With LinkedIn providing yet more fodder for attackers’ rainbow tables and login bots, Microsoft has decided to start blocking too-common passwords. As a result, Azure Active Directory’s 10 million or so users will no longer be able to select a password that’s appeared too many times on breach lists, or commonly appears in attackers’ login attempts. The new regulation is already live in Microsoft Account Service and in private preview in Azure Active Directory, Redmond says in this Technet post.
View full story
ORIGINAL SOURCE: The Register