New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn how post-quantum cryptography computing could change the way we encrypt passwords and what you should be doing to prepare.| Specops Software
Learn more about SHA256 and how long its takes to crack passwords protected by the SHA256 hashing algorithm.| Specops Software
Read our team’s analysis of the Rockyou2024 password list to learn whether it’s truly a record password breach or mostly garbage data.| Specops Software
In this blog, we'll explore password dictionary attacks: a brute-force hacking method used to break into a password-protected computer/server.| Specops Software
Compromising login credentials is the goal of many modern cyber-attacks. If successful, they can result in the worst types of data breaches, especially...| Specops Software
Today, the Specops research team is publishing new data on how long it takes modern attackers to brute force guess user passwords with the help of newer...| Specops Software
Most end users admit to using passwords – how concerned should you be? Understand the dangers of password reuse and how you can mitigate risk.| Specops Software
Use Active Directory GPOs to create granular password policies. Specops Password Policy strengthens passwords, and enforces password policy standards.| Specops Software