Passwords for dating websites Chat for i pad no registration
Mac Keeper notified C&Z Tech Limited customer support about the vulnerable No SQL database solution.
The dating site operator responded with an email in which it claimed the database contained only test data.
This is a concern for users of dating sites, some of whom have shared extremely personal information and expect their use of the site to be confidential.
In light of the Ashley Madison hack, Dashlane examined 24 of the world’s most popular dating sites and ranked their approach to password security.
· Don’t write your passwords down on a piece of paper near your computer · Don’t keep your passwords in your wallet or purse · Don’t keep your passwords stored on your computer · Avoid, if you can, having your computer “remember” passwords, especially if the computer is used by different people We also recommend that you don’t duplicate your passwords across other sites and that our members change their passwords regularly, but it can be difficult to know what makes a good one.
Get Safe Online has also given us some pointers on how to avoid the obvious ones by providing examples of some passwords that are commonly used and easy to guess.
Researchers discovered that it was possible for hackers to determine Ashley Madison passwords where users employed codes that were too simplistic.
Passwords are the first line of defense in remaining secure online, and dating websites aren’t doing enough to protect their users.
The Mac Keeper Security Research Center spotted an unprotected Mongo DB instance owned by C&Z Tech Limited, a New Zealand-based company which operates several dating websites including haveafling.mobi, nz, nz, haveanaffair.mobi, and as well as a few mobile applications.Andrew Bolton told Brian Krebs: "In January we detected suspicious activity on our network and based upon the information that we had available at the time, we took what we believed to be appropriate actions to notify affected customers and reset passwords for a particular group of user accounts. However, what is very clear is that many of the passwords exposed in this latest security breach are woefully bad choices by Cupid Media's users.We are currently in the process of double-checking that all affected accounts have had their passwords reset and have received an email notification." What's alarming is that there doesn't appear to have been any media reports confirming that a security incident involving customer data occurred at Cupid Media in January 2013. Here is a list of the ten most commonly used passwords, according to the Cupid Media customer database seen by Brian Krebs: These passwords would be abysmal choices if the websites had been storing them in a secure, encrypted format.· P2ssword/access – commonly used because they are memorable, but they’re also obvious.· Your birthday/anniversary/pet’s name – anything directly associated with you does not make a good password.