<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Password Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/password/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/password/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:14:27 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Password Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/password/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 090 Poor Passwords and MFA</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-090-poor-passwords-and-mfa/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 07:15:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Multi-Factor Authentication]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Poor Passwords]]></category>
		<category><![CDATA[Poor Passwords and MFA]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2583</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 90. This week we&#8217;re going to talk about poor passwords and MFA. Where is this coming from? I met somebody earlier this week who had been in one of my training sessions earlier this year. They had been going on about the changes they had made as result of that training&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-090-poor-passwords-and-mfa/">#WeekendWisdom 090 Poor Passwords and MFA</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 90. This week we&#8217;re going to talk about poor passwords and MFA.<span id="more-2583"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2583-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>I met somebody earlier this week who had been in one of my training sessions earlier this year. They had been going on about the changes they had made as result of that training course. The main one he was delighted with was the use of an authenticator app for multi-factor authentication or two factor authentication.</p>
<p>He had put this on, on many of his accounts and he was delighted with it. Because when he had checked his email addresses on www.HaveIBeenPwned.com he found that he had been in a number of data breaches and that his passwords had been exposed in those data breaches. So he made absolutely certain put on multi-factor authentication on those accounts.</p>
<h3>That sounds like a good course of action</h3>
<p>Then I asked him &#8220;and you changed your passwords. Right?&#8221;</p>
<p>He said &#8220;No. No. I can never remember &#8230; I always forget my passwords when I change them. So I use the same password all the time. But now the accounts are fully protected sure with the MFA.&#8221;</p>
<h3>What is wrong with that?</h3>
<p>But I was explaining to him that if he continued to use the same password, that has been included in a data breach, then this is going to be in the public domain and criminals are going to be using that password to try and break into any other accounts that he might have, that he might not have protected with MFA.</p>
<h3>So poor passwords and MFA is not a good idea</h3>
<p>So really he needed to go and make an investment and get himself a password manager and I reiterated that and I will always keep saying you should use a password manager to generate unique long strong passwords for every single account that you have online. Let the password manager remember them. That&#8217;s it&#8217;s job.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-090-poor-passwords-and-mfa/">#WeekendWisdom 090 Poor Passwords and MFA</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4" length="34493011" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 061 Zyxel Backdoor</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 02:00:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Hardcoded]]></category>
		<category><![CDATA[Hardware Inventory]]></category>
		<category><![CDATA[Inventory]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[User ID]]></category>
		<category><![CDATA[Zyxel]]></category>
		<category><![CDATA[Zyxel Backdoor]]></category>
		<category><![CDATA[Zyxel Networks]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2424</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 61. This week we&#8217;re going to talk about a Zyxel Backdoor. What is this Zyxel Backdoor you are talking about? Just after Christmas, Zyxel networks revealed that some of their firewalls and Wi-Fi access point controllers had been discovered to have a hard-coded user ID and password which would enable anybody&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/">#WeekendWisdom 061 Zyxel Backdoor</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 61. This week we&#8217;re going to talk about a Zyxel Backdoor.<span id="more-2424"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2424-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4</a></video></div>
<h3>What is this Zyxel Backdoor you are talking about?</h3>
<p>Just after Christmas, Zyxel networks revealed that some of their firewalls and Wi-Fi access point controllers had been discovered to have a hard-coded user ID and password which would enable anybody who could connect to that device, to be able to sign into it and take control of it.</p>
<p>Now because it&#8217;s a hard coded user ID and password, it&#8217;s not possible to change that on the device itself. So since then Zyxel has released some updates for their firmware, for those devices. Here is the link to their website, so you can go and find out if you have a device that is affected.</p>
