![]() ![]() 5 with 86,000 users, all the top 10 iMesh passwords were similarly common numerical sequences. Close to a million accounts (or about 2 percent) used "123456", more than 300,000 used "123456789", and so on. LeakedSource's list of the most common iMesh passwords is depressing. The methods iMesh used, albeit 3 years ago, were still insufficient for the times." ![]() "'Salting' makes decrypting passwords exponentially harder when dealing with large numbers such as these, and is better than what LinkedIn and MySpace did, but MD5 itself is not nearly hard enough for modern computing. ![]() "Passwords were stored in multiple MD5 rounds with salting," read a LeakedSource blog post. The number of MD5 flaws has built up since then, and no company should have been using the algorithm in 2013, when the iMesh data breach seems to have happened. The company hashed its user passwords with the MD5 algorithm, for which the first weakness was found in 2005. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |