Menu
Password fail: Russian crime ring hacks 1.2 billion log in credentials

Password fail: Russian crime ring hacks 1.2 billion log in credentials

Record security breach proves passwords no longer sufficient: Centrify

Computer security experts have slammed the safety of passwords after a Russian crime ring hacked more than 1.2 billion username/password combinations.

Unified identity services firm, Centrify, say a record security breach by a Russian crime gang proves traditional security measures are no longer sufficient in protecting our personal and corporate privacy.

The warning comes after a Milwaukee firm, Hold Security, discovered the confidential records, which was gathered from 420,000 websites, incuding from major companies.

The crime ring, Cybervor, hacked more than 1.2 billion username/password combinations and more than 500 million email addresses from sites of all sizes, and from all parts of the world.

On the same day, Target’s stock tumbled after news that its massive data breach cost the company more than US$148 million.

Individuals, as well as companies, are paying a huge price because traditional security measures – antivirus software, passwords, VPNs and firewalls – are no longer sufficient, according to Centrify.

Centrify security strategist Chris Webber, said these vulnerabilities arose from over-dependence on user names and passwords for security.

“The real problem is that hackers quickly move beyond our credit card data to our usernames and passwords, which are a much bigger route to our money,” he said.

“To simplify things: what if you only had one key to every lock in your life – house, car, office, kid’s dorm room, etc – then imagine that key unlocked every valuable part of your family’s life, and had your name etched into it forever.

“When hackers compromise our usernames and passwords, they have the key to all of our locks. We need to demand a better online security solution.

Webber said we needed to eliminate usernames and passwords, and replace them with something that’s far more secure.

"The technology exists. Businesses know about it. IT departments know about it," he said.

“Now we need to demand that we all start using it. Until then, the big companies will keep getting hacked, but you and I will be the ones that keep getting stolen from.”

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags Russian crime gangCentrify security strategist Chris WebberHold Securitycybervor

Upcoming

Slideshows

In Pictures: Houston, we have a bug - 9 famous software glitches in space

In Pictures: Houston, we have a bug - 9 famous software glitches in space

There’s never a good time to run into software bugs, but some times are worse than others - like during a mission to space. Spacecraft of all shapes and sizes rely heavily on software to complete their objectives. But those missions can be quickly ended by the simplest of human errors when writing code. The omission of an overbar here or overflow error checking code there can mean the difference between success or failure, not to mention the loss of hundreds of millions of dollars, years of work and, on manned missions, human life. Use the arrows above to read about 9 examples that show that, despite the care with which these systems are built, bugs have occurred in spacecraft software since we started to fling rockets into space - and will, no doubt, continue to crop up.

In Pictures: Houston, we have a bug - 9 famous software glitches in space
IN PICTURES: Windows 10 Sydney launch

IN PICTURES: Windows 10 Sydney launch

Tech lovers and party-goers alike headed down to Mrs Macquarie's Chair to be part of the world-first Windows 10 Launch Party. The night featured a presentation by Microsoft Australia managing director, Pip Marlow, DJs, live demonstrations and digital artistry by Lister.

IN PICTURES: Windows 10 Sydney launch

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments