{"id":87034,"date":"2019-05-03T07:29:23","date_gmt":"2019-05-03T14:29:23","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=87034"},"modified":"2020-05-07T18:14:12","modified_gmt":"2020-05-08T01:14:12","slug":"what-is-credential-stuffing-why-you-need-unique-passwords","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/","title":{"rendered":"What is credential stuffing? Why you need unique passwords"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-53347\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-passwords-hacked.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-passwords-hacked.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-passwords-hacked-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-passwords-hacked-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to use a different password on every website or with every service where you have an account. While it&#8217;s okay to reuse the same user name (which is sometimes your email address), passwords should <em>always<\/em> be unique because of data breaches and credential stuffing.<\/p>\n<h3>Why must every site password be unique?<\/h3>\n<p>There are often data breaches where companies have not stored data such as usernames and passwords securely. This data becomes public knowledge, and it could contain your username and password for certain sites. One website that tracks the publicly available data from this type of breach, <a href=\"https:\/\/haveibeenpwned.com\" target=\"_blank\" rel=\"noopener noreferrer\">Have I Been Pwned<\/a>, currently has records for 7.8 billion accounts. (On this site, you can enter your email address or any usernames you have used to see if your credentials have been compromised.)<\/p>\n<div id=\"attachment_85348\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-85348\" loading=\"lazy\" class=\"size-full wp-image-85348\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/01\/Collection-1-password-data-breach-screenshot-600x300-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-85348\" class=\"wp-caption-text\">Massive collections of stolen passwords are freely available online.<\/p><\/div>\n<p>When this type of data becomes available, hackers and cybercriminals perform <em>credential stuffing<\/em> attacks, using stolen usernames and passwords to attempt to log into various other accounts: these may be bank accounts, email accounts, and services such as Facebook, Twitter, or Instagram. They do so by simply trying the many combinations that they have discovered: they automate the entry of a username and password until they find that combo being used on other sites.<\/p>\n<h3>I have nothing to hide. Why should I care if hackers break into my accounts?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-49114\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/hacker-asserting-authority-150x90.jpg\" alt=\"\" width=\"150\" height=\"90\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/hacker-asserting-authority-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/hacker-asserting-authority-300x180.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/01\/hacker-asserting-authority.jpg 500w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Since credential stuffing is an automated process, it doesn&#8217;t take much effort for a cybercriminal to build a portfolio of hacked accounts. They can then use those hacked accounts to do things like send spam, or try to trick your friends, relatives, and coworkers into (for example) thinking you&#8217;re stranded overseas and need you to wire them money.<\/p>\n<p>Remember that if a hacker knows your password, in many cases they can change your password and lock you out (and lock out other hackers), so you may never be able to regain access to your account. That can be a major inconvenience, especially if they break into your e-mail account (because then they could take advantage of &#8220;forgot my password&#8221; links to break into the rest of your accounts) or a banking or other sensitive account.<\/p>\n<h3>How can I protect my accounts from credential stuffing attacks?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-84544\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Change-Your-Passwords-girl-holding-sign-140x150.png\" alt=\"Change Your Password girl holding sign, based on https:\/\/en.wikipedia.org\/wiki\/File:Wikipe-tan_holding_sign_cropped.png\" width=\"140\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Change-Your-Passwords-girl-holding-sign-140x150.png 140w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Change-Your-Passwords-girl-holding-sign-280x300.png 280w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Change-Your-Passwords-girl-holding-sign-657x703.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Change-Your-Passwords-girl-holding-sign.png 718w\" sizes=\"(max-width: 140px) 100vw, 140px\" \/>The number-one way to protect against credential stuffing is to ensure that you use a unique strong password for every different site and service. This should be the default way you set up your accounts. And wherever possible, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" rel=\"noopener\">enable two-factor authentication<\/a> for an additional layer of security.<\/p>\n<p>If you do currently use the same password on multiple websites, we strongly recommend that you change your password on every website where it is used.<\/p>\n<p>And since that likely means you&#8217;ll have a lot of unique passwords, the best way to keep track of them is to use a trusted <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" rel=\"noopener\">password manager<\/a> (secured by a long, strong password that only you know and will remember).<\/p>\n<h3>How can I learn more?