Hackers Find Way To Hit Hushmail

from the back-door dept

Hushmail, the web-based email service that boasts “total security,” just got a dose of insecurity. Apparently someone hacked into Hushmail’s domain name registrar, Network Solutions, and redirected the website to a staged site with graffiti. The company says no data was compromised, but even a minor security breach looks pretty bad when security is your raison d’etre. Just goes to show that maybe you can never be too paranoid when it comes to securing your computing experience, as Mark Burnett writes in his column. He admits that his precautions might be extreme (50-character passwords, anyone?), but that they can’t hurt either. Sometimes, they even deter new, unanticipated threats. In other words, even super-secure email services are susceptible to attack and might benefit from other means of protection.


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Hackers Find Way To Hit Hushmail”

Subscribe: RSS Leave a comment
4 Comments
dan says:

can't hurt?

“He admits that his precautions might be extreme (50-character passwords, anyone?), but that they can’t hurt either.”

I disagree — even if it’s a 50 character password, you still need to throw non-alphanumerics in there (to avoid dictionary attack). At that point, in order to remember a 50 char password, it’s going to have to be written down somewhere, or in some way obvious (otherwise you’ll lock yourself out, too). So it could hurt.

Really, what’s needed (and has been mentioned here before) is a combination of a good password of reasonable length (10 chars?) PLUS some personal identifier (bioinformatics, one of those hardware devices with a constantly changing key (drawing a blank on what they’re called)).

Joe Blo says:

Re: can't hurt?

“I disagree — even if it’s a 50 character password, you still need to throw non-alphanumerics in there (to avoid dictionary attack).”
The only reason to put non-alphanumerics in your password is because a paranoid password program requires it. People naturally assume that a password needs to be a variation on a dictionary word in order to remember it. This is not true. Type the string “cde34rfv” and you’ll see what I mean. The position of the keys makes it easy to remember and it doesn’t appear in any dictionary. The 3 and 4 are completely optional, I might just as well have used “cderfvbgt”. You can think of times your fingers “knew” a familiar password your mind had forgotten. The sequence of keypresses is what is remembered best, the decoded mnemonic information such as your dog’s name is secondary.

thecaptain says:

Re: Re: can't hurt?

Hate to burst your bubble, but sophisticated dictionary attacks take that into consideration.

They not only cover known words, but the passwords you describe are also covered as “words”. Its all about likely combinations, and frankly, your method is a VERY LIKELY combination.

So you might want to go rethink those passwords.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...