<p><a href="https://www.zyxel.com/support/CVE-2020-29583.shtml" target="_blank" rel="noopener">https://www.zyxel.com/support/CVE-2020-29583.shtml</a></p>
<h3>I&#8217;m not sure whether I have one of those?</h3>
<p>But this then begs the question. Do you know if you have a Zyxel device on your network?</p>
<p>If you remember waaaaay back in <a href="https://www.l2cybersecurity.com/weekendwisdom-001-inventory/" target="_blank" rel="noopener">#WeekendWisdom number 1</a>, I talked about needing to have an inventory of all of your hardware so that you could quickly go and find, if you hear a report like this, you say &#8220;Do I have Zyxel equipment?&#8221; &#8230; check the inventory &#8230; and then if you do have it, you know you have to take action.</p>
<p>So it&#8217;s really important to know what devices you have connected to your network.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/">#WeekendWisdom 061 Zyxel Backdoor</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4" length="26573927" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 056 Credential Stuffing</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 02:15:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Account Compromise]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Stuffing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[HaveIBeenPwned]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Reuse]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Unique Password]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2388</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing. Where is this coming from? I have introduced the www.HaveIBeenPwned.com service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing.<span id="more-2388"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2388-3" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>I have introduced the <a href="https://www.haveibeenpwned.com" target="_blank" rel="noopener noreferrer">www.HaveIBeenPwned.com</a> service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have been included in data breaches. When they&#8217;ve gone to look and see what was breached, in a number of cases they had at least their email address and password for that service were included in the data breach.</p>
<p><em>Also check out previous <a href="https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 014</a>, <a href="https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 015</a> and <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 016</a>.</em></p>
<h3>Data breaches are bad. What should they do?</h3>
<p>So they asked me &#8220;What should I do?&#8221;. The first thing of course is always, they must change their password on that service or site or whatever it was that was breached. Then I ask &#8220;Do you use that password anywhere else?&#8221; And they say &#8220;Yeah. I use it on multiple sites&#8221; or &#8220;It&#8217;s my favourite password. I use it everywhere.&#8221;</p>
<p>So I said &#8220;Well you&#8217;re going to have to change that password on all of these other platforms.&#8221;</p>
<p>They say &#8220;That&#8217;s going to be an awful lot of effort. Why should I worry?&#8221;</p>
<h3>Why did you call this post Credential Stuffing?</h3>
<p>You worry because of a thing called Credential Stuffing. What happens is that the bad guys, they take these data breaches, say from LinkedIn back in 2012. They take those email addresses and passwords that they have cracked and they try to sign into Facebook, into Twitter, into Microsoft 365, into Google G Suite, into Gmail and many, many other services. The criminals will try all of these things automatically.</p>
<p>They are stuffing credentials into services to be able to try and break in. That is what credential stuffing is all about. That is why you should not use the same password across multiple platforms and services.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4" length="29665510" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 016 Password Best Practices</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 21 Feb 2020 11:01:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Best Practices]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Passwords Best Practices]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1842</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 16. This week I&#8217;m going to talk about Password Best Practices. Password Best Practices This will be a simple week of do&#8217;s and don&#8217;ts around passwords. Do use a unique password Use a unique password for every single site, service and account that you may have. Do use a long password&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/">#WeekendWisdom 016 Password Best Practices</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 16. This week I&#8217;m going to talk about Password Best Practices.<span id="more-1842"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1842-4" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-016-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-016-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-016-lo.mp4</a></video></div>
<h3>Password Best Practices</h3>
<p>This will be a simple week of do&#8217;s and don&#8217;ts around passwords.</p>
<h3>Do use a unique password</h3>
<p>Use a unique password for every single site, service and account that you may have.</p>
<h3>Do use a long password</h3>
