That's the core problem with passwords, hard to remember, easy to crack, right?
Easy to guess.
So that leads to a lot of attacks.
I think I have the best job in the world and that every morning I get to wake up.
I come in and there's some new interesting threat.
Right so it doesn't really terrify me it kind of excites me that we get to come in and say okay what did the hackers learn overnight and what are they doing that's different than they were doing yesterday.
You got a cool password you think is really hard you're using it in multiple places one of those places gets breached.
Or let's just say it's so easy to guess I can just guess it.
Then a hacker goes on the dark web.
Maybe they buy a big list, you know that you've heard about all these huge breaches of different services where their passwords and usernames leak, the hacker buys the list and then they just go out and Start trying it everywhere.
There's a wide variety of different threat actors.
So there are certainly threat actors who are associated with different nation states around the world.
There are threat actors we know, for instance, that are associated with national governments, for instance in China, in Russia, and other places like that.
They're also large organized bands of hackers who were just kind of loosely affiliated.
So a lot of times when you get an email that says, I'm from Nigeria, and I'm a Prince and if you just do the following thing, I'll transfer your money.
Those are loosely associated bands of hackers, but they have these really professional chains, right?
So a junior hacker, maybe we'll go out and try to farm lots and lots of accounts.
And once they finally find one that's good, then they will resell that account to a much more experienced hacker who will then come in and actually do the hard work of breaking into the account and expanding and taking over things.
[UNKNOWN] needing an industry-wide effort to move the world to password-less Strong authentication that gets rid of all of these risks of fishing and replay attacks that we've been talking about.
You are very unique.
Maybe your iris print or your facial print or your thumbprint.
Those are unique things about you or there's something you know that's unique as well.
That high level of uniqueness is much, much stronger than just the characters of a password.
And so when we build the models that represent you, we're building these complex mathematical models that essentially represent the attributes of your face or the attributes of your thumbprint and those are very hard to replicate or guess.
TikTok ban: What you need to know
How Black Girls Code is driving change in the tech industry
CISA director: Paper record key to keeping 2020 election secure
Blackhat 2020: Tech community must help secure elections
SpaceX Starship prototype takes first 'hop'
Phil Schiller no longer Apple's head of marketing
Now What: Why we're trading cash for contactless
Camera test: iPhone SE vs. Pixel 4A
Explaining the tech and troubles of police body cameras
David Katzmaier's tips for upgrading your home entertainment...