<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Smart Guessing Algorithm Cracks 87 Million Passwords In Under 60 Seconds in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Smart-Guessing-Algorithm-Cracks-87-Million-Passwords-In-Under-60/m-p/71372#M6922</link>
    <description>&lt;P&gt;There's some movement in industry towards passwordless authentication. But phishing resistant MFA Is also recommended even if passwords do need to be used. (Awareness efforts like World Password Day have helped us spread good information, though.) Unfortunately, sometimes there are programmatic (SW) and/or hardware programmed limitations regarding password complexity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lee Kim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISC2 Board Candidate 2024&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.linkedin.com/in/leekim" target="_blank"&gt;www.linkedin.com/in/leekim&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 22 Jun 2024 04:05:09 GMT</pubDate>
    <dc:creator>leekimjd</dc:creator>
    <dc:date>2024-06-22T04:05:09Z</dc:date>
    <item>
      <title>Smart Guessing Algorithm Cracks 87 Million Passwords In Under 60 Seconds</title>
      <link>https://community.isc2.org/t5/Industry-News/Smart-Guessing-Algorithm-Cracks-87-Million-Passwords-In-Under-60/m-p/71351#M6921</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With just a few dollars, a little time, and a smart brute-force guessing algorithm, most passwords can be cracked in much less time than you might imagine. According to a &lt;A class="" title="https://www.kaspersky.co.uk/blog/password-can-be-hacked-in-one-hour/27738/" href="https://www.kaspersky.co.uk/blog/password-can-be-hacked-in-one-hour/27738/" target="_blank" rel="nofollow noopener noreferrer"&gt;new analysis from the experts at Kaspersky&lt;/A&gt;, 59% of 193 million actual passwords were cracked in less than 60 minutes, and 45% were cracked in less than 60 seconds.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;The basis of a brute-force attack is where the perpetrator iterates all possible combinations in order to find a match for the password in question. However, Antonov explained, “smart guessing algorithms are trained on a passwords data-set to calculate the frequency of various character combinations and make selections first from the most common combinations and down to the rarest ones.”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.forbes.com/sites/daveywinder/2024/06/19/smart-guessing-algorithm-cracks-87-million-passwords-in-under-60-seconds/" target="_blank" rel="noopener"&gt;https://www.forbes.com/sites/daveywinder/2024/06/19/smart-guessing-algorithm-cracks-87-million-passwords-in-under-60-seconds/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2024 01:40:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Smart-Guessing-Algorithm-Cracks-87-Million-Passwords-In-Under-60/m-p/71351#M6921</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-06-21T01:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Smart Guessing Algorithm Cracks 87 Million Passwords In Under 60 Seconds</title>
      <link>https://community.isc2.org/t5/Industry-News/Smart-Guessing-Algorithm-Cracks-87-Million-Passwords-In-Under-60/m-p/71372#M6922</link>
      <description>&lt;P&gt;There's some movement in industry towards passwordless authentication. But phishing resistant MFA Is also recommended even if passwords do need to be used. (Awareness efforts like World Password Day have helped us spread good information, though.) Unfortunately, sometimes there are programmatic (SW) and/or hardware programmed limitations regarding password complexity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lee Kim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISC2 Board Candidate 2024&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.linkedin.com/in/leekim" target="_blank"&gt;www.linkedin.com/in/leekim&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jun 2024 04:05:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Smart-Guessing-Algorithm-Cracks-87-Million-Passwords-In-Under-60/m-p/71372#M6922</guid>
      <dc:creator>leekimjd</dc:creator>
      <dc:date>2024-06-22T04:05:09Z</dc:date>
    </item>
  </channel>
</rss>

