logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
18th March 2019 by CyberVision 0 Comments 910 Views
18th March 2019 by CyberVision in F-Secure

How hash cracking may affect your business

Hashing is one-way encryption and in information security passwords are recommended to be stored in a hashed format so that applications or systems can verify if the correct password is entered without them actually storing your password. Running your passwords through a hashing algorithm converts your actual password into a random string of numbers, letters and/or symbols. This ensures that one cannot get the original text back from the hash, which makes it harder to steal.

 

When a user logs in with their unique password, the system scrambles it into a ‘hash’. The hash will then be saved onto the system instead of the actual password. Some servers’ encryption mechanisms though are far too simple and do not do a very good job at protecting these hashes.

 

An attacker can crack the hash and obtain a list of real passwords from a database that has been breached. The passwords list is first converted into hashes and used as a reference when attempting to match identical hatches. When an identical hash has been found, the attacker will then know what the actual password is and gain access to the particular user’s confidential information.

 

Like everything else, it’s not impossible to hack this method either.  Several methods to hack hashes exist like using rainbow tables, transmitting hashes directly, etc. Password security is a problem that affects everyone and the main reason is due to weak passwords. Maintaining a strong password protection strategy in your business will help to ensure that your critical data remains safe.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • hash cracking
  • password protection
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo