The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive, as leaked credentials become replicated across the clean and dark web. To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and Have I Been Pwned founder Troy Hunt to join our resident cryptographic expert (and Tresorit CEO) Istvan Lam on under CTRL. Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time.
The security of the New World we are building online is heavily dependent on password security but, despite this, password reuse and negligence continue to be a problem for the world’s Web users. This lax approach has created the ideal environment for hackers to thrive, as leaked credentials become replicated across the clean and dark web.
To help explore the mechanisms that power these exchanges, we’ve recruited security evangelist and Have I Been Pwned founder Troy Hunt to join our resident cryptographic expert (and Tresorit CEO) Istvan Lam on under CTRL.
Stay tuned for news on the biggest threats in cyberspace, the logic behind staying quiet about data breaches and insight into some of the most infamous data breaches of all time.