&gt;Ken Klein is Author of Healthy Passwords, a book teaching non-technical people how to make strong, memorable passwords.  Learn more at &lt;a href=&quot;http://www.healthypasswords.com/book.html&quot;&gt; http://www.healthypasswords.com/ &lt;/a&gt; 
&lt;/i&gt;&lt;/p&gt;

</description>
					<pubDate>Thu, 12 May 2011 07:46:14 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Malware.Worms.20110512074614.news.MiddleCenter.html</guid>
                </item>

<item><title>Google Images Malware</title>
                    <link>http://www.healthypasswords.com/Malware.Website.20110509113904.news.MiddleCenter.html</link>
                    <description>&lt;p&gt; 
Several news agencies have reported Google images installing malware.  This doesn't mean Google is trying to infect your computer.  It means that criminals have figured out a way to distribute malware using compromised websites and Google.  The best explanation of this is from Brian Krebs.  You can read the article at &lt;a href=&quot;http://krebsonsecurity.com/2011/05/scammers-swap-google-images-for-malware/&quot; target=&quot;_blank&quot;&gt; krebsonsecurity.com&lt;/a&gt;.  
&lt;/p&gt;

&lt;p&gt;
The article may be confusing for non-technical people, so the best thing to take away from it is just stay away from Google images until Google gets this under control.  If you click on an image and a virus scanner pops up,  turn off your computer.  You want to be sure it doesn't just hibernate or sleep.  You can turn off you computer by holding down the power button for a few seconds until it turns off.  Any unsaved work will be lost if you do this.  You can try saving unsaved work by holding down ALT and pressing TAB until the program with unsaved work is in focus. 
&lt;/p&gt;

&lt;p&gt;
This same technique may be floating around more places than just Google images.  Right now the safest way to protect yourself is to do all your web browsing using live-cds.  For most people, live-cds are impractical for all but the most sensitive browsing. To learn more about Live-CD use, see &lt;a href=&quot;LiveDistroList.html&quot;&gt;Healthy Passwords - Bonus Materials - Live CD Distributions&lt;/a&gt;
&lt;/p&gt;

&lt;/p&gt;
The next best thing is to use Firefox 4 with an add-on to choose when  javascript is allowed to run.  Do the following: 
&lt;/p&gt;

&lt;ol&gt;

&lt;li&gt; 
&lt;p&gt; Download the latest Firefox browser from &lt;a href=&quot;http://mozilla.org/&quot; target=&quot;_blank&quot;&gt;mozilla.org&lt;/a&gt;. 
&lt;/p&gt;
&lt;/li&gt; 

&lt;li&gt; 
&lt;p&gt; Add the &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/noscript/&quot; target=&quot;_blank&quot;&gt; No Script Addon &lt;/a&gt; 
&lt;/p&gt;
&lt;/li&gt;

&lt;li&gt; 
&lt;p&gt; Install &lt;a href=&quot;https://browsercheck.qualys.com/&quot; target=&quot;_blank&quot;&gt;Qualys Browser Check&lt;/a&gt;.  This is a utility that keeps your browser patched with the most important third-party security updates.  You can learn more about this at &lt;a href=&quot;PasswordStrategies.Content.20110506082211.content.MiddleCenter.html&quot;&gt;Healthy Passwords - Patching Populate Software Vulnerbilities&lt;/a&gt;
&lt;/p&gt;
&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;
If you did this properly, the first time you run Qualys browser check you will get an error saying javascript is disabled.  This is good.  It confirms you did the first and second steps correctly.  Select the option to allow java script After updating everything cautiously proceed to google images.   Try to refrain from Bin Laden or Charlie Sheen types of images, as they are the most likely to be trouble right now.
&lt;/p&gt;

&lt;h3&gt;Update 5/18/2011&lt;/h3&gt;

&lt;p&gt;Sophos.com just posted this video showing how a bad google image can translate to problems for OS-X users.  For the full article, go to &lt;a href=&quot;http://nakedsecurity.sophos.com/2011/05/18/malware-on-your-mac-dont-expect-applecare-to-help-you-remove-it/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29&quot; target=&quot;_blank&quot;&gt; Sophos Article on Fake AV and OS-X&lt;/a&gt;  
&lt;/p&gt;
&lt;p&gt;
&lt;object style=&quot;height: 390px; width: 640px&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/9Xna558F_m8?version=3&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/9Xna558F_m8?version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;390&quot;&gt;&lt;/object&gt;
&lt;/p&gt;



</description>
					<pubDate>Mon, 09 May 2011 11:39:04 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Malware.Website.20110509113904.news.MiddleCenter.html</guid>
                </item>

<item><title>LastPass Discloses Network Anomaly Advices Users to Change Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Passwords.20110505142344.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Today LastPass disclosed a &quot;network anomaly&quot; urging users to change their master password. &lt;/p&gt;

