Lessons learned from cracking 4,000 Ashley Madison passwords

Ars Technica 2015-08-26

Summary:

Security researcher could only crack weak passwords—just 0.000668% of trove.

Link:

http://feeds.arstechnica.com/~r/arstechnica/index/~3/ILK6X9PzoNA/

From feeds:

Cyberlaw » Ars Technica
Music and Digital Media » Ars Technica

Tags:

technology lab risk assessment passwords law & disorder hashes hacking cryptograph cracking ashley madison

Authors:

Dan Goodin

Date tagged:

08/26/2015, 13:02

Date published:

08/26/2015, 12:28