<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives &#8211; Techlist</title>
	<atom:link href="https://www.techlist.pk/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.techlist.pk/tag/security/</link>
	<description>Technology News Pakistan</description>
	<lastBuildDate>Sat, 21 Jan 2017 19:14:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.techlist.pk/wp-content/uploads/2016/06/cropped-ms-icon-310x310-32x32.png</url>
	<title>security Archives &#8211; Techlist</title>
	<link>https://www.techlist.pk/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Most Common and Vulnerable Passwords of 2016</title>
		<link>https://www.techlist.pk/most-common-vulnerable-passwords/</link>
					<comments>https://www.techlist.pk/most-common-vulnerable-passwords/?noamp=mobile#comments</comments>
		
		<dc:creator><![CDATA[Sawaira Sial]]></dc:creator>
		<pubDate>Sat, 21 Jan 2017 19:14:18 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Common Passwords]]></category>
		<category><![CDATA[Keeper]]></category>
		<category><![CDATA[Most used password]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Passwords of 2016]]></category>
		<category><![CDATA[secure passwords]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Issues]]></category>
		<category><![CDATA[Vulnerable Passwords]]></category>
		<guid isPermaLink="false">https://www.techlist.pk/?p=5540</guid>

					<description><![CDATA[<p>&#160; Passwords are believed to be the most secure codes that protect privacy. Unfortunately, these secure codes are too easy to crack because they are mostly very easy and common. Keeper is one of the leading secure password manager. This [&#8230;]</p>
<p>The post <a href="https://www.techlist.pk/most-common-vulnerable-passwords/">The Most Common and Vulnerable Passwords of 2016</a> appeared first on <a href="https://www.techlist.pk">Techlist</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-5542 size-large" title="Vulnerable Passwords" src="https://www.techlist.pk/wp-content/uploads/2017/01/worst-2015-passwords-1024x683.jpg" alt="Vulnerable Passwords" width="1024" height="683" /></p>
<p>&nbsp;</p>
<p>Passwords are believed to be the most secure codes that protect privacy. Unfortunately, these secure codes are too easy to crack because they are mostly very easy and common.</p>
<p>Keeper is one of the leading secure password manager. This security company has unveiled some of the common passwords used in 2016. The list started with &#8216;123456&#8217; at the top followed by many easy combinations.</p>
<p>A list under the title of  “The Most Common Passwords of 2016&#8243; was released by Keeper.</p>
<table class="mol-table" style="height: 752px;" width="320" data-swipe-article="false">
<tbody>
<tr>
<th style="text-align: left;">Ranking</th>
<th>Password</th>
</tr>
<tr>
<td><strong>1</strong></td>
<td>123456</td>
</tr>
<tr>
<td><strong>2</strong></td>
<td>123456789</td>
</tr>
<tr>
<td><strong>3</strong></td>
<td>qwerty</td>
</tr>
<tr>
<td><strong>4</strong></td>
<td>12345678</td>
</tr>
<tr>
<td><strong>5</strong></td>
<td>111111</td>
</tr>
<tr>
<td><strong>6</strong></td>
<td>1234567890</td>
</tr>
<tr>
<td><strong>7</strong></td>
<td>1234567</td>
</tr>
<tr>
<td><strong>8</strong></td>
<td>password</td>
</tr>
<tr>
<td><strong>9</strong></td>
<td>123123</td>
</tr>
<tr>
<td><strong>10</strong></td>
<td>987654321</td>
</tr>
<tr>
<td><strong>11</strong></td>
<td>qwertyuiop</td>
</tr>
<tr>
<td><strong>12</strong></td>
<td>mynoob</td>
</tr>
<tr>
<td><strong>13</strong></td>
<td>123321</td>
</tr>
<tr>
<td><strong>14</strong></td>
<td>666666</td>
</tr>
<tr>
<td><strong>15</strong></td>
<td>18atcskd2w</td>
</tr>
<tr>
<td><strong>16</strong></td>
<td>7777777</td>
</tr>
<tr>
<td><strong>17</strong></td>
<td>1q2w3e4r</td>
</tr>
<tr>
<td><strong>18</strong></td>
<td>654321</td>
</tr>
<tr>
<td><strong>19</strong></td>
<td>555555</td>
</tr>
<tr>
<td><strong>20</strong></td>
<td>3rjs1la7qe</td>
</tr>
<tr>
<td><strong>21</strong></td>
<td>google</td>
</tr>
<tr>
<td><strong>22</strong></td>
<td>1q2w3e4r5t</td>
</tr>
<tr>
<td style="text-align: left;"><strong>23</strong></td>
