Sign up to our newsletter
While the ongoing floods of leaked account credentials from Formspring, LinkedIn et al. are potentially disastrous for the owners of those accounts, analysis of those data doesn't only provide a way of seeing whether our own accounts are at risk. It also provides an incentive for us all to re-examine our own password (and passcode) selection strategies by the insight they give us into whether we are using the same far-from-unique passwords as so many of the victims of these breaches.
My colleague Anders Nilsson's Eurosecure blog looks at the data from the Yahoo! breach reported by Dan Goodin and refers to some detailed statistics. Rather than reproduce all those data here, I'd recommend that you read his blog, but as I've previously referred here and elsewhere to 'Top Umpteen' lists of insecure, over-used, easily guessed passwords, I can't resist reproducing the top ten he extracted here, as it comes from a more recent source than the Mark Burnett analysis I quoted in my previous post on the subject.
The TrustedSec blog suggests that the Yahoo! service from which the credentials were dumped is Yahoo! Voice, and if you have an account there, this would be a good time to change your password, however good it is. But if you're using any of the passwords above anywhere – or if it comes to that, any of the 25 below, as compiled by Burnett – it's a good time to start thinking about using better choices, or maybe looking for a good password manager program.
No, number 24 doesn't mean I've flooded online services with logins where I use my own name. As I remarked the last time I published this list: "I've included the top 25 because it amused me to see my own name at number 24. I suspect, though, that has more to do with motorcycles than my own superstar status. "
If credentials are leaked for a service you use, there isn't much you can do except:
But changing all your passwords to something harder to guess/break is never a bad idea.
David Harley CITP FBCS CISSP
ESET Senior Research Fellow
Author David Harley, ESET