{"id":17739,"date":"2018-04-29T08:00:53","date_gmt":"2018-04-29T12:00:53","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=17739"},"modified":"2022-04-27T15:41:28","modified_gmt":"2022-04-27T19:41:28","slug":"passwords-security-breaches-1password","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/passwords-security-breaches-1password\/","title":{"rendered":"Cool Tool Helps You Check Passwords Against Security Breaches"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">If you\u2019re wondering whether or not your passwords have been scooped up by hackers who have carried out digital attacks like identity theft, there\u2019s a new tool from 1Password that will tell you if your passwords have been leaked. \u00a0<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/common-passwords-ranked\/\"><b>Here Are the Most Common Passwords, Ranked<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Learn what this tool does and some other ways to keep your passwords safe.<\/span><\/p>\n<p><b>Integration with 1Password<br \/>\n<\/b><span style=\"font-weight: 400;\">The popular password manager 1Password recently <\/span><a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/02\/new-tool-safely-checks-your-passwords-against-a-half-billion-pwned-passwords\/\"><span style=\"font-weight: 400;\">integrated the tool<\/span><\/a><span style=\"font-weight: 400;\">, which checks whether or not your passwords are public property now. 1Password manager developers added the tool after security researcher Troy Hunt announced his latest version of \u201cPwner Passwords,\u201d which is a search tool that displays more than 500 million passwords that have been leaked in data breaches.<\/span><\/p>\n<p><b>How the Tool Works<br \/>\n<\/b><span style=\"font-weight: 400;\">It works like this&#8211;1Password looks at your password using SHA-1, a cryptographic tool that encrypts passwords into 40 characters, sending only the first 5 characters to maintain security and anonymity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following this step, the server sends back a list of leaked passwords in encrypted form that shows the first 5 characters as yours. After this, 1Password compares the list locally to determine if the full 40 characters of your password shows up. If there is a match, you\u2019ll be notified and asked to change your password. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Customers who have 1Password.com accounts can use the tool online by inputting Shift-Control-Option-C (or Shift+Ctrl+Alt+C in Windows) to unlock the proof of concept. You will then be taken to a \u201cCheck Password\u201d button next to your passwords.<\/span><\/p>\n<p><b>Smart Password Practices<br \/>\n<\/b><span style=\"font-weight: 400;\">Make sure your <\/span><a href=\"https:\/\/smallbiztrends.com\/2017\/08\/password-policy-best-practices.html\"><span style=\"font-weight: 400;\">password is complex and random<\/span><\/a><span style=\"font-weight: 400;\">, containing eight characters, with at least one upper- and one lower-case letter and a special character such as a dollar sign or the pound sign. Also, ensure your numbers and symbols are separate for maximum security. Avoid sharing any personal information in your password such as a loved one\u2019s name, your last name or your address.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, don\u2019t use dictionary words. A random combinations of numbers, symbols and letters is more effective. Using different passwords for different accounts is key as it protects you from being hacked and having all your accounts compromised. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, don\u2019t write down your password unless you really have to, so keep it under 10 characters to make it easier to memorize.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The password-verification tool has been integrated into the popular password manager 1Password.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[218,358,545,249,223],"class_list":["post-17739","post","type-post","status-publish","format-standard","hentry","category-security","tag-privacy","tag-protection","tag-safety","tag-security","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=17739"}],"version-history":[{"count":4,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17739\/revisions"}],"predecessor-version":[{"id":17965,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/17739\/revisions\/17965"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=17739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=17739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=17739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}