<td style="text-align: left;">123qwe</td>
</tr>
<tr>
<td><strong>24</strong></td>
<td style="text-align: left;">zxcvbnm</td>
</tr>
<tr>
<td><strong>25</strong></td>
<td>1q2w3</td>
</tr>
</tbody>
</table>
<div style="text-align: left;">
</div>
<p style="text-align: left;">The results are based on the research work of the team who analyzed more than 10 million passwords. To the surprise one of the easiest combination is &#8216;<strong>123456</strong>&#8216;, which people use to protect their accounts and it comes in the list of vulnerable passwords.</p>
<p style="text-align: left;">It was followed by &#8216;<strong>123456789</strong>&#8216; on the second  and than were ‘<strong>qwerty</strong>’, ‘<strong>12345678</strong>’, ‘<strong>111111</strong>’, ‘<strong>1234567890</strong>’ and ‘<strong>1234567</strong>’ on 3, 4, 5, 6, 7 positions respectively.</p>
<p style="text-align: left;">The word password itself is used as password. It was ranked 8 in the list.</p>
<p style="text-align: left;">‘18atcskd2w’ was on 15th position in the list.</p>
<p style="text-align: left;">The Security Researcher, Graham Cluley said,</p>
<blockquote><p>&#8220;These accounts were created by bots, perhaps with the intention of posting spam onto the forums. &#8220;</p></blockquote>
<p style="text-align: left;">&#8216;google&#8217; was not spared either. It was in the list on 21 st number.</p>
<p style="text-align: left;">To remember their passwords with ease people use easy passwords  and thus they select sequential characters and digits to create their password but they forget that this is a big risk. All your privacy can be at stake.</p>
<p style="text-align: left;"><strong>How to protect your passwords?</strong></p>
<p style="text-align: left;">The best way to make your password strong use wide range of letters and numbers. Use upper and lower case letters and even symbols that are allowed so that  your account remains safe. Avoid from these Vulnerable Passwords.</p>
<p style="text-align: left;">Do not use common dictionary  words as people nowadays use dictionary cracks that give password quicker and near to accurate.</p>
<p style="text-align: left;">The easy passwords are becoming common because they are difficult to remember. Password generators should be used to enjoy safe surfing.</p>
<p>The post <a href="https://www.techlist.pk/most-common-vulnerable-passwords/">The Most Common and Vulnerable Passwords of 2016</a> appeared first on <a href="https://www.techlist.pk">Techlist</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techlist.pk/most-common-vulnerable-passwords/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>A Young Pakistani Hacker Wins $5000 For Finding Bug In Browsers</title>
		<link>https://www.techlist.pk/young-pakistani-hacker-wins-5000-finding-bug-browsers/</link>
					<comments>https://www.techlist.pk/young-pakistani-hacker-wins-5000-finding-bug-browsers/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[Techlist Staff]]></dc:creator>
		<pubDate>Thu, 18 Aug 2016 11:38:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Bounty Bug Program]]></category>
		<category><![CDATA[Browsers Security]]></category>
		<category><![CDATA[chrome security]]></category>
		<category><![CDATA[Ethical Hacker]]></category>
		<category><![CDATA[firefox security]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Pakistani Hacker]]></category>
		<category><![CDATA[Paypal]]></category>
		<category><![CDATA[Rafay Baloch]]></category>
		<category><![CDATA[researcher]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://www.techlist.pk/?p=4322</guid>

					<description><![CDATA[<p>On Internet security vulnerability is a weakness which allows attackers to control the system information. Attackers find the system flaws and take control over the system. Web browsers are only medium for surfing websites and they are essential part of [&#8230;]</p>
