Passwords for dating sites
· Don’t write your passwords down on a piece of paper near your computer · Don’t keep your passwords in your wallet or purse · Don’t keep your passwords stored on your computer · Avoid, if you can, having your computer “remember” passwords, especially if the computer is used by different people We also recommend that you don’t duplicate your passwords across other sites and that our members change their passwords regularly, but it can be difficult to know what makes a good one.
Get Safe Online has also given us some pointers on how to avoid the obvious ones by providing examples of some passwords that are commonly used and easy to guess.
· P2ssword/access – commonly used because they are memorable, but they’re also obvious.
· Your birthday/anniversary/pet’s name – anything directly associated with you does not make a good password.
But a group known as Cyno Sure Prime claims the site changed the way it stores passwords, leading to programming errors that left a third of passwords under protected.
The group has now revealed the process used to decode the passwords, as well as some of the popular basic passwords it managed to obtain.
To ensure you have a safe online experience, we suggest visiting Get Safe Online to share the latest guidance on choosing and storing passwords for all your important online accounts.
Over 5.5 million websites use Cloudflare, including Fitbit, Uber, Ok Cupid, Medium, and Yelp.
Some website sessions accessed through HTTPS, a secure web protocol that encrypts data sent to and from a page, have been compromised as a result, and what makes the bug particularly serious is that some search engines (including Bing, Google, and Duck Duck Go) had cached, or saved, some of the leaked data for some time.
When data was obtained from Ashley Madison back in July it was thought that passwords would remain uncrackable due to the way they were encrypted.
This should have prevented any hackers from succeeding with so-called ‘brute force’ attacks that allow them to try many different combinations of letters and words at speed until they get the right password.
However, spelling errors and the absence of an email verification system by which a Mate1 user must click a link to activate their account might mean that many of the compromised email accounts either belong to people who actually do not own them or do not function properly.