Home » , » WHY YOUR ENCRYPTION/PASSWORDS SUCK? NEW SECURITY METHODS : 3D FACE ANALYSIS, BIO METRICS, & MORE.

WHY YOUR ENCRYPTION/PASSWORDS SUCK? NEW SECURITY METHODS : 3D FACE ANALYSIS, BIO METRICS, & MORE.

Written By TAC Team on Friday 27 September 2013 | 06:16

Thousands of Online Services uses Password, Be it Banks, Shops, Social Networking Sites, Email's And Every other service. These Passwords are lying on the Databases of the companies, Which frequently have very basic security.
And These sites Do Get Hacked.




" Treat Your Passwords Like you treat your Toothbrush, Don't Let anyone Use it and Change it every 6 Months "

  - Clifford Stoll, Scientist.

Here Are Some Of The Greatest Attacks :

Service                                : Victims
Sony PlayStation Network       : 77 Million Accounts Hacked. Site Down For 24 Days.
Evernote                                  : 50 Million Accounts Hacked, Including Addresses.
LinkedIn                                  : 6.5 Million Accounts Hacked.
Gamigo                                    : 8.24 Million Accounts Exploited.
Yahoo Voices                          : 450,000 Accounts Hacked.
Twitter                                     : 250,000 Accounts Hacked.


Most Of the Accounts Get Hacked Because the Main Site Server Gets Exploited, But Many Individual Accounts Get Hacked Because people are too damn dumb to use complex password, A Survey done by Mark Burnett for 12 years Indicates that 78% of online users use These passwords :

password, 2000, hockey, dallas, 
123456, jordan, george, yankees,
1234, superman, charlie, 123123,
12345678, harley, andrew, ashley,
qwerty, 1234567, michelle, 666666,
dragon, fuck, love, hello,
sex, asshole, jessica, amanda,
12345, hunter, boobs, orange,
baseball, trustno1, legend-ary, biteme,
football, ranger, 6969, freedom,
letmein, buster, pepper, computer,
monkey, thomas, daniel, fuckme,
696969, tiger, access, nicole,
abc123, robert, 123456789, thunder,
mustang, soccer, 654321, ginger,
micheal, porn, joshua, heather,
shadow, batman, maggie, hammer,
master, test, starwars, summer,
wintwe, jennifer, pass, silver,
fucking, carlover, killer, william,



What And How Hackers Do What They Do !

I Don't Know How, But somebody tricked us into thinking Hackers are Geeks on Laptops ( which we are) but you should also remember that Hackers have great observation skills. Hackers Follow you everywhere, Once they lay their eyes on a target, they dig out every bit of information available about you. They spy on your online photos, They know your cat's name, Your Car's Model and everything you might have mentioned in online world.
Hackers Can attack you on many fronts, like : Cracking your Social networking website password, Stealing Data from your personal computer, Phishing you or even using your E-Mail ID to send messages to terrorists.


Methods To Confuse And Avoid Hackers :


Two Factor Authentication :Many E-mail Providers use Two Factor Authentication like Gmail, Yahoo and Facebook, And it the strongest method to protect yourself from getting hacked. To access your account, First you have to sign in Using your E-mail and Password, And then An Eight Digit Code is sent to your mobile within a few seconds, Which you have to fill online to get access to your account.


Pros :
> Strongest Security Method.
> You know when your account is being accessed.
> Alert On Your Mobile if someone tries to brute-force your account.


Cons :
> Not so Time Efficient.
> You Need Your Mobile And Good Signal Reception.


Total Rating :


Security :


Comfort :



OPENID :
A Universally Usable ID Is given to you if you use OPENID. UUID are mostly URL specially crafted for you. To Log In into any service, You'll have to just insert your OpenId, Not your password. Using OpenID is also a good Idea as password have a habit of getting hacked. OpenID is usable on Google, Yahoo, LiveJournal, Hyves, Blogger, Flickr And other sites.

Pros :
> One-For-All Username and Password.
> Saves Time.


Cons :
> Not So-Many Sites Supported.

Total Rating :


Security :



Comfort :




Swipe Gestures :
Swipe gestures are a popular way to lock your Android Phones, And they very Are Simple to use, Thus easily crack-able. Anybody can remember your Swipe by seeing it first time, Also Somebody can find out your swipe by observing the scratches on the surface of your screen.


Pros :
> Easy And Simple.


Cons :
> Easily Hack-able.

Total Rating :


Security :



Comfort :




Password Stick :
On Many Operating Systems, You Can create a password stick which can unlock your computer by plugging it in. It is a time saving and secure method, Unless Your hacker is also good at picking pockets.We are not very fond of this method, as your brain is the safest place to store sensitive information.


Pros :
> Time Saving.
> Easy.
> Secure.


Cons :
> Danger Of Getting Hacked if stick is stolen.

Total Rating :


Security :


Comfort :




Finger Print Scan :
One of the oldest method of securing, Finger print scanners are widely available on Laptops, Netbooks, External USB Scanner etc. Also a rumor has it that the new iPhone Might have a Fingerprint scanner in the home button. It is a good and secure way to protect your data.


Pros :
> Easy To Use.
> Widely Available.


Cons :
> Remember to clear the scanner after each scan or the print left on the scanner can be easily used by hacker.



Total Rating :

Security :


Comfort :



3D Face Analysis :
On Mobile Since Android 4.0, 3D Face Scan is an awkward way to unlock your mobile, It uses your mobile/laptop camera to take a video of your whole face each time to unlock your device. But we don't think this type of security method is useful in Mobiles, Tough it is very useful in PC Security and Other stuff that you don't need to unlock every other second.


Pros :
> Very Secure.
> Very Difficult To Hack.


Cons :
> Good Lightning needed.
> Can be cracked by a video of your's.

Total Rating :

Security :



Comfort :




Behavior Pattern :
Everybody has different way of interacting with technology, And the Swedish Firm BehavioSac Has used it to create a newsecurity system. In this method, You Need to enter your password and have to do it in the same way you did before. Other Factors Include : Typing Rhythm, Speed, And on touchscreen Devices : Angle of gestures, pressure of angles and other stuff !


Pros :
> Highly Secure.
> Easy To Use.


Cons :
> Not available on the market Yet.
> Could be a pain in the ass when you're drunk or sleepy.

Total Rating :

Security :


Comfort :




Conclusion :
With the increasing security risk, It Would be a good idea if the services we use everyday would get a security upgrade, And If the users follow some basic security tips, It would make them much more secure in the online world.


Share this article :

0 comments:

Speak up your mind

Tell us what you're thinking... !

Note: only a member of this blog may post a comment.

Popular Posts