SlideShare une entreprise Scribd logo
1  sur  22
LINKEDIN BREACH:
HOW TO MAKE YOUR PASSWORDS STRONGER
Meet Sam
2



    Sam’s an up-and-comer
    who has active online
    accounts with his bank,
    credit issuers and social
    networking sites—
    including LinkedIn.




    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
Sam’s got a password problem
3



    Sam’s LinkedIn password was
    one of 6.5 million passwords
    posted on a Russian hackers’
    website.
    His password was iAmSam.
    He used this password for his
    primary email and many
    other accounts.




    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
Sam’s not happy
4



    He reads on The Verge, a great source for tech news, that
    LinkedIn stored passwords as “unsalted SHA-1 hashes. SHA-1 is a
    secure algorithm, but it is not foolproof if your password is
    simple and short. LinkedIn could have made the passwords more
    secure by ‘salting’ them.”

    Salt. Hash. Huh?




    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
5   Sam is confused
    What do passwords have to do with greasy diner food?

    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
Sam does his homework
6



    He learns that many websites—
    including LinkedIn—encrypt
    passwords in an effort to protect
    them. The encrypted passwords are
    called hashes. The site stores the
    hashes on its servers instead of the
    passwords themselves.
    For example, a website could use
    an SHA-1 or Secure Hash Algorithm
    to convert
                  iAmSam
                     to
         c743bb2561f20745330122
           dcc254abaf524e277d.
    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
7             Sam learns why salt is good
                                    To make password hashes more secure, a system
                                    adds salt (or random characters) to the beginning
                                    of the password. Then it converts the new, salted
                                    password into a hash.

                                    So the iAmSam password would be salted to look
                                    like RoUTiAmSam, then hashed into
                                    ebc5047362323f1e29c1cb3d457594b1ca4ea2bc.



© 2003-2012 Identity Theft 911, LLC. All Rights Reserved                          June 13, 2012
8             LinkedIn didn’t add salt




© 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
How the hackers get in
9



    Hackers armed with your hashed password and
    username can:
    1. Log in to your LinkedIn account
    2. Lock you out

    3. Spam your contacts

    When your contacts click on links in their spam email, they
    let the hackers in by downloading malware. This malicious
    software gives hackers access to their computers.



    © 2003-2012 Identity Theft 911, LLC. All Rights Reserved      June 13, 2012
Hackers love Sam
10



     Then the real trouble begins.
     Once they’re in your computer, hackers can gain access to
     your personally identifiable information, such as a birth date,
     look up your mother’s maiden name and launch serious
     identity theft.
     The real problem: Like so many people, Sam uses one
     password for most of his online accounts.
     Hackers love Sam because he used his LinkedIn password on his
     primary email account, so now they can access his email.


     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved    June 13, 2012
11             Sam’s password is his identity
               Sam’s email address is a key piece of his identity on
               the Internet. Often it is his username for an online account.
               Armed with his email address and password, hackers can
               enter his accounts, reset Sam’s passwords and gain control.
               To make matters worse, Sam saved copies of his printed
               identification—his passport and Social Security number—in
               his email account.



 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved                 June 13, 2012
12             Sam’s vulnerable
               LinkedIn users are at greater risk for fraudbecause:
               1.   They have higher incomes.
               2.   Their profiles are meant to be viewed by strangers.
               3.   They are often lax with their privacy settings.




 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved                 June 13, 2012
Sam swings into action
13



     He follows these seven tips:

     1.   Change your password
     2.   Create a strong password
     3.   Make it even stronger
     4.   Use unique passwords
     5.   Consider a password solution
     6.   Alert others
     7.   Beef up security



     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
Sam Smart


        greeneggsandham@smail.com




14   1. Change your password
     Log in to your account. Go to settings and click on
     “Password Change.”
     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
15             2. Create a strong password
               It should be long. Think of a good
               quote or song and use the first letter
               in each word to make a long password.
               Sam uses a line from his favorite
               Dr. Seuss book.
               Quote: “You’re off to great places.
               Today is your day!”
               Password: yotgptiyd

 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
16             3. Make it even stronger
               Include numbers, upper- and lowercase letters, and symbols.
               For example, “3Dogz$$!” is better than “1006.”
               Or substitute numbers for letters that look similar (for
               example, substitute “0” for “o” or “3” for “E”.
               Sam replaces the “o” with “0” and the “d” with “6.”

               Old password: yotgptiy6
               New password: y0tgptiy6

 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved                 June 13, 2012
17             4. Use unique passwords
               Avoid using the same password twice.
               If that old LinkedIn password is used on other websites,
               go to those sites and change the password immediately.




 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved          June 13, 2012
5. Consider a password manager
18



     Sam is annoyed. How will he
     remember his passwords?
     He checks out password
     managers like OneID,
     1Password and KeePass.
     They make it easier for you
     to remember, manage and
     secure your passwords.
     Some are free. Others have
     monthly fees.


     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
6. Alert others
19



     If your account is compromised, alert your contacts so they
     don’t become victims. Notify LinkedIn to regain control of your
     account or freeze it.