&lt;p&gt;If you use Lastpass, be sure to change your master password immediately.   Also, be sure to follow all the rules and make an incredibly strong new master password.  If you have not yet signed up for their Multi-factor authentication device, do so immediately.  This will make it nearly impossible to access your account without the hardware device.  &lt;/p&gt;



</description>
					<pubDate>Thu, 05 May 2011 14:23:44 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Passwords.20110505142344.news.MiddleCenter.html</guid>
                </item>

<item><title>Managing your browsers Form Data</title>
                    <link>http://www.healthypasswords.com/Internet.Passwords.20110502231335.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;This article, &lt;a href=&quot;http://www.pcworld.com/article/226725/edit_your_browsers_autofill_or_autocompleteand_protect_your_credit_cards.html&quot; target=&quot;_blank&quot;&gt;Edit Your Browser's AutoFill or AutoComplete--and Protect Your Credit Cards&lt;/a&gt; from PCWorld.Com tells how to manually manage the saved form data. Saved form data is how websites automatically populate forms with previous entries.  This data is not kept by the website, but is instead kept by your browser (Internet Explorer, AOL, Firefox, Chrome, Safari, or Opera). 
&lt;/p&gt;

&lt;p&gt;
This data leaves behind bits of data which can be used against you.  It is convenient to have your browser recall addresses, phone numbers, cities, and states, but most people would rather not have their browser remember more sensitive information.
&lt;/p&gt;

&lt;p&gt;
The PCWorld.com article will explain how to selectively remove form data for Firefox, Chrome, or Internet Explorer.  If you use another browser, you’ll have to dig through the help.
&lt;/p&gt;

&lt;p&gt;
Everyone concerned about security should take a good look at this article and prune any sensitive information, such as credit card numbers, bank account numbers, cvv numbers, and social security numbers.
&lt;/p&gt;

&lt;p&gt;
Keeping this information on your computer is asking for trouble.  It may not be an eastern-bloc attacker that uses the information; it could just as easily be your kids ordering something you’d never allow.
&lt;/p&gt;







</description>
					<pubDate>Mon, 02 May 2011 23:13:35 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Internet.Passwords.20110502231335.news.MiddleCenter.html</guid>
                </item>

<item><title>Skype Virus Removal Hoax</title>
                    <link>http://www.healthypasswords.com/Hoaxes.Skype.20110501195141.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;
A new variation of the phone scam where someone calls to tell you you have a virus and they will fix it, may have come to skype.  Instead of someone calling, it may be a pre-recorded message.  The domain reported here was HelpHs.com, but this will probably change every few days.  &lt;a href=&quot;http://www.thedomains.com/2011/05/01/watch-out-for-the-newest-scam-unsolicited-skype-phone-calls-helphs-com/comment-page-1/&quot;&gt; This Domains.com article&lt;/a&gt; explains it.  You can also reference this Healthy Passwords  &lt;a href=&quot;http://www.healthypasswords.com/Hoaxes.Phone.20110408194101.news.MiddleCenter.html&quot;&gt;Phone Virus Scams&lt;/a&gt; article.
&lt;p&gt;



</description>
					<pubDate>Sun, 01 May 2011 19:51:41 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Hoaxes.Skype.20110501195141.news.MiddleCenter.html</guid>
                </item>

<item><title>Play Station Owners: Time to Change Your Passwords</title>
                    <link>http://www.healthypasswords.com/Breach.Website.20110427101147.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;Between April 17th and April 19th, a network breach of the Sony Play Station Network occurred.  According to Sony, this potentially impacts 77 million users.  &lt;/p&gt;
&lt;p&gt;If you own a Play Station, stop and think about this.  Look up your Play Station username and password.  If the password is the same as any other sites, immediately change the other site passwords.  Start with your email accounts.  If an intruder gets into your email, they can easily look at your past items to find the financial institutions, social networking, and shopping sites.  They can then go to those other sites, reset your password, and then begin clearing your accounts.&lt;/p&gt;
&lt;p&gt;According to the Sony Playstation.com website:&lt;br/&gt;
&lt;br/&gt;&quot;Although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state, zip), country, email address, birthdate, PlayStation Network/Qriocity password and login, and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained.&quot;&lt;br/&gt;
&lt;br/&gt;Sources: &lt;a href=&quot;http://us.playstation.com/support/answer/index.htm?a_id=2185&quot; target=&quot;_blank&quot;&gt;http://us.playstation.com/support/answer/index.htm?a_id=2185&lt;/a&gt;&lt;/p&gt;


</description>
					<pubDate>Wed, 27 Apr 2011 10:11:47 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Breach.Website.20110427101147.news.MiddleCenter.html</guid>
                </item>

