Introducing KEYBOX for iPhone and iPod touch!
Before starting, I want to thank my wife and son for their frequent weekend sacrifices over the past year. They literally made KEYBOX possible. I’d also want to thank the reviewers at Apple if for no...
View ArticleBCrypt in Objective C
To support BCrypt encrypted login passwords in KEYBOX I ported the very excellent Java implementation by Damien Miller to Objective C. iOS 4.0 unfortunately does not offer this algorithm out of the...
View ArticlePlain Text Offenders
In noticing this article today via Hacker News I started to wonder if I should start a “Security Hall of Shame” listing companies that don’t take our security/privacy seriously so people could avoid...
View ArticleI Forgot my Login Password!
Lately I’m seeing an increase in support emails from KEYBOX customers who have lost/forgotten their login passwords. The only time I don’t enjoy supporting those who support me is when I’m powerless to...
View ArticleHow to Keep Passwords Secret
Not like this… If you do this, you deserve to have your account hacked.
View ArticleChoosing a Safe Password
A lot of opinions about what makes a password strong have been thrown about lately. Unfortunately, a lot of them are wrong. If you only take away one thing from this article let it be this… Don’t...
View ArticleSite Hacked Today
I regret to notify my readers that www.jayfuerstenberg.com was hacked today. I apologize to all the users who were unable to reach my site during the period for which it was unavailable. Currently I...
View ArticleHow To Choose A Strong Password
Google has an excellent page replete with a helpful video on how to choose a strong password. The video reiterates most of the techniques I have advocated on this blog and what KEYBOX encourages and...
View ArticleHow To Prevent Hacking Of Passwords With Random Passwords
ThreatPost is carrying an article highlighting the weakness of common words as passwords. I won’t duplicate the article here but I just want to discuss some simple points regarding HOW NOT to do it...
View ArticlePassphrases Don’t Work, Why We Need Cryptic Passwords
That moment when a reputable article comes out reinforcing everything you said in an earlier blog post. Back in September I wrote that passphrases are no more secure than regular passwords. I even...
View ArticleWeak Password Advice – When Will It Stop?
Another day, another ill advised article written by somebody who doesn’t know what he is writing about. The latest offender is Matt Elliott of CNet with his oxymoronically entitled article “Secure your...
View ArticleWhy are numerical passwords insecure?
A KEYBOX user and reader of my blog recently asked why passwords comprised only of numbers are not safe. This might be on the minds of many computer/device users so I felt like sharing my answer...
View ArticleLogin Security Becomes Weaker In Windows 8
Arstechnica is running a story that, if true, is simply shocking. Apparently Microsoft will be weakening its user password security in Windows 8. Most OSes one-way hash your login password. Windows 8...
View ArticleApp Store Downloads Unencrypted – Time To Change Your Password
It was recently discovered that Apple has been transmitting user passwords, without encryption, from iOS devices to Apple’s servers each time an app is downloaded and that this may have been occurring...
View ArticleFingerprints, Biometrics and Passwords – Looking Back To See The Future
On September the 10th, Apple unveiled the new iPhone 5S in its music oriented September keynote presentation. Just before the 1 hour mark Senior VP of Hardware Engineering Dan Riccio appeared in a...
View Article
More Pages to Explore .....