Password Constraints and Their Unintended Security Consequences

Reading Time: ~5 min.You’re probably familiar with some of the most common requirements for creating passwords. A mix of upper and lowercase letters is a simple example. These are known as password constraints. They’re rules for how you must construct a password. If your password must be at least eight characters long, contain lower case, uppercase, numbers and […]
The post Password Constraints and Their Unintended Security Consequences appeared first on Webroot Blog.

Link: https://www.webroot.com/blog/2018/11/05/password-constraints-unintended-security-consequences