DIGITALSECURITYGUIDE Malware as mentioned before is malicious software and does some damage like – slowing your PC down, sending out your information. This includes credit card and bank account numbers, passwords and address books, all of which can be immediately exploited by identity thieves. The second risk is the program not actually working. Most software companies have implemented a way of checking the registration – the program might work for a while, but receive an update at some point in time which renders it unusable unless you make a purchase. Some might disable the Automatic Update feature of the software in question. This comes with a downside, though: no vulnerability patches for you, as the developers often push them through a product update. Passwords Your password is what tells the computer or service that you are who you say you are. Until we can do retina scans like in James Bond movies, the password is the best that we can do. But, because your password is like a key to your account, you need to safeguard it. Anyone who has your password can get into your account, and your files. Anyone who can guess your password has it. Anyone who has your password can pose as you. Therefore, you may be held responsible for someone else's actions, if they are able to get your password. You may not wish this to happen. Today you need to remember many passwords. You need a password for the Windows log on, your e-mail account, Facebook, Twitter, Ecocash or Telecash, the list is just endless. A weak password: • Contains less than eight characters. • Is a word found in a dictionary (English or foreign). • Is a common usage word such as: Names of family, pets, friends, co-workers, fantasy characters, etc. • Computer terms and names, commands, sites, companies, hardware, software, sports teams (Dembare or Highlanders). • Birthdays and other personal information such as addresses, phone numbers, or license plates. • Word or number patterns like aaabbb, qwerty, 9876543. • Any of the above spelled backwards. • Any of the above preceded or followed by a digit (harare52). Strong passwords Use longer, varied passwords A rule of thumb for strong passwords is the longer, the better. Passwords that have a greater number of varied characters is more difficult for hackers to crack. Many websites require accounts to have six or more characters. However, users that go above and beyond these guidelines are at a reduced risk of infiltration. In addition, individuals should seek to include numbers, symbols and other characters where allowed. Another rule of thumb, avoid biological or personal details in passwords. Eg. your birth-date or child's name. Don't use things that is specifically about you, such as your hometown or the name of your pet or spouse," Passwords are hacked or cracked in the following ways: • A dictionary attack is a method of breaking into a password-protected computer or service by systematically entering every word in a dictionary as a password. So if your password is a dictionary word then it can be cracked this way. • Bruteforce attack involves trying every key combination until the correct password is found. Due to the number of possible combinations of letters, numbers, and symbols, a brute force attack can take a long time to complete. What not to do when choosing a password • Do not choose a password based upon personal data like your name, your username, or other 7