<p>The post <a href="https://www.techlist.pk/young-pakistani-hacker-wins-5000-finding-bug-browsers/">A Young Pakistani Hacker Wins $5000 For Finding Bug In Browsers</a> appeared first on <a href="https://www.techlist.pk">Techlist</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-large wp-image-4332" src="https://www.techlist.pk/wp-content/uploads/2016/08/rafay-baloch1-1-1024x585.jpg" alt="rafay baloch1" width="1024" height="585" /></p>
<p>On Internet security vulnerability is a weakness which allows attackers to control the system information. Attackers find the system flaws and take control over the system. Web browsers are only medium for surfing websites and they are essential part of Internet. Generally most of the users visit the websites through Google Chrome and Mozilla Firefox.</p>
<p>Recently, A young Pakistani hacker Rafay Baloch found a flaw in world most popular browsers, Google Chrome and Mozilla Firefox. Rafay is good bug hunter. He discovered a bug that could allow attackers to  use address bar and divert users to the malicious and harmful websites, and can steal the sensitive information of the users.</p>
<p>Google security team also state that &#8220;We recognize that the address bar is the only reliable security indicator in modern browsers and if this could be controlled by an attacker it could be harmful.</p>
<p>Also Rafay baloch wrote on his blog (<a href="http://www.rafayhackingarticles.net/" target="_blank">Rafay Hacking Articles</a>), This feature can possibly be exploited by attackers y simply put natural characters like &#8220;/&#8221; or &#8220;!&#8221; towards the end of a URL that turn it and gives the false impression that the user is visiting an official site.</p>
<p>For example, a website which has logical order  127.0.0.1/!/http://facebook.com will be displayed as http://facebook.com/!/127.0.0.1. This gives false impression that the user is visiting official Facebook.com while being shown data from 127.0.0.1. &#8220;The IP address can be easily hidden in the URL specially on mobile browsers  by selecting a long URL in order to make the attack look like realistic and making users fool.</p>
<p>Rafy Baloch wrote, &#8220;In order to make the attack more realistic, a Unicode versions of padlock can be used in order to display the presence of SSL.&#8221; Further he said, 70% of the direct traffic is affected by this bug which he found in Google chrome and Firefox.</p>
<p>Rafay Baloch living in Karachi and is an Hacker, Researcher and Author. He already discover command execution vulnerabilities on sub domain of PayPal in 2012. And PayPal awarded him $10,000 USD under their Bug Bounty program.  Paypal have mentioned Rafay Baloch name on their <a href="https://www.paypal.com/us/webapps/mpp/security-tools/wall-of-fame-honorable-mention" target="_blank">Honorable Mention</a> page to appreciate all efforts and contributions to Bug Bounty Program.</p>
<h2>About Rafay Baloch</h2>
<h2><img decoding="async" class="size-thumbnail wp-image-4327 alignright" src="https://www.techlist.pk/wp-content/uploads/2016/08/techlist-150x150.jpg" alt="techlist" width="150" height="150" /></h2>
<p><span id="fbPhotoSnowliftCaption" class="fbPhotosPhotoCaption" tabindex="0" data-ft="{&quot;tn&quot;:&quot;K&quot;}"><span class="hasCaption">Rafay Baloch from Hyderabad, working at PTCL (ETISALAT) as a Manager Information Security. He is providing Consultancies for International Organizations. He got Primary and Secondary education from Bahria Foundation and PECHS Schools Karachi. Graduation in Computer Science with first position from Bahria University. He is one of the leading information security experts and <span class="text_exposed_show">evangelist in Pakistan.</span> He is listed as Top 25 threat seekers of 2014 by SC-magazine for the issues he uncovered with Android. And top 5 Ethical hackers of 2014 according checkmarkx.</span></span></p>
<p>The post <a href="https://www.techlist.pk/young-pakistani-hacker-wins-5000-finding-bug-browsers/">A Young Pakistani Hacker Wins $5000 For Finding Bug In Browsers</a> appeared first on <a href="https://www.techlist.pk">Techlist</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techlist.pk/young-pakistani-hacker-wins-5000-finding-bug-browsers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
