Encryption vs. hashing: Learning from Adobe's password breach

Password Management and Policy

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Tips for keeping Wi-Fi network passwords secure

    If Wi-Fi network passwords are accessed off Android mobile devices by third parties, it could mean disaster without the right precautions. 

  • Cisco TelePresence vulnerability: Mitigate default credentials issues

    Network security expert Brad Casey discusses how to mitigate the vulnerability found in Cisco's TelePresence system triggered by default credentials. 

  • The merits of encryption vs. hashing after the Adobe password breach

    In light of the Adobe password breach, expert Michele Chubirka explains the difference between encryption and hashing when storing passwords. 

  • HealthCare.gov security issues: Lessons learned for enterprises

    Researchers have warned of numerous HealthCare.gov security issues. Michael Cobb reviews the website security lessons learned for enterprises. 

  • BYOI (bring your own identity)

    BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon. 

  • Password-free online authentication a step closer

    The elimination of insecure passwords for online services is another step closer 

  • Preventing plaintext password problems in Google Chrome

    Plaintext passwords are risky business. Michael Cobb discusses what Google says about the Chrome password vulnerability and potential exploits. 

  • John the Ripper

    John the Ripper is a popular free password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes. Originally developed for Unix-derived systems, the software is now available for most... 

  • password blacklist

    A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used modifications such as capital letters, standard subst... 

  • password entropy

    Password entropy is a measurement of how unpredictable a password is. Password entropy is based on the character set used (which is expansible by using lowercase, uppercase, numbers as well as symbols) as well as password length. Password entropy pre...