<\/h3>\n<p>Check out our related articles with additional information on these topics:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-avoid-getting-hacked-after-data-breaches\/\" rel=\"noopener\">How to avoid getting hacked after data breaches<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" rel=\"noopener\">Two-factor authentication: How it works and why you should use it<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" rel=\"noopener\">How to choose the right password manager for you<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-and-answer-security-questions\/\" rel=\"noopener\">How to choose and answer security questions<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"50\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 50px) 100vw, 50px\" \/><\/a>Every week, Intego&#8217;s experts discuss Apple security on the <strong>Intego Mac Podcast<\/strong>\u2014we discuss credential stuffing in <a href=\"https:\/\/podcast.intego.com\/81\" rel=\"noopener\">episode 81<\/a>\u2014so be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\">subscribe<\/a> to make sure you don&#8217;t miss the latest episode. You&#8217;ll also want to subscribe to our <strong>e-mail newsletter<\/strong> and keep an eye here on <strong>The Mac Security Blog<\/strong> for updates.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+Hi40lH7u?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can also follow Intego on your favorite social and media channels: <a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram<\/a>, <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener noreferrer\">YouTube<\/a> (click the \ud83d\udd14 to get notified about new videos).<\/p>\n<p><span style=\"font-size: x-small;\">Image of girl holding &#8220;change your password&#8221; sign based on\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/File:Wikipe-tan_holding_sign_cropped.png\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipe-tan holding sign cropped<\/a> by <a href=\"https:\/\/en.wikipedia.org\/wiki\/User:Kasuga~enwiki\" target=\"_blank\" rel=\"noopener noreferrer\">Kasuga~enwiki<\/a>\u00a0(<a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\/\" target=\"_blank\" rel=\"noopener noreferrer\">CC BY-SA 3.0<\/a>).<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to use a different password on every website or with every service where you have an account. While it&#8217;s okay to reuse the same user name (which is sometimes your email address), [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":53353,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4486,353,96],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is credential stuffing? Why you need unique passwords - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-03T14:29:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-08T01:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg\",\"width\":400,\"height\":260,\"caption\":\"Email Password Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\",\"name\":\"What is credential stuffing? Why you need unique passwords - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#primaryimage\"},\"datePublished\":\"2019-05-03T14:29:23+00:00\",\"dateModified\":\"2020-05-08T01:14:12+00:00\",\"description\":\"One of the most serious Internet security risks involves usernames and passwords\\u2014and the reuse of passwords across multiple sites. The best practice is to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is credential stuffing? Why you need unique passwords\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"What is credential stuffing? Why you need unique passwords\",\"datePublished\":\"2019-05-03T14:29:23+00:00\",\"dateModified\":\"2020-05-08T01:14:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#webpage\"},\"wordCount\":674,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg\",\"keywords\":[\"credential stuffing\",\"Password Security\",\"Passwords\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/","og_locale":"en_US","og_type":"article","og_title":"What is credential stuffing? Why you need unique passwords - The Mac Security Blog","og_description":"One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/","og_site_name":"The Mac Security Blog","article_published_time":"2019-05-03T14:29:23+00:00","article_modified_time":"2020-05-08T01:14:12+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg","width":400,"height":260,"caption":"Email Password Security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/","name":"What is credential stuffing? Why you need unique passwords - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#primaryimage"},"datePublished":"2019-05-03T14:29:23+00:00","dateModified":"2020-05-08T01:14:12+00:00","description":"One of the most serious Internet security risks involves usernames and passwords\u2014and the reuse of passwords across multiple sites. The best practice is to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What is credential stuffing? Why you need unique passwords"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"What is credential stuffing? Why you need unique passwords","datePublished":"2019-05-03T14:29:23+00:00","dateModified":"2020-05-08T01:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#webpage"},"wordCount":674,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg","keywords":["credential stuffing","Password Security","Passwords"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/05\/email-password-security.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-mDM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/87034"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=87034"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/87034\/revisions"}],"predecessor-version":[{"id":91362,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/87034\/revisions\/91362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/53353"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=87034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=87034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=87034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}