Life's a Breach: Yahoo Gets Burned by SQL Injection

Rapid7 analyzed the details of 453,492 breached Yahoo! records and found that the majority of the published passwords were only "poor" or "weak" in strength due to a number of basic password security errors. In addition, over 100,000 Gmail accounts and thousands of Hotmail and AOL accounts may also have been compromised if users had reused their passwords across accounts. This infographic details other key findings from the analysis. Don't get burned by a password breach! Keep your information safe by using unique passwords on all your online accounts. Check out the passwords disclosed by the recent Yahoo! breach -- and be sure toavoid making these password security mistakes.

Spotlight

TDI (Tetrad Digital Integrity)

Founded in 2001, TDI has grown into a world-class consulting firm offering cyber security services to government agencies and commercial clients around the world. Since inception, TDI delivered hundreds of cyber security initiatives.

Other Infographics
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More
news image

CYBER SECURITY EXPOSURES INFOGRAPHIC

Infographic | January 16, 2020

It seems counterintuitive that cybercriminals would focus on small businesses. Major news outlets report on the largest incidents, which typically affect the largest companies. In the past, small businesses may have been able to neglect network security with little consequence, but this is not the case today. Small businesses generally have fewer IT resources and devote less time and money to cybersecurity than their larger counterparts.

Read More
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Cybersecurity for Small Businesses

Infographic | May 25, 2021

Small businesses often ignore security precautions. Sometimes it’s due to a lack of resources, other times it’s because they think hackers won’t care. On the contrary, 58% of all malware attacks are targeted at small businesses, because hackers know there is no proper security in place.

Read More
news image

Infographic About Network Security

Infographic | April 1, 2021

According to a report, the cybersecurity workforce needs to grow 62% to meet the rising demand. The demand for security professionals is skyrocketing and shows no signs of stopping.

Read More
news image

Crowdstrike Incident Response

Infographic | June 13, 2022

A modern approach to rapid response and recovery from today’s widespread security incidents. Navigating the best path through the labyrinth of a widespread ransomware attack will determine the organizational impact and recovery cost to the business.

Read More

Spotlight

TDI (Tetrad Digital Integrity)

Founded in 2001, TDI has grown into a world-class consulting firm offering cyber security services to government agencies and commercial clients around the world. Since inception, TDI delivered hundreds of cyber security initiatives.

Events