<p>And do use long passwords for those sites, services and accounts. I&#8217;m talking about 15 characters or more for the passwords.</p>
<p>Now your probably thinking &#8220;How the hell am I going to remember long passwords like that, for the dozens and dozens of accounts that I have?&#8221;</p>
<h3>Do use a password manager</h3>
<p>Get yourself a password manager which will do the remembering for you. All you need to do is remember a single master password, for the password manager. Now make that one password nice and long, like 20 characters or more. But that is the only password that you need to remember. The password manager can then generate really long, complicated passwords for all of your accounts for you. And it will just remember them for you.</p>
<h3>Don&#8217;t share your passwords</h3>
<p>Don&#8217;t share your password with anybody else, because sharing a password with other people might be considered a data breach. Because they may suddenly have access to data that they shouldn&#8217;t do.</p>
<h3>Don&#8217;t regularly change your passwords</h3>
<p>And finally don&#8217;t change your passwords on a regular basis. Passwords that are changed on a regular basis usually end up with numbers at the end of them which get incremented each time the password is changed and that is really, really poor. You should only change your password if you suspect it has been compromised.</p>
<p>So that&#8217;s it for this week. Let&#8217;s be careful out there and we&#8217;ll talk to you again next week.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/">#WeekendWisdom 016 Password Best Practices</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-016-lo.mp4" length="24224387" type="video/mp4" />

			</item>
		<item>
		<title>Dodgy extensions and not a builder in sight.</title>
		<link>https://www.l2cybersecurity.com/dodgy-extensions-no-builder-seen/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 06 Sep 2018 12:05:51 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1385</guid>

					<description><![CDATA[<p>A lot of normal people might think about the phrase &#8220;dodgy extensions&#8221; and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse. This has come to light recently when a browser&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-extensions-no-builder-seen/">Dodgy extensions and not a builder in sight.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1389" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dodgy-extensions-150x150.jpg" alt="dodgy extensions" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dodgy-extensions-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dodgy-extensions.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />A lot of normal people might think about the phrase &#8220;dodgy extensions&#8221; and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse. <span id="more-1385"></span>This has <a href="https://krebsonsecurity.com/2018/09/browser-extensions-are-they-worth-the-risk/">come to light recently</a> when a browser extension for a popular cloud storage service called <em><strong>Mega.nz</strong></em> was compromised and started passing people&#8217;s User IDs and passwords to an evil doer&#8217;s server based in the Ukraine. This is similar to the <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">breach in April</a> where Saks and related stores in the US had their point-of-sale terminals compromised.</p>
<h3>What is an extension?</h3>
<p>These are little pieces of software that are available for internet browsers to provide some type of add-on or extra functionality. There are thousands of these kind of things out there and you might have some installed without realising it. One quick way is to look at the top of your browser window, on the right-hand-side of the address bar, there may be a few icons. Here is an example from my Chrome browser:</p>
<p><img decoding="async" class="aligncenter size-full wp-image-1386" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/List-of-extensions.jpg" alt="" width="130" height="34" /></p>
<p>These extensions are:</p>
<ol>
<li>LastPass (password manager)</li>
<li>Privacy Badger (blocks tracking cookies)</li>
<li>F-Secure Browser Protection (adds security for online banking pages)</li>
<li>HTTPS Everywhere (forces browser to use HTTPS version of websites where possible)</li>
</ol>
<p>All security related for some reason. ?</p>
<p>Not all installed extensions may be shown on the browser bar. They may also be hidden, but still enabled. In order to find out what extensions you have, do the following:</p>
<ul>
<li>Google Chrome &#8211; paste the following address into a new tab <a href="chrome://extensions/" target="_blank" rel="noopener">chrome://extensions/</a></li>
<li>Firefox &#8211; paste the following address into a new tab <a href="about:addons" target="_blank" rel="noopener">about:addons</a></li>
<li>Edge &#8211; Click the three horizontal dots (top right of the browser) -&gt; Extensions</li>
</ul>
<p>If you have a lot of extensions, then you have a greater chance of falling victim to the bad guys.</p>
<h3>How do we get dodgy extensions?</h3>
<p>Most of the extensions you have are probably all legitimate and from a reliable source &#8230; originally. However, over time the developers of these extensions may sell them on or even just give up on them and somebody else takes control of the extension. In the case of the <em><strong>Mega.nz</strong></em> extension, the person responsible for the software was compromised. The extension was then infected for a period of time and it joined the ranks of the dodgy extensions.</p>
