36
Password reuse is rampant: nearly half of observed user logins are compromised
(blog.cloudflare.com)
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
Community Rules
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
Does this account for the fact that it's a username password combo that makes it compromised? Just because [email protected] used hunter2 as his password and got it leaked doesn't mean my credentials are at risk even if i used the same password.
I guess even then we're meant to be using random strings etc but that's pretty difficult when most people on the internet are old enough to remember when password managers that automatically generated secure passwords weren't a thing. When you're told to never write down a password and had to remember it manually you just created a universal password that you'd jam into everything else.
Yes and no, in my opinion. Attackers can keep a list of all compromised passwords, and try it even for accoints that may not be associated. This is a much smaller search space than to go through every possible password of length <= 32 (for example).