Many popular websites still cling to password creation policies from 1985

A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found.
The researchers used an automated account creation method to assess over 20,000 websites across the Tranco top 1M and evaluate the password creation policies users have to adhere to.
They found that 75% of websites allow passwords to be shorter than the recommended 8 characters.
40% of sites limit password lengths below the recommended 64 characters.
72% of sites allow the use of dictionary words as passwords and 88% allow users to choose known breached passwords.
A third of websites don't support special characters in chosen passwords.
39% accept the most popular password, while almost half accept one of the top four passwords.
They also found that most websites still adhere to NIST's 2004 password policy guidelines, even though they have been updated in 2017.
Many website creators also may not be aware of the more modern password creation policy options, and that can be remedied with education and outreach efforts.
The widely diverse password creation policies are likely a usability burden.
Alroomi and Li recently also evaluated website login policies on 18K to 359K websites across the Google CrUX Top 1 Million domains.
Nearly 2,000 domains serve login pages only over HTTP, meaning that they transmit and store passwords in plain text, and 21.2K domains offered the login page over HTTP in addition to HTTPS. Among these are many government and educational domains of entities in Asia and South America.
3,200 websites have copy-pasting disabled for either the email/username or the password field Hundreds of websites deploy typo-tolerant password authentication, which can be abused during attacks that rely on password guessing, credential stuffing and tweaking attacks.
Nearly 6,000 websites return login error messages that make user enumeration attacks easy.
A small number of websites employ login rate limiting that could prevent online brute-force password guessing attacks.
570 websites send plaintext passwords in emails either upon registration, after email verification, or after a password reset request.
GDPR could therefore be used to penalize such insecure practices and incentivize remediation of insecure website behaviors, they added.
Outreach campaigns may be effective at reducing the number of sites that still support login pages over HTTP. And, again, changes in popular web frameworks may fix several login security issues.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 12 Dec 2023 06:13:05 +0000


Cyber News related to Many popular websites still cling to password creation policies from 1985