<p>The software started stealing users log-in IDs &amp; passwords and sending them onto the criminals. To do this, it required additional permissions on the users browser, which unwary people granted. If you&#8217;ve used an extension that is actively being enhanced, you will regularly sees notifications that it has been updated. In the <strong><em>Mega.nz</em></strong> case, when the notification was issued, there was also a notice about the additional permissions that the evil doers needed to be granted in order to steal passwords.</p>
<p>Here is an example of the permissions needed by LastPass:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1388" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Extension-permissions.jpg" alt="" width="346" height="159" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Extension-permissions.jpg 346w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Extension-permissions-300x138.jpg 300w" sizes="(max-width: 346px) 100vw, 346px" /></p>
<p>Those are already pretty extensive. If that suddenly required additional permissions, most people might tend to just click OK to &#8220;get on with it&#8221; and not stop to think &#8220;Why is this asking for enhanced permissions?&#8221;</p>
<h3>What should I do?</h3>
<p>If you have been using your computer for a while, you may have accumulated more and more extensions. So review all of the extensions you have. Remove those that you no longer use or don&#8217;t need.</p>
<p>You should also put in place controls on your staff, to prevent them from installing dodgy extensions. You don&#8217;t want them causing any kind of data breach which might fall into the auspices of the #GDPR.</p>
<p>If and when an extension gets updated, if it asks for additional permissions, <span style="text-decoration: underline;"><strong>always deny them</strong></span>. Then seek an expert opinion. An actual expert and not your 15 year old computer mad niece/nephew. You could send us details of the extension and what permissions it wants at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we will answer free of charge.</p>
<p>If you would prefer a security review of your set-up we would be happy to arrange that too. Call us on 087-436-2675.</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-extensions-no-builder-seen/">Dodgy extensions and not a builder in sight.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sextortion scam &#8211; a follow up.</title>
		<link>https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 15 Aug 2018 11:34:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1354</guid>

					<description><![CDATA[<p>This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments. The first thing to highlight is that the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/">Sextortion scam &#8211; a follow up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1355" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up-150x150.jpg" alt="Sextortion scam follow up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Sextortion-Follow-up.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />This time <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">last month I posted</a> about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments.<span id="more-1354"></span></p>
<p>The first thing to highlight is that the evil doers are now using partial telephone numbers in this sextortion scam instead of old passwords. This can be more effective than the old password ruse that was used last month. This could be because many people may have changed passwords since. However not too many of us regularly change our mobile number.</p>
<h3>New development of the sextortion scam</h3>
<p>We may also be quite used to seeing our number appear in a partially redacted manner.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1356" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938.png" alt="" width="855" height="621" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938.png 855w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938-300x218.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/sextortion-example-20180813-211938-768x558.png 768w" sizes="auto, (max-width: 855px) 100vw, 855px" /></p>
<p>So in this example, the victim sees the number +XX XXXXXX6074 instead of an old password. They have <a href="https://isc.sans.edu/forums/diary/New+Extortion+Tricks+Now+Including+Your+Partial+Phone+Number/23982/" target="_blank" rel="noopener">confirmed to the good folks</a> over at the Internet Storm Centre (ISC) that those last 4 digits match their number. So that can really make people sit up and take notice.</p>
<p>The question arises though &#8211; why are they partially redacting the number? It&#8217;s not like these guys are reputable and are trying to protect your privacy by not emailing the full number. If they truly had your full information from a hack or a data breach, why not just put the whole thing in there? It would be very much more effective.</p>
