Don't Make Hacking This Easy

In the wake of the near meltdown of parts of Sony (and the Playstation Network - PSN), along with the hacks of Citi, the IMF, and the US Senate, hacking is becoming the hot news item. 

Guess what?  This hacking was always taking place.  Your information has been exposed many times before.  That is right. This is nothing new.  How could that be?  Disclosure laws!  Thanks congress.  The general public is now afraid to enter their credit card number on a web form once again.  Actually, that might just be my wife.  She is concerned that Club Penguin might be a little loose with the digits. As you could imagine, my son is not please with this.  Ahh, unintended consequences.

A report was published today that outlines some of the most common lock codes used for cell phones.  Folks, if you don't want to expose your data, don't make it easy.  I am very tired of hearing from web users about how hard their password is to remember.  That is the whole point.  If you pick logical, or easy, you will easier to exploit. When discussing passwords that aren't easy, I give the example of a friend who used the password 'gin'.  That is right 'gin'.  The fact that 20,000 social security numbers could have been exposed due to the poor restrictions put on the password acceptance system by the IT person didn't seem to be of a concern to anyone.

Here is a summary of the report below.  Lifehacker - passcode chart

 

 

http://lifehacker.com/5811383/these-are-the-most-common-lockscreen-pins-and-you-should-avoid-using-them

 

These Are the Most Common Lockscreen PINs

iPhone developer Daniel Amitay anonymously recorded and analyzed passcodes of users of his Big Brother Camera Security iPhone app, resulting in an interesting list of the ten most common passcodes, which, in order of popularity, include 1234, 0000, 2580, 1111, 5555, 5683 (spells LOVE), 0852, 2222, 1212, 1998.

Formulaic passwords are never a good idea, yet 15% of all passcode sets were represented by only 10 different passcodes (out of a possible 10,000). The implication? A thief (or just a prankster) could safely try 10 different passcodes on your iPhone without initiating the data wipe. With a 15% success rate, about 1 in 7 iPhones would easily unlock—even more if the intruder knows the users' years of birth, relationship status, etc.