<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>i3m Blog &#187; login</title>
	<atom:link href="http://internal3m.com/CMS/Wordpress/tag/login/feed/" rel="self" type="application/rss+xml" />
	<link>http://internal3m.com/CMS/Wordpress</link>
	<description></description>
	<lastBuildDate>Thu, 21 Apr 2016 14:54:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.1.41</generator>
	<item>
		<title>Internet retailers miss opportunities by not using Facebook login, Sociable Labs says</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/09/13/internet-retailers-miss-opportunities-by-not-using-facebook-login-sociable-labs-says/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/09/13/internet-retailers-miss-opportunities-by-not-using-facebook-login-sociable-labs-says/#comments</comments>
		<pubDate>Thu, 13 Sep 2012 15:43:30 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[interface]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Your Brand]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[open graph]]></category>
		<category><![CDATA[retail]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1371</guid>
		<description><![CDATA[Only 30 of the top 500 Internet retailers offer Facebook login as a registration option for their sites, according to research by social commerce software company Sociable Labs. That’s only 6 percent of the top online retailers making use of a feature the social network launched in 2008. Sociable Labs says it’s not because Facebook <a href='http://internal3m.com/CMS/Wordpress/2012/09/13/internet-retailers-miss-opportunities-by-not-using-facebook-login-sociable-labs-says/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>Only 30 of the top 500 Internet retailers offer Facebook login as a registration option for their sites, according to research by social commerce software company Sociable Labs.</p>
<p>That’s only 6 percent of the top online retailers making use of a feature the social network launched in 2008. Sociable Labs says it’s not because Facebook login isn’t useful. The option simplifies account creation, eliminates the need for another password, allows companies to better personalize their sites and collect richer CRM data, in addition to increasing referral traffic from the social network. Sociable Labs says the problem comes down to technical barriers, perceived security concerns and, in general, lack of priority among online retailers that have another registration system in place.</p>
<p><strong>MORE: </strong> <a href="http://www.insidefacebook.com/2012/09/12/internet-retailers-miss-opportunities-by-not-using-facebook-login-sociable-labs-says/" target="_blank">Internet retailers miss opportunities by not using Facebook login, Sociable Labs says</a>.</p>
<p>&nbsp;</p>
<hr />
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/09/13/internet-retailers-miss-opportunities-by-not-using-facebook-login-sociable-labs-says/feed/</wfw:commentRss>
		<slash:comments>215</slash:comments>
		</item>
		<item>
		<title>Why passwords have never been weaker—and crackers have never been stronger</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 12:05:55 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[cracking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[passwords]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1276</guid>
		<description><![CDATA[In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren&#8217;t typical of mass-produced phishing scams. The e-mails said that his login credentials <a href='http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk. He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren&#8217;t typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites&#8217; servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The warnings Brooks and millions of other people received that December weren&#8217;t fabrications. Within hours of anonymous hackers penetrating Gawker servers and <a style="text-decoration: none; color: #699fb3;" href="http://www.theregister.co.uk/2010/12/13/gawker_hacked/">exposing cryptographically protected passwords for 1.3 million of its users</a>, botnets were cracking the passwords and using them to commandeer Twitter accounts and send spam. Over the next few days, the sites advising or requiring their users to change passwords expanded to include Twitter, Amazon, and Yahoo.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">&#8220;The danger of weak password habits is becoming increasingly well-recognized,&#8221; said Brooks, who at the time <a style="text-decoration: none; color: #699fb3;" href="https://www.cdt.org/blogs/sean-brooks/gawker-breach-victims-aided-unexpected-allies">blogged about the warnings</a> as the Program Associate for the Center for Democracy and Technology. The warnings, he told me, &#8220;show [that] these companies understand how a security breach outside their systems can create a vulnerability within their networks.&#8221;</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The ancient art of password cracking has advanced further in the past five years than it did in the previous several decades combined. At the same time, the dangerous practice of password reuse has surged. The result: security provided by the average password in 2012 has never been weaker.</p>