<p>No, they don&#8217;t have your full number at all and as surmised by the team over at the ISC, they are probably getting the information from password reset forms. This is where the like of Google and Amazon will send you a text message with a code as part of the reset process. Or as part of a two-factor authentication step such as the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1357" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile.jpg" alt="" width="368" height="256" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile.jpg 368w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/two-factor-mobile-300x209.jpg 300w" sizes="auto, (max-width: 368px) 100vw, 368px" /></p>
<p>So the bad guys have upped their game here. Just don&#8217;t fall for it.</p>
<h3>Are they making any money?</h3>
<p>The other update in relation to this is about the money they have actually made from this sextortion scam. A couple of weeks ago the fine people at the ISC <a href="https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922/" target="_blank" rel="noopener">did an analysis</a> of the bitcoin wallets that were included in the scam emails. These are the long string of characters and numbers that I redacted in the email example above.</p>
<p>&#8220;Wait a second&#8221; I hear you say, &#8220;Bitcoin is untraceable, anonymous money.&#8221;. Actually it&#8217;s not really untraceable as by the very nature of the blockchain on which bitcoin is based, each transaction is fully public. It would be more appropriate to say that it is unregulated money.</p>
<p>Anyway, their analysis revealed that of the many wallets they were monitoring:</p>
<ul>
<li>123 payments were received</li>
<li>$235,000 in total was paid to those wallets</li>
<li>$4,900 was the biggest payment, with an average payment of $1,900</li>
</ul>
<p>This was probably a subset of all the wallets in use across the whole campaign. However you can see that people were fooled into parting with their money in reasonably large numbers.</p>
<p>So you now want to easily protect you and your staff from these kind of scams, right? I do some pretty awesome <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf" target="_blank" rel="noopener">security awareness training</a>. If you were interested in finding out more, just send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a>.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/sextortion-scam-a-follow-up/">Sextortion scam &#8211; a follow up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Sextortion Scam</title>
		<link>https://www.l2cybersecurity.com/a-sextortion-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 12 Jul 2018 22:06:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sextortion]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1252</guid>

					<description><![CDATA[<p>The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. You receive an e-mail at your current e-mail&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-sextortion-scam/">A Sextortion Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1253" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion-150x150.jpg" alt="Sextortion Scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Sextortion.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. <span id="more-1252"></span>You receive an e-mail at your current e-mail address with a subject line containing a User ID and Password from a very old account that belonged/belongs to you. The e-mail alleges that they have a video of you watching porn as well as the what porn you were viewing. They then look for money to not release the video to all of your friends, family and colleagues.</p>
<p>It is of course a scam, but having an old User ID and Password on the e-mail does seem to give it a sort of legitimacy, in that they may just have hacked your computer. If you happened to be somebody who recently viewed porn on that computer, one which has a webcam, then you may just fall victim to this sextortion scam. This is what a typical e-mail looks like:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1254" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM.jpg" alt="Sextortion Scam e-mail" width="834" height="544" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM.jpg 834w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM-300x196.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/Screen-Shot-2018-07-12-at-1_50_28-PM-768x501.jpg 768w" sizes="auto, (max-width: 834px) 100vw, 834px" /></p>
<p>The amount payable varies between the various e-mails, as does the Bitcoin wallet address (both circled above). There may also be a number of random words towards the end of the e-mail, which are used to defeat spam filters.</p>
<p>The bottom line here is, these people did NOT hack into your machine and record you watching porn. If they did, why wouldn&#8217;t they include a frame from said footage to prove that they had something on you.</p>
<p>The old User ID and Password that they included will have been picked up by the bad guys from a data breach sometime in the past. This stuff has been knocking around the internet for a loooonnng time. I did mention this last year when I talked about another <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">scam e-mail that knew your name</a>. They will have used other indexing techniques to associate the old account with your current e-mail address and then send you the scam e-mail.</p>
<p>Well known security reporter Brian Krebs, reckons that the evil doers may refine their technique and <a href="https://krebsonsecurity.com/2018/07/sextortion-scam-uses-recipients-hacked-passwords/">use more recent accounts</a> that were part of a data breach.</p>
