Last week, it had been a number of passwords that were leaked thru a Google! provider. These passwords were to have a specific Yahoo! solution, but the age-post address being used was basically to possess lots of domains. We have witnessed specific dialogue out-of whether, including, the passwords to possess Yahoo levels had been in addition to started. The fresh brief response is, if the member the full time among cardinal sins of passwords and you will used again the same one to for several profile, upcoming, sure, certain Bing (or any other) passwords may also have started started. Which have said all that, this isn’t mostly the thing i desired to evaluate today. In addition usually do not want to spend a lot of time to the code coverage (or use up all your thereof) or the simple fact that the brand new passwords was frequently kept in the fresh obvious, both of and therefore really protection group could possibly consent try bad details.
The fresh new domains
Basic, I did an easy studies of your domains. I will note that some of the elizabeth-send address contact information were demonstrably incorrect (misspelled domain names, etc.). There were all in all, 35008 domains portrayed. The big 20 domains (immediately after converting all to lower circumstances) are offered throughout the desk lower than.
137559 google 106873 gmail 55148 hotmail 25521 aol 8536 6395 msn 5193 4313 real time 3029 2847 2260 2133 2077 ymail 2028 1943 1828 1611 aim 1436 1372 1146 mac computer
Brand new passwords
I noticed an appealing data of your eHarmony passwords because of the Mike Kelly during the Trustwave SpiderLabs blog and you may envision I would do an effective comparable study of the Google! Continue reading