<h2 style="list-style: none; margin-top: 0px; margin-bottom: 15px; color: #263034; font-family: NoticiaBold, 'Times New Roman', serif; -webkit-font-smoothing: antialiased; text-rendering: optimizelegibility; line-height: 24px; font-size: 20px; background-color: #ffffff;">A new world</h2>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">The average Web user maintains 25 separate accounts but uses just 6.5 passwords to protect them, according to a <a style="text-decoration: none; color: #699fb3;" href="https://research.microsoft.com/pubs/74164/www2007.pdf">landmark study (PDF)</a> from 2007. As the Gawker breach demonstrated, such password reuse, combined with the frequent use of e-mail addresses as user names, means that once hackers have plucked login credentials from one site, they often have the means to compromise dozens of other accounts, too.</p>
<p style="margin-top: 0px; color: #263034; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; background-color: #ffffff;">Newer hardware and modern techniques have also helped to contribute to the rise in password cracking. Now used increasingly for computing, graphics processors allow password-cracking programs to work thousands of times faster than they did just a decade ago on similarly priced PCs that used traditional CPUs alone. A PC running a single <a style="text-decoration: none; color: #699fb3;" href="http://www.amazon.com/Diamond-Radeon-GDDR5-Graphics-7970PE53G/dp/B006UACSZ4/ref=sr_1_2?ie=UTF8&amp;qid=1337125724&amp;sr=8-2">AMD Radeon HD7970</a> GPU, for instance, can try on average an astounding 8.2 billion password combinations each second, depending on the algorithm used to scramble them. Only a decade ago, such speeds were possible only when using pricey supercomputers.</p>
<p><strong>MORE: </strong> <a href="http://arstechnica.com/security/2012/08/passwords-under-assault/" target="_blank">Why passwords have never been weaker—and crackers have never been stronger | Ars Technica</a>.</p>
<p>&nbsp;<br />
<hr/>
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/08/21/why-passwords-have-never-been-weaker-and-crackers-have-never-been-stronger/feed/</wfw:commentRss>
		<slash:comments>281</slash:comments>
		</item>
		<item>
		<title>Developer Quits OAuth 2.0 Spec, Calls It &#8216;a Bad Protocol&#8217;</title>
		<link>http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/</link>
		<comments>http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/#comments</comments>
		<pubDate>Fri, 03 Aug 2012 13:40:27 +0000</pubDate>
		<dc:creator><![CDATA[..internal..]]></dc:creator>
				<category><![CDATA[interface]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[oauth]]></category>
		<category><![CDATA[password]]></category>

		<guid isPermaLink="false">http://internal3m.com/CMS/Wordpress/?p=1234</guid>
		<description><![CDATA[OAuth 2.0 is a rewrite of the original OAuth spec, which offers a secure way to sidestep the dilemma of having to hand over passwords to third party sites and apps to access user data. Google, Facebook, Twitter, and Yahoo are among the high-profile sites that have embraced OAuth in some fashion. Unfortunately, according to <a href='http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/' class='excerpt-more'>[...]</a>]]></description>
				<content:encoded><![CDATA[<p>OAuth 2.0 is a rewrite of the original OAuth spec, which offers a secure way to sidestep the dilemma of having to hand over passwords to third party sites and apps to access user data. Google, Facebook, Twitter, and Yahoo are among the high-profile sites that have embraced OAuth in some fashion.</p>
<p>Unfortunately, according to Hammer those same big names are at least partly responsible for making OAuth 2.0 the fiendishly complex and convoluted spec that it has become. Hammer is not the first to question the usefulness of OAuth 2.0. In fact, we’ve previously argued that OAuth 2.0′s complexity is hurting the spirit of API experimentation on the web.</p>
<p>Hammer isn’t just questioning OAuth 2.0, he’s abandoned it entirely and completely erased himself from the project, calling it “a bad protocol… bad enough that I no longer want to be associated with it.”</p>
<p>In Hammer’s view OAuth 2.0 is “more complex, less interoperable, less useful, more incomplete, and most importantly, less secure” than its 1.0 cousin.</p>
<p><strong>MORE: </strong> <a href="http://www.webmonkey.com/2012/07/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/" target="_blank">Developer Quits OAuth 2.0 Spec, Calls It &#8216;a Bad Protocol&#8217; | Webmonkey | Wired.com</a>.</p>
<p>&nbsp;</p>
<hr />
]]></content:encoded>
			<wfw:commentRss>http://internal3m.com/CMS/Wordpress/2012/08/03/developer-quits-oauth-2-0-spec-calls-it-a-bad-protocol/feed/</wfw:commentRss>
		<slash:comments>304</slash:comments>
		</item>
	</channel>
</rss>