<p>As I always do in these e-mails I refer you to my <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">fifth commandment</a>. I&#8217;ll also throw in a shameless plug for the <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/Security-Awareness-and-Safety-Training.pdf">security awareness training</a> that I provide, which, if you were interested in finding out more, just send an e-mail to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>Let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-sextortion-scam/">A Sextortion Scam</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is somebody else using your password?</title>
		<link>https://www.l2cybersecurity.com/is-somebody-else-using-your-password/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Sat, 24 Feb 2018 10:21:52 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1135</guid>

					<description><![CDATA[<p>Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. ? So how do I&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1154" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg" alt="" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Password-stealing.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Is somebody else using your password? If your password is &#8220;123456&#8221;, then absolutely yes. Nearly 21 million other accounts use that same password. But how about &#8220;Gobbledegook&#8221;? That password is actually used by at least 9 other accounts. &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; has not been used before &#8211; I might use it for myself. <span id="c128" class="notranslate">?</span><span id="more-1135"></span></p>
<p>So how do I know these things? Where am I getting this figures from. Well just like November where I told you about the free <a href="https://www.l2cybersecurity.com/quad9-safer-addressing-internet/">Quad 9 service</a>, which prevents you going to know evil sites or in December where I told you about the free <a href="https://www.l2cybersecurity.com/simple-security-planner-tool/">Security Planner tool</a>, which gave you simple advice on how best to protect your particular set-up, this month I give you the free <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords tool</a>, which was developed by highly respect security researcher <a href="https://www.troyhunt.com/">Troy Hunt</a>. Before you leap to the comments section highlighting my atrocious spelling &#8211; that&#8217;s how it is spelled &#8211; <a href="https://www.urbandictionary.com/define.php?term=pwned">pwned</a> is a computer gamer term for being completely dominated or compromised and is pronounced &#8220;powned&#8221; (to rhyme with &#8220;owned&#8221;).</p>
<p>So how does this pwned password tool answer the question is somebody else using your password? It&#8217;s quite simple, the Troy has got copies of online account information (including passwords) that has been breached from various sources over the last number of years. He has 500 million passwords on his database. Now he doesn&#8217;t have the passwords linked to their associated account, such that if he was hacked that somebody would get access to his juicy treasure trove of account information, it&#8217;s simply a database of passwords. He has used a certain very secure methodology to test the passwords, but there is no point in going into it here. If you&#8217;re a nerd with an itch to scratch, then you can read all about <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity">his methodology here</a>.</p>
<p>So how should you use this tool? Simple go to the <a href="https://haveibeenpwned.com/Passwords">Pwned Passwords</a> page and type in your various passwords. Here is the result for &#8220;123456&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1152 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg" alt="poor choice of password" width="921" height="140" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456.jpg 921w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-300x46.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/123456-768x117.jpg 768w" sizes="auto, (max-width: 921px) 100vw, 921px" /></p>
<p>And the result for &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221;:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1153" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg" alt="better choice of password" width="925" height="99" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice.jpg 925w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-300x32.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Liamisanice-768x82.jpg 768w" sizes="auto, (max-width: 925px) 100vw, 925px" /></p>
<p>So what should you do if your password has been used before, particularly where it has been used a LOT? It&#8217;s kind of obvious, but you need to change it. Yes, I know it&#8217;s a pain. Yes you might forget what you changed it to. Guess what? When you change it, write your new password down on a piece of paper and put it in your drawer or maybe your wallet/purse. <span id="c126" class="notranslate">?</span></p>
<p>No I haven&#8217;t taken complete leave of my senses. But this is a case of risk reduction. Sure, you have an open copy of your password in a public-ish place, but it&#8217;s not going to be there forever. You will consult this piece of paper regularly in the first 3-4 days after changing your password. As your muscle memory starts to kick in, you will consult it less and less. After a week to 10 days you probably won&#8217;t be using the piece of paper anymore, so at that point you can destroy it.</p>
