AIRLINK 154.88 Increased By ▲ 4.63 (3.08%)
BOP 9.96 Decreased By ▼ -0.16 (-1.58%)
CNERGY 7.33 Decreased By ▼ -0.09 (-1.21%)
CPHL 78.24 Increased By ▲ 7.11 (10%)
FCCL 47.53 Increased By ▲ 1.82 (3.98%)
FFL 14.49 Increased By ▲ 0.15 (1.05%)
FLYNG 40.87 Increased By ▲ 3.72 (10.01%)
HUBC 138.71 Increased By ▲ 0.36 (0.26%)
HUMNL 12.93 Increased By ▲ 0.39 (3.11%)
KEL 4.34 Decreased By ▼ -0.22 (-4.82%)
KOSM 5.16 Increased By ▲ 0.17 (3.41%)
MLCF 75.92 Increased By ▲ 6.27 (9%)
OGDC 218.66 Increased By ▲ 15.65 (7.71%)
PACE 5.23 Decreased By ▼ -0.15 (-2.79%)
PAEL 45.30 Increased By ▲ 1.06 (2.4%)
PIAHCLA 14.80 Increased By ▲ 1.35 (10.04%)
PIBTL 8.64 Increased By ▲ 0.02 (0.23%)
POWER 15.13 Increased By ▲ 0.15 (1%)
PPL 168.03 Increased By ▲ 15.28 (10%)
PRL 29.55 Increased By ▲ 2.53 (9.36%)
PTC 20.13 Increased By ▲ 0.84 (4.35%)
SEARL 82.57 Increased By ▲ 7.51 (10.01%)
SSGC 32.79 Increased By ▲ 2.33 (7.65%)
SYM 14.23 Increased By ▲ 0.28 (2.01%)
TELE 6.99 Increased By ▲ 0.08 (1.16%)
TPLP 8.26 Increased By ▲ 0.26 (3.25%)
TRG 63.29 Increased By ▲ 1.39 (2.25%)
WAVESAPP 9.05 Increased By ▲ 0.11 (1.23%)
WTL 1.26 Decreased By ▼ -0.06 (-4.55%)
YOUW 3.61 Decreased By ▼ -0.12 (-3.22%)
AIRLINK 154.88 Increased By ▲ 4.63 (3.08%)
BOP 9.96 Decreased By ▼ -0.16 (-1.58%)
CNERGY 7.33 Decreased By ▼ -0.09 (-1.21%)
CPHL 78.24 Increased By ▲ 7.11 (10%)
FCCL 47.53 Increased By ▲ 1.82 (3.98%)
FFL 14.49 Increased By ▲ 0.15 (1.05%)
FLYNG 40.87 Increased By ▲ 3.72 (10.01%)
HUBC 138.71 Increased By ▲ 0.36 (0.26%)
HUMNL 12.93 Increased By ▲ 0.39 (3.11%)
KEL 4.34 Decreased By ▼ -0.22 (-4.82%)
KOSM 5.16 Increased By ▲ 0.17 (3.41%)
MLCF 75.92 Increased By ▲ 6.27 (9%)
OGDC 218.66 Increased By ▲ 15.65 (7.71%)
PACE 5.23 Decreased By ▼ -0.15 (-2.79%)
PAEL 45.30 Increased By ▲ 1.06 (2.4%)
PIAHCLA 14.80 Increased By ▲ 1.35 (10.04%)
PIBTL 8.64 Increased By ▲ 0.02 (0.23%)
POWER 15.13 Increased By ▲ 0.15 (1%)
PPL 168.03 Increased By ▲ 15.28 (10%)
PRL 29.55 Increased By ▲ 2.53 (9.36%)
PTC 20.13 Increased By ▲ 0.84 (4.35%)
SEARL 82.57 Increased By ▲ 7.51 (10.01%)
SSGC 32.79 Increased By ▲ 2.33 (7.65%)
SYM 14.23 Increased By ▲ 0.28 (2.01%)
TELE 6.99 Increased By ▲ 0.08 (1.16%)
TPLP 8.26 Increased By ▲ 0.26 (3.25%)
TRG 63.29 Increased By ▲ 1.39 (2.25%)
WAVESAPP 9.05 Increased By ▲ 0.11 (1.23%)
WTL 1.26 Decreased By ▼ -0.06 (-4.55%)
YOUW 3.61 Decreased By ▼ -0.12 (-3.22%)
BR100 12,627 Increased By 224.5 (1.81%)
BR30 37,264 Increased By 1704.4 (4.79%)
KSE100 118,576 Increased By 1278.2 (1.09%)
KSE30 36,302 Increased By 462.9 (1.29%)

ISLAMABAD: A global cybersecurity firm disclosed that over 32 million attempts were made by the password stealers to attack users including corporate businesses during 2023.

A report released by Kaspersky on Friday, in June 2024, Kaspersky experts conducted a large-scale study on the resistance of 193M English passwords, compromised by infostealers and available on the dark net, to brute force and smart guessing attacks.

According to the research results, 45 percent of all analyzed passwords which is almost 87 million could be guessed by scammers within a minute. Only 23 percent (44 million) of combinations turned out to be resistant enough and cracking them would take more than a year.

Kaspersky telemetry indicated more than 32 million attempts to attack users with password stealers in 2023. These numbers show the importance of digital hygiene and timely password policies. The results of the Kaspersky study demonstrate that the majority of the reviewed passwords were not strong enough and could be easily compromised by using smart guessing algorithms.

Besides, the majority of the examined passwords (57 percent) contain a word from the dictionary, which significantly reduces the passwords’ strength. Among the most popular vocabulary sequences, several groups can be distinguished. The analysis showed that only 19 percent of all passwords contain signs of a strong combination – a non-dictionary word, lowercase and uppercase letters, as well as numbers and symbols. At the same time, the study revealed that 39 percent of such passwords could also be guessed using smart algorithms in less than an hour.

In order to strengthen passwords, users should use a different password for each service. That way, even if one of your accounts is stolen, the rest won’t go with it. It’s better not to use passwords that can be easily guessed from your personal information, such as birthdays, names of family members, pets, or your own name.

These are often the first guesses an attacker will try. It is nearly impossible to memorize long and unique passwords for all the services you use, but with a special solution, such as Kaspersky password manager, you can memorize just one master password.

Yuliya Novikova, Head of Digital Footprint Intelligence at Kaspersky stated that the most dependable solution is to generate a completely random password using modern and reliable password managers.

“Enable two-factor authentication (2FA). Using a reliable security solution such as Kaspersky Premium will enhance your protection. It monitors the internet and Dark Web and warns if your passwords need to be changed,” the report added.

Copyright Business Recorder, 2024

Comments

Comments are closed.