Many popular websites still cling to password creation policies from 1985 - A significant number of popular websites still allow users to choose weak or even single-character passwords, researchers at Georgia Institute of Technology have found. The researchers used an automated account creation method to assess over 20,000 ...
6 months ago Helpnetsecurity.com
Create Highly Secure Applications in Mule 4 - Accessibility Control/Access Management Use Anypoint Access Management to create your Anypoint Platform account or configure a federated External Identity. Environment Management Anypoint Platform enables you to create and manage separate deployment ...
4 months ago Feeds.dzone.com
Best Password Generators of 2024 to Secure Your Accounts - Overview of best password generators to secure online accounts. We have various password generators to help us protect our accounts and practical barriers to protect our sensitive information. We have compiled this list of the best password ...
1 month ago Cyberdefensemagazine.com
Protect your Active Directory from these Password-based Vulnerabilities - Deploying a security solution like Specops Password Policy enhances the protection of passwords, which are frequently exploited as an initial entry point by attackers. In this attack, the perpetrator, typically using a compromised low-level account ...
6 months ago Bleepingcomputer.com
Open Source Password Managers: Overview, Pros & Cons - There are many proprietary password managers on the market for those who want an out-of-the box solution, and then there are open source password managers for those wanting a more customizable option. In this article, we explain how open source ...
3 months ago Techrepublic.com
Microsoft will roll out MFA-enforcing policies for admin portal access - Microsoft will soon start rolling out Conditional Access policies requiring multifactor authentication from administrators when signing into Microsoft admin portals such as Microsoft Entra, Microsoft 365, Exchange, and Azure. The company will also ...
7 months ago Bleepingcomputer.com
Securden Password Vault Review 2024: Security, Pros & Cons - Securden Password Vault is a password management solution geared towards supervising multiple accounts and sensitive login credentials. Yes, Securden Password Vault can be accessed for free. If you're looking for an enterprise-level password solution ...
4 months ago Techrepublic.com
Top 6 LastPass Alternatives for 2024 - LastPass is a popular choice for managing passwords and sensitive information for individuals and businesses. While the tool still enjoys global patronage, it's not a bad idea to consider other password managers that can serve as worthy alternatives ...
5 months ago Techrepublic.com
Understand the pros and cons of enterprise password managers - To counter these threats, corporate IT security teams are turning to business-grade password managers to help centralize and streamline password and credential management. A password manager is a credential vault that gives IT teams a unified digital ...
4 months ago Techtarget.com
6 Best Enterprise Password Managers for 2024 Rated - Password managers are security tools that store, manage, and share authorization credentials safely for individual users and groups. In this article, I evaluate the top password managers and their ability to deliver and support solutions for ...
3 months ago Esecurityplanet.com
The most popular passwords of 2023 are easy to guess and crack - Each year, analysts at various Internet security companies release lists of the most used passwords. ADVERTISEMENT. The passwords that are on these lists may act as a warning for any Internet and electronic device user. Some common passwords have ...
6 months ago Ghacks.net
Hijacking Your Bandwidth How Proxyware Apps Open You Up to Risk - Is this true? To examine and understand the kind of risks a potential user might be exposed to by joining such programs, we recorded and analyzed network traffic from a large number of exit nodes of several different network bandwidth sharing ...
1 year ago Trendmicro.com
The 20 Most Popular TechRepublic Articles in 2023 - 20 Most Popular TechRepublic Articles in 2023 Here's a list of the 20 most popular articles published by TechRepublic in 2023. Read articles about ChatGPT, Google Bard, Windows 11 and more. This year, developments in generative AI dominated the tech ...
6 months ago Techrepublic.com
Most common passwords: 70% can be cracked in less than a second - Racking your brains to come up with a strong password can be a pain. NordPass, the password management tool from the team behind NordVPN, partnered with independent researchers to release its study of the 200 most common passwords used in 2023. Of ...
7 months ago Cnbc.com
I tried two passwordless password managers, and was seriously impressed by one - Password management apps have been around for decades. There's 1Password, for example, which promises that you'll only need to remember one password instead of dozens or hundreds. Also: Why you can still trust password managers, even after that ...
6 months ago Zdnet.com
How Kasada Counters Toll Fraud and Fake Account Creation for Enterprises - Toll fraud and fake account creation are two advanced threats that bad actors employ for massive profit. Fake Account Creation is committed by a wide range of attackers, through automating the generation of new user accounts en masse, which then get ...
7 months ago Securityboulevard.com
5 ways to secure identity and access for 2024 - 1 This increase is due in part to the rise of generative AI and large language models, which bring new opportunities and challenges for security professionals while affecting what we must do to secure access effectively. Learn how unified multicloud ...
5 months ago Microsoft.com
CISA: AWS, Microsoft 365 Accounts Under Active 'Androxgh0st' Attack - The FBI and the US Cybersecurity and Infrastructure Security Agency have issued an alert about a malware campaign targeting Apache webservers and websites using the popular Laravel Web application framework, leveraging known bugs for initial ...
5 months ago Darkreading.com
Secure Password Hashing in Java - In the domain of digital security, password hashing stands as a critical line of defense against unauthorized access. The landscape of hashing algorithms has evolved significantly, with some methods becoming obsolete and newer, more secure techniques ...
6 months ago Feeds.dzone.com
Human-Centric Security Model Meets People Where They Are - According to Gartner's Drivers of Secure Behavior survey, 93% of employees who behave insecurely do so knowingly. The Many Paths to Human-Centric Security Human-centric security considers people's behaviors, needs, and limitations at all points - not ...
6 months ago Darkreading.com
How MailChimp's Security Breach Caused By Social Engineering Proves That Every Company Should Be Precise with Their Security Policies - A recent security breach at the popular email marketing service MailChimp suggests that the company has fallen victim to a social engineering attack. With the latest incident, there’s an important lesson for all companies—no matter how robust ...
1 year ago Grahamcluley.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
5 months ago Scmagazine.com
Pirated Software Puts Mac Users at Risk as Proxy Malware Emerges - Malware is being targeted at Mac users who receive pirated versions of popular apps from warez websites after they choose to download them from those websites. Various reports state that cybercriminals are infecting macOS devices with proxy trojans ...
6 months ago Cysecurity.news
Why I Chose Google Bard to Help Write Security Policies - COMMENTARY. Ever since large language models like ChatGPT burst onto the scene a year ago, there have been a flurry of use cases for leveraging them in enterprise security environments. From the operational, such as analyzing logs, to assisting ...
6 months ago Darkreading.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)