<p>Keeping this reminder of your password to hand will also enable you to do one more brilliant thing with your password and that is to make it LOOOOOONNNNNGGGGG. Don&#8217;t use &#8220;LiamIsANiceHelpfulCyberSecurityPerson&#8221; because that&#8217;s mine <span id="c132" class="notranslate">?</span> but either use a long passphrase (a sequence of words like my example) that is <span style="text-decoration: underline;"><strong>at least</strong></span> 15-20 characters long or use a password manager to generate a long nonsensical password which it has to remember, but you don&#8217;t. You only have to remember the master password, which you will have made it long and complicated. More details about passwords can be found under <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">Commandment 8</a>, including talk about password managers.</p>
<p>Actually, one of the other really cool things Troy has done was to enable developers to create plug-ins that can query his database of passwords. One of the password managers (<a href="https://1password.com/">1Password</a>) has <a href="https://techcrunch.com/2018/02/23/1password-bolts-on-a-pwned-password-check/">incorporated this functionality</a> into it&#8217;s product, so if you chose a password that has been pwned, it will be flagged to you.</p>
<p>Finally, it would be remiss of me not to point out the main feature of Troy Hunt&#8217;s site. This has been around for many years and it&#8217;s the <a href="https://haveibeenpwned.com/">Have I been pwned?</a> feature. All you do is put in your e-mail address(es) or User IDs and it will tell you if they were part of a data breach of some online service. He has details on nearly 5 billion breached accounts, so it&#8217;s pretty comprehensive.</p>
<p>The post <a href="https://www.l2cybersecurity.com/is-somebody-else-using-your-password/">Is somebody else using your password?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sneaky Tax Refund e-mails</title>
		<link>https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 09:55:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1139</guid>

					<description><![CDATA[<p>Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before. It is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1141" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg" alt="Tax refund scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.<span id="more-1139"></span></p>
<p>It is tax season in the US at the moment and there are a lot of scams going on, which the <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">IRS do warn people about</a>. This one caught my attention because it was a simple attempt to steal e-mail account credentials. Apparently there have been some changes made to the US tax code, which people are aware of but may not fully understand them, which may be enough to cause somebody to fall for this scam.</p>
<p>What happens is the victim receives an e-mail with the subject of &#8220;Federal Tax Refund Information&#8221;.</p>
<p>This e-mail then says &#8220;Good afternoon, I have a very important information for you concerning the Federal Tax Refund which I know that it will help you. Kindly check the attached file to view the details.&#8221; For those of you unfamiliar with <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, you might be tempted to open the attachment.</p>
<p>The PDF that is attached, when opened, simply contains what looks like a link to a Google Drive document.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1142 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png" alt="Tax refund scam google drive link" width="639" height="564" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png 639w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40-300x265.png 300w" sizes="auto, (max-width: 639px) 100vw, 639px" /></p>
<p>Which of course you want to look at because, money! There is also a sense of urgency introduced by saying the tax refund document is only stored for 14 days. While this is a fairly lengthy period by phishing standards, it still sows a sense of haste.</p>
<p>Clicking on the link, brings you to a website that looks an awful lot like a Google Docs sign-in page which, if you are not paying attention, might cause you to give away your Gmail account name and password. I refer, of course, to not paying attention in regards to the address of the sign-in page, which is circled in <span style="color: #ff0000;">red</span>:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1143 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png" alt="Tax refund scam google drive sign-in" width="616" height="536" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png 616w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54-300x261.png 300w" sizes="auto, (max-width: 616px) 100vw, 616px" /></p>
<p>That is not &#8220;https://accounts.google.com&#8221; which would be what you are would normally expect. Of course if a genuine account and password is provided, then the evil doers will now take full control over the e-mail account and use it for nefarious purposes, UNLESS of course you had followed <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">Commandment 7</a> and used two-factor authentication. If you had, you could then laugh at the bad guys attempting to login as you and failing because of this brilliant protection mechanism.</p>