<item><title>Malware Changing your Router</title>
                    <link>http://www.healthypasswords.com/Malware.Routers.20110426194240.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;
We've written about this before, but this is the first time we've seen it in the news for a while ( &lt;a href=&quot;http://www.ajc.com/lifestyle/virus-makers-taking-new-925547.html?cxtype=rss_news_128746&quot; target=&quot;_blank&quot;&gt;Source Atlanta Journal Constitution Article&lt;/a&gt;).  If someone compromises your router, they could be redirecting all your traffic to other sites.  The article does a great job explaining how this works.  The one thing they don’t mention, is how this ploy can be used to steal your login credentials for banking or other sensitive sites
&lt;/p&gt;

&lt;p&gt;
This can be done by changing your router configuration for something called DNS.  DNS is the process that converts site names from something humans understand to something computers understand.  Say for instance you enter www.bigbank.com in your browser, this is normally translated to a numerical address like 10.10.10.10, which is the real site address for bigbank.com.  If they setup a fake bank to look just like your real bank at 20.20.20.20, when your browser asks to go to bigbank.com, your roter will now tell your browser to go to 20.20.20.20 instead of 10.10.10.10.  When you get there and try to login, you'll get an error message.  At the same time, they just got your banking password.
&lt;/p&gt;

&lt;p&gt;
All the security software in the world may not protect you from this type of ploy.  An alert user may notice that the site they went to was perhaps not using a secure session.  Or, if the site is a known bad site, and you were using a third party website rating tool like WOT or Site Advisor, you may get a warning.   Other than that, most people are fooled by this type of ploy.
&lt;/p&gt;

&lt;p&gt; 
Preventing this from happening to you is not very difficult.  
&lt;/p&gt;

&lt;ol&gt;

&lt;li&gt;
If your router was supplied by your internet service provider (ISP), you’ll have to call them for help.  Don’t try upgrading their equipment.  Also keep in mind that many ISPs have old equipment with known administrator credentials, so they may be just as big of a security risk as any off-the-shelf router.
&lt;/li&gt;

&lt;li&gt;
If your router is older than five years.  Buy a new one.  This will get you the latest security protocols as well as the latest firmware.  It will also give you the ability to plug the old one back in if the new one fails
&lt;/li&gt;

&lt;li&gt;
If you’re upgrading your older router, first find or download your exact model of router’s installation instructions.  Make sure you know the default admin username and password.  Also, ensure you know your internet service providers settings.  It is probably a good idea to go through and print out every option you can find in the old routers configuration screens.  
&lt;/li&gt;

&lt;li&gt;
Find your routers reset to factory default button.  It is usually a small hole in the back of the router.  You stick a sharp pencil or toothpick in the hole to depress the hidden button for 30 seconds and your router will reset to factory defaults.  (read your manual to be sure) 
&lt;/li&gt;

&lt;li&gt;
Access the router’s configuration pages through a browser and set it up again.  This time, be sure to change the default admin password and update the firmware from the configuration utility.  
&lt;/li&gt;

&lt;li&gt;
Once everything is working, document your routers settings.  It’s ok to write the username and new password on the router with a marker even.  Another idea is to put the configuration print outs you made in an envelope and tape them to the router (Just be sure not to cover any vents).
&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;
Over the years I have tried a few dozen router brands.  Throughout that time most have been very similar.  There is one notable exception, and that is the Apple Airport.  I’ve only used the extreme model, but the regular model uses the same basic setup.  The nice thing about this product is the software setup.  You don’t need to use a web-browser at all.  The utility is a stand-alone application that walks you through all the necessary setup.  The most important part is that the software will automatically update the firmware as soon as it is available using the same apple update utility that iTunes or OS-X uses.  Very few people ever wake up and say, “Gee, I think I’ll check for router firmware updates today”.  Apple has eliminated the need to remember to check for firmware updates every few months.  As soon as a firmware update becomes available, your apple updater will tell you and walk you through the update.

&lt;/p&gt;



</description>
					<pubDate>Tue, 26 Apr 2011 19:42:40 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Malware.Routers.20110426194240.news.MiddleCenter.html</guid>
                </item>

<item><title>Mobile Devices are Increasing Malware Targets</title>
                    <link>http://www.healthypasswords.com/Malware.Phone.20110425230909.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;The number of articles written about smart phone attacks increases every week.  &lt;a href=&quot;http://www.mercurynews.com/business/ci_17910077?nclick_check=1&quot; target=&quot;_blank&quot;&gt;This article by Brandon Bailey of the San Jose Mercury News&lt;/a&gt; does a good job at explaining the situation.
&lt;/p&gt;

