Monday, July 6, 15:10 p.m.
Home security Only a few users change passwords after data breaches!

Only a few users change passwords after data breaches!

passwords

A study by Carnegie Mellon University's Security and Privacy Institute (CyLab) showed that after the announcement of a data breach, only a third of them users, which have been affected, change their passwords.

The study, presented earlier this month in IEEE 2020 Workshop, was not based on data research, but in real browser traffic.

The academics analyzed the real web traffic, which was collected with his help Security Behavior Observatory (SBO) of the university, a research team, where the users subscribe and share the full history of their browser to enhance academic research.

The data set included information collected by the household computers 249 participants. The data were collected between January 2017 and December 2018. They included web traffic and passwords used to connect to sites and were stored in the browser.

Academics have discovered that of the 249 users, 63 had accounts in domains that had been compromised and they had announce it publicly infringement data, during the survey.

CyLab researchers say of the 63 users, only 21 (33%) visited the breached sites to change their passwords, and of these 21, only 15 users changed code within the first three months after the announcement of the data breach.

In total, only 23 passwords were changed in the violated domains. Of the 21 participants, 18 were Yahoo! users. The rest of Yahoo! users did not change its passwords, although all were affected by data breaches. Two participants changed Yahoo! their codes twice, after the breach notice. Two participants changed the password access in the infringed domain within the first month after the breach notice, five in two months and the rest eight in three months.

data breach

The researchers they were also able to analyze it complexity of the new passwords chosen by the users.

The research team found that of the 21 users who changed passwords, only 9 chose a more powerful code (with appropriate size, characters, etc.).

The rest created passwords with lower or similar power, reusing character sequences that they had in the previous password, or using passwords that were similar to those of other accounts stored in the browser.

The study shows that most users still do not have the knowledge required to select unique and more powerful passwords. Researchers claim that much of the responsibility lies with the perpetrators services-companies, which "almost never tell people to change passwords on their other accounts".

The study did not include too many participants (like others), but it is more accurate in terms of user behavior after infringement data as well based on real browsing data and not in answers that may be inaccurate.

The study is called "(How) Do People Change Their Passwords After a Breach?" and you can read it here.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortresshttps://www.secnews.gr
Pursue Your Dreams & Live!

LIVE NEWS

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...

Microsoft Store Codecs updates confuse users

Microsoft released security updates through the Microsoft Store last week and has confused many users who want to secure ...

MX Linux 19.2: New beta distribution released with KDE plasma Desktop

Recently, the development team of MX Linux announced the release of the next version of the MX series ...

Do you want to avoid hackers? Understand your systems!

Cyber ​​attacks targeting critical national infrastructure and other organizations are on the rise, causing damage that can often ...

Reddit in the list of applications that spy on clipboards

The Reddit app has been added to the list of iOS apps that spy on clipboards, or enter their data without a user's permission.

Snake Ransomware: isolates infected systems before encrypting them

Researchers at Deep Instinct recently discovered a new strain of Snake ransomware, which isolates infected systems to ...

University of Michigan: The leak emails came from third party breaches

Panic was caused among students of the University of Michigan on Friday night, when they saw on social media ...

Hackers of North Korea carry out web skimming attacks

Hacking North Korean government-funded groups invade online stores to import ...

Vulnerability to .NET Core allows malicious programs to be started

A vulnerability in the .NET Core library allows malicious programs to be started, while antivirus detection is avoided. She...

Companies report ransomware attacks as data breaches

Companies that fall victim to ransomware have begun to realize that these attacks are both ...