Open in app

Sign In

Write

Sign In

ScatteredSecrets.com
ScatteredSecrets.com

83 Followers

Home

About

Sep 29, 2022

Protecting your business against customers account takeover fraud

Introduction Successful customer account takeovers can result in fraud, cause damage to a brand’s reputation, undermine customer confidence and result in major fines. Many incidents are the result of successful credential stuffing attacks. In such an attack, cyber criminals try to logon using username and password combinations that were stolen at…

Account Takeover

7 min read

Protecting your customers against account takeover fraud
Protecting your customers against account takeover fraud
Account Takeover

7 min read


Nov 10, 2020

Account takeover prevention: techniques and data quality

In recent years, credential stuffing attacks have been on the rise. Cyber criminals take over accounts with username and password combinations that were stolen at third parties. The goal of Account TakeOver (‘ATO’) prevention services is to prevent unauthorized access to your accounts. There are several types of techniques that…

Ato

9 min read

Account takeover prevention: techniques and data quality
Account takeover prevention: techniques and data quality
Ato

9 min read


Oct 2, 2020

Why account takeover prevention is important to protect against credential stuffing

Introduction Every year thousands of data breaches occur, as we can read in the daily news. The root causes of the breaches range from organizational issues to technical flaws. A new category of attacks emerged a few years ago: ‘credential stuffing’. According to F5, ‘credential stuffing and brute force attacks have…

Credential Stuffing

7 min read

Why account takeover prevention is important to protect against credential stuffing
Why account takeover prevention is important to protect against credential stuffing
Credential Stuffing

7 min read


May 5, 2020

Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!

Cracking classic hashes Moore’s law is the observation that the number of transistors in a dense integrated circuit doubles about every two years. This roughly doubles computing power about every two years as well. Password hashing algorithms typically have a lifetime of many decades. …

Fpga

9 min read

Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!
Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!
Fpga

9 min read


Oct 30, 2019

Hookers.nl breach: cracking 57% of the passwords in three days

Dutch website Hookers.nl — used by prostitutes, escorts and their customers — had been hacked. The site’s user database was stolen and is actively being traded in the underground, and sold for about 2 Euros. The dump contains data of — among others — employees of Dutch governmental intuitions like…

Hookers

7 min read

Hookers.nl breach: cracking 57% of the passwords in three days
Hookers.nl breach: cracking 57% of the passwords in three days
Hookers

7 min read


Jul 8, 2019

How to crack billions of passwords?

All kinds of online services get hacked. This includes services that you might be using. Scattered Secrets is a password breach notification and prevention service. We continuously collect publicly available hacked databases and try to crack the corresponding passwords. Verified account owners can access their own information and take appropriate…

11 min read

How to crack billions of passwords?
How to crack billions of passwords?

11 min read

ScatteredSecrets.com

ScatteredSecrets.com

83 Followers

Find Your Hacked Passwords - Prevent Account Takeover.

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech