Wait, what?

Looks like you came here from Geekosystem. Don't worry, everything is still here. We've just combined forces with The Mary Sue to bring you more and better content, all in one place.


  1. Yahoo Getting Rid of All Those Pesky Passwords With New Authentication System

    But what will we do with all of our capital letters and numbers?

    Your extra capital letters, numbers, and special characters may have to find a new home soon, because Yahoo has a new system to get rid of all those annoying passwords. You know, because you totally don't just use the same one for everything. That would be irresponsible.

    Read More
  2. eBay was Hacked, Change Your Password and Blame Embarrassing Late Night Bids on Criminals

    Weird this Jar Jar mask has zero bids.

    Good Bad news, everyone! eBay was hacked, and they're saying passwords have been compromised. According to the company there's nothing that indicates any financial information has been compromised, but it's best to be safe and update your account before you end up paying for someone's limited edition Jem and the Holograms figurines.

    Read More
  3. Do You Know Your Evernote Password? So Do Hackers, So Change It

    Good news for anyone who really likes thinking up passwords! Nearly ubiquitous note taking app Evernote got hacked. The Evernote team says the information the hackers got was limited to user information like usernames, email addresses, and passwords. Evernote is taking steps to keep this kind of thing from happening in the future, but they've also released a few standard tips on keeping your password safe, and making everyone reset their password.

    Read More
  4. Unsecure Passwords Just Got More Unsecure, Cracking Them Now Even Faster

    A new method of cracking passwords hashed with SHA-1 (Secure Hash Algorithm) made the relatively unsecured algorithm even less secure by greatly decreasing the time and computing power necessary to crack it. The news came out of the Passwords^12 conference in Oslo, Norway, which focused on password and PIN code security. It might be a good time to change your password, or more importantly change the way your passwords are stored.

    Read More
  5. Palm Reading Technology Could Unlock Your Next Cell Phone

    Science has finally cracked the code of ancient gypsy magic, making it possible to unlock your cell phone with just a quick digital palm reading, rather than typing in a password. Engineers are still working out kinks in the program that will also inform you of the winning lottery numbers, where you'll meet the love of your life, and the exact time and circumstances of your demise, but for now the unlocking the phone thing seems pretty good.

    Read More
  6. Dropbox Now Confirms They Were Hacked, Updates Security

    Only a little over a week ago, Dropbox and their outside experts were claiming that there was no evidence of a hack. As it happens, they were wrong. They've now confirmed that some users did see unauthorized activity on a small number of accounts due to the recent slew of passwords being leaked across the Internet. On top of that, one of their employees had their account -- which included a document with user email addresses -- accessed as well. Oops.

    Read More
  7. Study Shows People Over 55 Pick Better Passwords Than Teens

    With digital information becoming the norm, passwords are more important than they've ever been. Considering that "the kids" typically pick up tech better and faster than old fogies, you might think that teens and younger people in general would understand the importance of and be better at making secure passwords. Well, you'd be wrong. According to a new study of almost 70 million Yahoo! users, users over 55 are way more likely to have a secure password than users under 25.

    Read More
  8. DARPA Wants To Identify Users By Typing Style, Do Away With Passwords

    The combination of a username and password seems like an inextricable part of using a secured computer. Sure, you can use biometrics, but username and password just seems like the most natural way to identify and authorize users without the bulk of extra, expensive, and specialized equipment. That being the case, it has become second nature to most of us, but is it really natural at all? Memorizing passwords, especially "strong" ones, involves remembering long, arbitrary strings of seemingly random numbers and characters, hardly natural. That's why DARPA has undertaken an initiative to eliminate passwords altogether and instead identify users in the background, as they work, by paying very close attention to the idiosyncratic way they type.

    Read More
  9. Report: Employers and Colleges Want Your Facebook Passwords

    The perils and pitfalls of social networking are nothing new, and with more people putting more of themselves "out there" online it has become unfortunately necessary to prune one's online public persona. However, some employers and colleges are taking the unprecedented step of demanding private access to user's social networking profiles. In some cases this could mean being forced to "friend" a superior, or even ordered to surrender your password.

    Read More
  10. What Makes a Strong Password [Infographic]

    Having a strong password -- a really strong password -- is getting more and more important. Of course, the strongest password in the world won't save you if it gets stolen from somewhere, but that's why you shouldn't recycle them. There are plenty of other handy tips to help you keep your data secure and this infographic from Killer Infographics can clue you in to what they are. Normally, this is where I'd insert an amusing little anecdote about the ways I make my passwords strong, but I have to keep that on the down-low. I don't want anyone trying to hack into my bank account in order to steal my tens upon tens of hard-earned dollars.

    Read More
  11. Hackers Can Reveal, Change Passwords in OS X Lion

    Security researcher Patrick Dunstan has released his findings on Apple's latest operating system OS 10.7, aka Lion, and it doesn't look good. He found that if provided with physical access, a nefarious person could recover administrator passwords, or even change those passwords, without any special privileges. Here's how password security is supposed to work on a Mac: Passwords are stored in "shadow files" which are buried deep in the system's file structure, and only accessible by someone logged in with an administrator password. Dunstan's research has shown, however, that in the new version of the operating system, these files can be accessed by any user and passwords extracted. More troubling is his discovery that, with a little prodding, someone with access to the computer's Terminal command line app can change the administrator's password themselves.

    Read More
  12. Most Common iPhone Passcodes Are Obvious

    In the latest update to the Big Brother Camera Security iPhone app -- an app that snaps pictures of any unauthorized person using one's iPhone 4 or iPod Touch 4 -- Daniel Amitay, the app's creator, added some code that anonymously tracks and records users' passcodes for the app. Though that doesn't necessarily say much about what people use as their main iPhone and iPod passcode, Amitay felt the Big Brother passcodes are representative of the iPhone and iPod passcodes, because the Big Brother passcode setup and lock screens are "nearly identical to those of the actual iPhone passcode lock."

    The above chart shows the top ten most common passcodes out of the 204,508 recorded, the most popular being the shameful "1234" with a significant lead on the second most popular passcode, the equally shameful "0000." The top ten passcodes make up 15% of all of the passcodes in use, most of which follow an easily-recognizable pattern: Sequential order, four of the same number, or numbers that are arranged in a line on the number pad. Even the seemingly obscure "5683" passcode follows a pattern: It is the numerical representation of spelling the word "love" on the number pad.

    Read More
  13. The Password is Dead, Long Live the Password

    The U.S. Chamber of Commerce has announced a new vision for providing security online with the National Strategy for Trusted Identities in Cyberspace (NSTIC). Calling it a voluntary identity ecosystem, the NSTIC aims to make the web safer, easier to use, and open to a wider range of online activities. First and foremost, the Government wants you to know that there is no national ID program in the works. Furthermore, the NSTIC envisions a completely voluntary environment where users can opt for higher-level security when and if they want it. Lastly, while the government will be supporting these efforts and providing endorsement for NSTIC projects, the nitty-gritty will likely be handled by private companies. It works like this:

    Read More
© 2015 The Mary Sue   |   About UsAdvertiseNewsletterJobsContributorsComment PolicyPrivacyUser AgreementDisclaimerContact RSS

Dan Abrams, Founder
  1. Mediaite
  2. The Mary Sue
  3. Styleite
  4. The Braiser
  5. SportsGrid
  6. Gossip Cop