     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
20               7. Beef up security
             •   Sign out of website accounts after you use them.
             •   Set your account information and privacy settings as tight
                 as possible.
             •   Keep your antivirus software up to date.
             •   Don’t publically share personal information.
             •   On social networks, only connect to people you know and trust.




 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved                     June 13, 2012
Sam is glad
21



     Now Sam uses strong, unique
     passwords for different online
     accounts.
     He feels good knowing he’s doing
     everything he can to protect his
     identity.




     © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012
22             Be proactive
               If you suspect you’re a victim of
               identity theft, call your bank, credit
               union or insurer. They may offer identity
               theft protection.
               Or call Identity Theft 911
               1-888-682-5911
               Don’t be afraid to ask lots of questions.



 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved   June 13, 2012

Contenu connexe

En vedette

Media question 4
Media question 4 Media question 4
Media question 4 11025663
 
2013年度のトレンド
2013年度のトレンド2013年度のトレンド
2013年度のトレンドMicro Power
 
Presentations lesson 1 yd
Presentations lesson 1 ydPresentations lesson 1 yd
Presentations lesson 1 ydsolarboy907
 
Financial & profit planning
Financial & profit planningFinancial & profit planning
Financial & profit planningAnamika Santhosh
 
产品研发设计 优秀作品1-healthy whale
产品研发设计 优秀作品1-healthy whale产品研发设计 优秀作品1-healthy whale
产品研发设计 优秀作品1-healthy whaleChiyu Zan
 
Fiko Store
Fiko StoreFiko Store
Fiko Storefegome1
 
Pontdamis 15052012-bert celis
Pontdamis 15052012-bert celisPontdamis 15052012-bert celis
Pontdamis 15052012-bert celisinnovatiecentra
 
transcosmos investment portfolio_20160620
transcosmos investment portfolio_20160620transcosmos investment portfolio_20160620
transcosmos investment portfolio_20160620Ricardo Olmos
 
Kentucky-Tahsiyn and Kassidy
Kentucky-Tahsiyn and KassidyKentucky-Tahsiyn and Kassidy
Kentucky-Tahsiyn and Kassidyklei8103
 

En vedette (15)

Gordon
GordonGordon
Gordon
 
Calendario barrial 7abril
Calendario barrial 7abrilCalendario barrial 7abril
Calendario barrial 7abril
 
Media question 4
Media question 4 Media question 4
Media question 4
 
2013年度のトレンド
2013年度のトレンド2013年度のトレンド
2013年度のトレンド
 
Presentations lesson 1 yd
Presentations lesson 1 ydPresentations lesson 1 yd
Presentations lesson 1 yd
 
Description writing
Description writingDescription writing
Description writing
 
Analisis competencias
Analisis competenciasAnalisis competencias
Analisis competencias
 
Rehabilitación tubería proceso semzza
Rehabilitación tubería  proceso semzzaRehabilitación tubería  proceso semzza
Rehabilitación tubería proceso semzza
 
Was
WasWas
Was
 
Financial & profit planning
Financial & profit planningFinancial & profit planning
Financial & profit planning
 
产品研发设计 优秀作品1-healthy whale
产品研发设计 优秀作品1-healthy whale产品研发设计 优秀作品1-healthy whale
产品研发设计 优秀作品1-healthy whale
 
Fiko Store
Fiko StoreFiko Store
Fiko Store
 
Pontdamis 15052012-bert celis
Pontdamis 15052012-bert celisPontdamis 15052012-bert celis
Pontdamis 15052012-bert celis
 
transcosmos investment portfolio_20160620
transcosmos investment portfolio_20160620transcosmos investment portfolio_20160620
transcosmos investment portfolio_20160620
 
Kentucky-Tahsiyn and Kassidy
Kentucky-Tahsiyn and KassidyKentucky-Tahsiyn and Kassidy
Kentucky-Tahsiyn and Kassidy
 

Similaire à LinkedIn Breach: How to Make Your Passwords Stronger

Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
Job seekers defense against spammers/spambots Sept 7, 2012
Job seekers defense against spammers/spambots Sept 7, 2012Job seekers defense against spammers/spambots Sept 7, 2012
Job seekers defense against spammers/spambots Sept 7, 2012chuckthomassql
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Password Vault Manager
Password Vault  ManagerPassword Vault  Manager
Password Vault Managersplashid
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
MacMAD MacOS Security
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Securitybos45
 
Email and web security
Email and web securityEmail and web security
Email and web securityshahhardik27
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxAsmajaved42
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwordsBunmi Sowande
 
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxlesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxAlleahGevero
 

Similaire à LinkedIn Breach: How to Make Your Passwords Stronger (20)

Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
Job seekers defense against spammers/spambots Sept 7, 2012
Job seekers defense against spammers/spambots Sept 7, 2012Job seekers defense against spammers/spambots Sept 7, 2012
Job seekers defense against spammers/spambots Sept 7, 2012
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Password Vault Manager
Password Vault  ManagerPassword Vault  Manager
Password Vault Manager
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
MacMAD MacOS Security
MacMAD MacOS SecurityMacMAD MacOS Security
MacMAD MacOS Security
 
Email and web security
Email and web securityEmail and web security
Email and web security
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
travel Safely
travel Safelytravel Safely
travel Safely
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
lesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptxlesson 2 online Safety Security eth.pptx
lesson 2 online Safety Security eth.pptx
 

Dernier

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Dernier (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

LinkedIn Breach: How to Make Your Passwords Stronger

  • 1. LINKEDIN BREACH: HOW TO MAKE YOUR PASSWORDS STRONGER
  • 2. Meet Sam 2 Sam’s an up-and-comer who has active online accounts with his bank, credit issuers and social networking sites— including LinkedIn. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 3. Sam’s got a password problem 3 Sam’s LinkedIn password was one of 6.5 million passwords posted on a Russian hackers’ website. His password was iAmSam. He used this password for his primary email and many other accounts. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 4. Sam’s not happy 4 He reads on The Verge, a great source for tech news, that LinkedIn stored passwords as “unsalted SHA-1 hashes. SHA-1 is a secure algorithm, but it is not foolproof if your password is simple and short. LinkedIn could have made the passwords more secure by ‘salting’ them.” Salt. Hash. Huh? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 5. 5 Sam is confused What do passwords have to do with greasy diner food? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 6. Sam does his homework 6 He learns that many websites— including LinkedIn—encrypt passwords in an effort to protect them. The encrypted passwords are called hashes. The site stores the hashes on its servers instead of the passwords themselves. For example, a website could use an SHA-1 or Secure Hash Algorithm to convert iAmSam to c743bb2561f20745330122 dcc254abaf524e277d. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 7. 7 Sam learns why salt is good To make password hashes more secure, a system adds salt (or random characters) to the beginning of the password. Then it converts the new, salted password into a hash. So the iAmSam password would be salted to look like RoUTiAmSam, then hashed into ebc5047362323f1e29c1cb3d457594b1ca4ea2bc. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 8. 8 LinkedIn didn’t add salt © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 9. How the hackers get in 9 Hackers armed with your hashed password and username can: 1. Log in to your LinkedIn account 2. Lock you out 3. Spam your contacts When your contacts click on links in their spam email, they let the hackers in by downloading malware. This malicious software gives hackers access to their computers. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 10. Hackers love Sam 10 Then the real trouble begins. Once they’re in your computer, hackers can gain access to your personally identifiable information, such as a birth date, look up your mother’s maiden name and launch serious identity theft. The real problem: Like so many people, Sam uses one password for most of his online accounts. Hackers love Sam because he used his LinkedIn password on his primary email account, so now they can access his email. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 11. 11 Sam’s password is his identity Sam’s email address is a key piece of his identity on the Internet. Often it is his username for an online account. Armed with his email address and password, hackers can enter his accounts, reset Sam’s passwords and gain control. To make matters worse, Sam saved copies of his printed identification—his passport and Social Security number—in his email account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 12. 12 Sam’s vulnerable LinkedIn users are at greater risk for fraudbecause: 1. They have higher incomes. 2. Their profiles are meant to be viewed by strangers. 3. They are often lax with their privacy settings. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 13. Sam swings into action 13 He follows these seven tips: 1. Change your password 2. Create a strong password 3. Make it even stronger 4. Use unique passwords 5. Consider a password solution 6. Alert others 7. Beef up security © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 14. Sam Smart greeneggsandham@smail.com 14 1. Change your password Log in to your account. Go to settings and click on “Password Change.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 15. 15 2. Create a strong password It should be long. Think of a good quote or song and use the first letter in each word to make a long password. Sam uses a line from his favorite Dr. Seuss book. Quote: “You’re off to great places. Today is your day!” Password: yotgptiyd © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 16. 16 3. Make it even stronger Include numbers, upper- and lowercase letters, and symbols. For example, “3Dogz$$!” is better than “1006.” Or substitute numbers for letters that look similar (for example, substitute “0” for “o” or “3” for “E”. Sam replaces the “o” with “0” and the “d” with “6.” Old password: yotgptiy6 New password: y0tgptiy6 © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 17. 17 4. Use unique passwords Avoid using the same password twice. If that old LinkedIn password is used on other websites, go to those sites and change the password immediately. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 18. 5. Consider a password manager 18 Sam is annoyed. How will he remember his passwords? He checks out password managers like OneID, 1Password and KeePass. They make it easier for you to remember, manage and secure your passwords. Some are free. Others have monthly fees. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 19. 6. Alert others 19 If your account is compromised, alert your contacts so they don’t become victims. Notify LinkedIn to regain control of your account or freeze it. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 20. 20 7. Beef up security • Sign out of website accounts after you use them. • Set your account information and privacy settings as tight as possible. • Keep your antivirus software up to date. • Don’t publically share personal information. • On social networks, only connect to people you know and trust. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 21. Sam is glad 21 Now Sam uses strong, unique passwords for different online accounts. He feels good knowing he’s doing everything he can to protect his identity. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012
  • 22. 22 Be proactive If you suspect you’re a victim of identity theft, call your bank, credit union or insurer. They may offer identity theft protection. Or call Identity Theft 911 1-888-682-5911 Don’t be afraid to ask lots of questions. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved June 13, 2012