&lt;p&gt;According to the article, Android is the biggest target right now because it has the largest installed base.  Android is made by Google and they have a way to keep applications from getting to sensitive data.  The problem is that Android relies upon the phone's owner to correctly allow or deny access during the installation process.  For example, if you install an application that has no reason to make calls, and the install prompts you to allow phone calls, don't grant it rights to call phones.  The mere fact that it asks to make calls, is a warning sign for an app like a game.  Theres a good chance that your next bill could be littered with 900 toll calls.
&lt;/p&gt;

&lt;p&gt;
Understanding all the prompts from Android may be confusing to the average user.  If you don't understand something, don't just grant it.  Stop, and search your help until you understand what it is asking to do.  If it seems at all questionable, go back to the reviews and user instructions to understand why it may need that authorization.  You can always deny something and the worst case may be the application will fail to work properly all the time.  After you understand what it is trying to do, you can always go back and change the permissions later.&lt;/p&gt;


</description>
					<pubDate>Mon, 25 Apr 2011 23:09:09 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Malware.Phone.20110425230909.news.MiddleCenter.html</guid>
                </item>

<item><title>A Big Risk with Online Email</title>
                    <link>http://www.healthypasswords.com/Email.Passwords.20110423190701.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;I just read &lt;a href=&quot;http://www.hometownlife.com/article/20110421/BUSINESS/104210382&quot; target=&quot;_blank&quot;&gt;a really good article by Jon Gunnells on the Observer and Eccentric &lt;/a&gt; about online security and passwords.  The writer makes a very good point.  If you use an online email for your userid at other websites, someone who compromises your email account can just go to any website and say they forgot their password.  In most cases the site uses your email as positive authentication that you are who you say.   Think about this a bit.  Once they have your main email, they will see notices from many of the sites you use and know exactly where to go. &lt;/p&gt;

&lt;p&gt; My main email account has always been a type that doesn't have web access by default.  These are called POP or IMAP.  Most people use this type of account for work, but most people use gmail, yahoo, or some other web mail provider for their main personal email account.   &lt;/p&gt;

&lt;p&gt;The same risk exists for pop or imap, but it's a lot less likely that someone will hijack these types of accounts.  If your primary email is a web-based email service, and you routinely use that email as a login for other online accounts, you need to treat your email as the highest risk type of site.  Use a very strong password and change it monthly.&lt;/p&gt;



</description>
					<pubDate>Sat, 23 Apr 2011 19:07:01 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Email.Passwords.20110423190701.news.MiddleCenter.html</guid>
                </item>

<item><title>A new secure password idea</title>
                    <link>http://www.healthypasswords.com/Authentication.Third-Party.20110423111056.news.MiddleCenter.html</link>
                    <description>&lt;p&gt;The quest for secure ways to remember strong passwords recently took a new turn.  This &lt;a href=&quot;http://www.networkworld.com/news/2011/042111-passwords-captcha.html?hpg1=bn&quot; target=&quot;_blank&quot;&gt; Network World article &lt;/a&gt;  explains how researchers have devised a password storage and retreival system using CAPTCHAs.  &lt;/p&gt;

&lt;p style=&quot;width:80%;padding:10px;border:5px solid gray;margin:0px;&quot;&gt;CAPTCHAs are the images with twisted or stretched word images you are forced to enter when submitting web forms.  They are meant to ensure only a human is submitting the form.  &lt;/p&gt;

&lt;p&gt;The idea is that you take a password and split it into two parts.  One part is weak and easy to remember.  The second part is strong.  What happens is a CAPTCHA is created for the strong part and encrypted in a way that only the weak part can decode.  &lt;/p&gt;

&lt;p&gt;The interesting part of this is when a program takes a password list and attempts to decrypt it; every attempt seems to succeed to the attacking computer.  The problem is that it returns an image which can only be interpreted by a human.&lt;/p&gt;

&lt;p&gt;To use this system a user would do the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;	Create a strong password either manually or by using a password generator.  For example apple_83tNf&amp;)_sKb&lt;/li&gt;
&lt;li&gt;	They would pick an easy part of the password to remember such as apple. &lt;/li&gt;
&lt;li&gt;	They then go to a website or run a program where they paste in apple_83tNf&amp;)_sKb and then say the apple is the easy part, which will be the key.&lt;/li&gt;
&lt;li&gt;	When they need to remember the password, they will run the program or go to the website and somehow select the site they need the password for.  They will then enter the easy part and it will return the CAPTCHA.  By combining the two they have the correct password.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Personally, this seems like a lot of steps to go through to retrieve a password.  The creators plan to have it commercially available in a month.  It will be interesting to see if this system makes any traction.&lt;/p&gt;

</description>
					<pubDate>Sat, 23 Apr 2011 11:10:56 -0400</pubDate>
					<guid isPermaLink="false">http://www.healthypasswords.com/Authentication.Third-Party.20110423111056.news.MiddleCenter.html</guid>
                </item>
</channel></rss>