<p>Then you calmly go ahead and change that password in ALL accounts that you used it in, because it&#8217;s now compromised.</p>
<p>While this has been relating to the US tax season, expect similar carry-on during October in Ireland.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Sharing = Data Breach</title>
		<link>https://www.l2cybersecurity.com/password-sharing-data-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 10:09:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1020</guid>

					<description><![CDATA[<p>I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought &#8220;That&#8217;s not a good idea. This person needs to receive some security awareness training.&#8221; I even have a commandment for it.Then I find out that British MPs actually receive quite a lot of support and training in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/password-sharing-data-breach/">Password Sharing = Data Breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1033" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Underwear-150x150.jpg" alt="password sharing" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Underwear-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Underwear.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought &#8220;That&#8217;s not a good idea. This person needs to receive some security awareness training.&#8221; I even have a <a href="http://www.l2cybersecurity.com/viii-never-reveal-your-password-to-anyone/">commandment</a> for it.<span id="more-1020"></span>Then I find out that British MPs actually receive quite a lot of support and training in IT security matters.</p>
<p>On further reflection, this is actually an extremely worrisome <a href="https://www.theregister.co.uk/2017/12/04/dorries_i_give_my_staff_my_login_details/">scenario</a>. As an MP, Ms. Dorries would receive e-mail correspondence from her constituents on a daily basis. I wouldn&#8217;t expect all of them would be telling her she is doing a great job (though a small few might).</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1034 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Password-sharing.jpg" alt="nadine dorries password sharing" width="573" height="345" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Password-sharing.jpg 573w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/Password-sharing-300x181.jpg 300w" sizes="auto, (max-width: 573px) 100vw, 573px" /></p>
<p>Most people contact their government representatives when they have a problem or concern. These problems or concerns are usually in respect to some dealing that they have with a government department, which they are hoping their elected representative can sort out for them.</p>
<p>The fact that an intern has full access to the representatives email because of password sharing, is staggering. Because they have Ms. Dorries password, when they use her e-mail, THEY are Ms. Dorries (in a virtual sense). So let&#8217;s for argument just say, this intern is a neighbour of the person who has e-mailed Ms. Dorries about a problem they have in accessing mental health services with the Department of Health.</p>
<p>The person sending the e-mail, sent it to Ms. Dorries &#8230; not to their neighbour &#8230; they would be justifiably horrified that their neighbour now knows they have issues with mental health. That information is sensitive personal data and must be protected at all costs.</p>
<p>Nadine Dorries has a very real operational issue to handle. She receives a lot of e-mail which she cannot be expected to process all on her own. However, the information she receives should always be considered sensitive personal data, so this needs protection (always has needed it and most definitely will continue to need it under the GDPR).</p>
<p>There is a facility in e-mail, that allows somebody to &#8220;delegate&#8221; access to their mailbox to others. Ms. Dorries should use this facility to delegate access to her mailbox to her &#8220;trusted&#8221; assistants. These trusted assistants should have some level of clearance and received data privacy/protection training, so they can then determine whether</p>
<ol>
<li>they should pass the e-mail to Ms. Dorries for direct resolution on a most sensitive matter.</li>
<li>handle the matter themselves, in confidence.</li>
<li>or pass a minor, non-sensitive issue to an intern to handle.</li>
</ol>
<p>The delegation function in e-mail will show an audit trail of what the delegate did with the e-mail, so there will be trace-ability if they do something naughty. By having the boss&#8217; password, there can be no trace-ability.</p>
<p>Therefore, sharing your password where you handle sensitive personal data is a data breach, plain and simple. This is because others have unrestricted, unauthorised, untraceable access to this personal data, which means you&#8217;ve lost control of it. As summary punishment, you should be made to wear the underwear of this post&#8217;s featured image on the outside of your clothes while you await a judgement from the Data Protection Commissioner.</p>
<p>And may Helen Dixon have mercy on your password sharing soul. <span id="c132" class="notranslate">?</span></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/password-sharing-data-breach/">Password Sharing = Data Breach</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
