Market Overview

Personal Password Security and the Gawker Hack

Personal Password Security and the Gawker Hack

Yet another password hacking exploit highlights the question ‘how can I protect myself?' A Sticky Password executive offers some insights.

(Vocus/PRWEB) December 17, 2010

The hack of Gawker (operator of technology sites Lifehacker, Jezebel, Gizmodo, Gawker, Kotaku, Deadspin, io9, Jalopnik and Fleshbot) servers exposed over 1.3 million accounts earlier this week and again brought attention to the vulnerability of even reputable websites.

The security breach uncovered the login details of people submitting comments on the several Gawker sites. This data was then used to hack the Twitter accounts of the individuals who use the same login and password for their Gawker site and Twitter.

When asked about the recent hack, Petr Bilek, Managing Director of Lamantine Software - developer of the popular password manager and online form filler Sticky Password, addressed some of the issues that such exploits raise.

Mr Bilek said “because the breach occurred on Gawker company servers, a personal password manager wouldn't have stopped the hack, but individuals who use Sticky Password put themselves in the best position possible to be protected and to make a quick and safe recovery after a site they use has been attacked.“

Some steps to take if you have an account with one of the Gawker sites:

  • Check if your account has been exposed. Duo Security has set up a site to help with this. Whether or not your account has been exposed, yet, make sure you change passwords for any sites associated with Gawker. Make sure you also change your Twitter password.

  • Pay attention to exploits. An awareness of the latest hacks and exploits will give you a chance to protect yourself.
  • Use a password manager like Sticky Password for strong and unique passwords for all of your logins. Make sure that the tool or program you choose is secure and easy to use, and don't forget to use a consistent approach for all your sites.
  • “As shown by the exposed data, we continue to see the same irresponsible passwords that have been revealed in hacks over the past two, three years and more. At the top of the list are always strings like ‘123456', ‘password', ‘qwerty' and ‘abc123'. If a bad guy knows that he has a 10% chance of getting into an account using one of these passwords, then there's a really good chance that that's where he'll start. And it gets worse,” he added, “too many people use the same password on several sites. Just imagine the damage a hacker can do if he discovers that your email login and password are the same that you use for your online banking!”

    The trial version of Sticky Password is free and includes all of the features and functionality for a full 30 days. Sticky Password 5.0 is available in English, German, French, Russian and Czech.

    Visit http://www.stickypassword.com for the latest announcements and information about Sticky Password.

    About Sticky Password

    Sticky Password has been storing passwords and making people more productive since 2001. In addition to managing and encrypting your passwords and personal data, Sticky Password provides exceptional one-click online form filling. The small installation package incorporates the industry's most powerful encryption algorithms and provides effective protection against phishing schemes, concealed key-loggers and identity theft. Each license also includes the Sticky Password portable version for use on a memory device like a USB flash memory stick. At home and on the road, your passwords and other sensitive personal data are secure and accessible only by you.

    ###

    For the original version on PRWeb visit: http://www.prweb.com/releases/prweb2010/12/prweb8030223.htm

     

    Around the Web, We're Loving...

    Partner Network

    Get Benzinga's Newsletters

    Benzinga Professional