Skip to main content

CNBC just made a huge mistake with its password security tool

CNBC
Jim Henderson/Wikimedia
Supposedly, those who can’t do, teach, but when it comes to password protection, CNBC apparently can’t do either. In a massive security failure, a CNBC columnist attempted to drive a point home regarding password strength, but instead shared participants’ passwords with third-party marketers. So if you entered your password into CNBC’s supposedly protected tool, you may want to consider changing your codes.

It all started with a well-intentioned CNBC article in The Big Crunch, which included an interactive tool that would test the security of readers’ passwords. Once you entered your chosen string, the site determined how common your password was, how long and varied the characters involved were, and ultimately, how secure it was. The problem, however, was that no matter how secure your password may have been before you submitted it, CNBC then proceeded to share it (unbeknownst even to the company, it would seem).

The article (and faulty tool) has since been taken down in acknowledgement of the huge oversight in security practices. Adrienne Porter of Google initially pointed out that your password was sent through the CNBC site unencrypted, which means that anyone could’ve intercepted it at just about any point. And worse yet, while CNBC insisted that “no passwords are being stored,” that was a lie. In fact, your password was sent not only to a Google spreadsheet, but also to over 30 third parties including advertisers and analytics providers.

@jeremybowers found my new master password pic.twitter.com/odUT4E8bAo

— Ben Lamb (@bennyfactor) March 29, 2016

Needless to say, people were not pleased with these significant failures, and Twitter users were almost immediately up in arms. As independent security and privacy researcher Ashkan Soltani tweeted, “This is a story of exactly what *NOT* to do when trying to educate users about password security.”

Oh, and by the way, the tool was apparently also providing incorrect information as to the actual security of your password. But honestly, that’s probably the least of CNBC’s concerns at this point.

Editors' Recommendations

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
NordPass adds passkey support to banish your weak passwords
password manager lifestyle image

Weak passwords can put your online accounts at risk, but password manager NordPass thinks it has the solution. The app has just added support for passkeys, giving you a far more secure way to keep all your important logins safe and sound.

Instead of a vulnerable password, passkeys work by using your biometric data as your login ‘fingerprint.’ For example, you could use the Touch ID button on a Mac or a facial recognition scanner on your smartphone to log in to your account. No typing required.

Read more
Apple just made a huge move to power up your next MacBook
The screen of the MacBook Air M2.

Your next iPhone or Mac could have a major advantage over rival devices, with performance and efficiency that nothing else can match, if a new report is to be believed. It claims Apple has gobbled up the entire supply of a new breed of superefficient chips.

Those chips are manufactured by a company called TSMC that has made Apple’s powerful mobile and computer chips for years. If correct, the report from DigiTimes (via MacRumors) implies Apple’s competitors -- whether they’re making Windows PCs or Android smartphones -- will have to wait their turn while Apple has its fun with the brand-new 3-nanometer chips.

Read more
This huge password manager exploit may never get fixed
A large monitor displaying a security hacking breach warning.

It’s been a bad few months for password managers -- albeit mostly just for LastPass. But after the revelations that LastPass had suffered a major breach, attention is now turning to open-source manager KeePass.

Accusations have been flying that a new vulnerability allows hackers to surreptitiously steal a user’s entire password database in unencrypted plaintext. That’s an incredibly serious claim, but KeePass’s developers are disputing it.

Read more