{"id":13004,"date":"2016-09-16T09:00:37","date_gmt":"2016-09-16T13:00:37","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=13004"},"modified":"2019-11-15T06:53:31","modified_gmt":"2019-11-15T11:53:31","slug":"security-questions-are-insecure","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/security-questions-are-insecure\/13004\/","title":{"rendered":"How I hacked my Apple ID security questions"},"content":{"rendered":"<p>In the beginning of 2012, I got a MacBook. At the time, I knew little about gadgets, and I was not planning to buy any other Apple devices. I powered up the laptop and created an Apple ID account. As requested, I chose a password and several security questions.<\/p>\n<p>Four years later, I have an iPad as well, and of course I\u2019ve purchased several interesting apps (some of them I found in <a href=\"https:\/\/www.kaspersky.com\/blog\/best-tablet-games-for-kids\/9985\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">this list<\/a> made by my colleague). My account became valuable to me, and I started thinking about its protection. That\u2019s why I decided to turn on <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">two-factor authentication<\/a>.<\/p>\n<p>It wasn\u2019t as easy as it should have been; Apple wouldn\u2019t allow me to change anything in the Security tab until I could answer my security questions perfectly. And the answers I put in did not match.<\/p>\n<p>When I tried to change the security questions, I found out that the secondary e-mail used to perform such operations was not verified. I still have no idea why Apple would treat an unverified e-mail as active, but it did, and thus began an endless circle.<\/p>\n<p>I clicked the Verify Email link several times but received no confirmation e-mails. Everything was going wrong. It wasn\u2019t a good time to ask tech support for help, so I had only one way out \u2014 I had to hack my own security questions.<\/p>\n<h3>How I hacked the questions<\/h3>\n<p>The questions that I chose four years ago were not so difficult. But thinking about the answers, I realized that anybody could figure them out by looking at my CV or social network account.<\/p>\n<p>\u2014 <i>Where was your first job?<\/i><br>\nLinkedIn is an obvious place to find the answer to this question.<\/p>\n<p>\u2014 <i>Where did your mother and father meet?<\/i><br>\nMy parents grew up, met each other, and got married in the same city where I was born. A lot of people have the same life story. And many people list their native cities on social networks (and social networks usually ask people to do that!). This question is not secure at all.<\/p>\n<p>\u2014 <i>What is your favorite children\u2019s book<\/i>?<br>\nWell, I had several favorite books as a child, but the most likely answer was The Hobbit, by J. R. R. Tolkien. Like the other answers, this one wasn\u2019t exactly a secret: First, the book is very popular. Second, my university friends and classmates know that I wrote several term papers about The Hobbit. My half-finished dissertation was devoted to eleven translations of The Hobbit into Russian! In the end, the only mystery about this question was whether I wrote the shorter title or the full name \u2014 \u201cThe Hobbit, or There and Back Again\u201d \u2014 four years ago.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-13006 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06021558\/security-questions-screenshot-en.jpg\" alt=\"How I hacked my Apple ID security questions\" width=\"1280\" height=\"800\"><\/p>\n<p>If I knew all of the answers, then why didn\u2019t my answers match? It\u2019s simple: I had English as the main language of my account, and that meant the security questions were also shown in English. But four years ago I answered them in Russian. When I switched languages and reentered the same answers, they matched. But even for people who don\u2019t switch languages, security answers may become problematic: Did you use proper capitalization? Abbreviations? Nicknames?<\/p>\n<p>I began thinking about what makes a good security question \u2014 and answer.<\/p>\n<h3>What is a good security question? If you have to choose a question from a list, which should you choose?<\/h3>\n<p><a href=\"http:\/\/goodsecurityquestions.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Five criteria<\/a> help us distinguish good security questions from bad.<\/p>\n<p>1. <b>Obscurity<\/b> \u2014 questions must be hard to guess or research. For example, a favorite of many banks \u2014 your mother\u2019s maiden name \u2014 sucks for sure. I won\u2019t waste your time covering the 9000 ways to figure that one out.<\/p>\n<p>2. <b>Stability<\/b> \u2014answers must not change over time. Avoid \u201cfavorite\u201d questions: Your favorite job, food, band, movie, restaurant, vacation spot might change in a few years.<\/p>\n<p>3. <b>Memorability<\/b> \u2014 we enter passwords relatively often, but it\u2019s rare we have to answer security questions. Even if you remember the name of your first-grade teacher when you\u2019re a teenager, you may have forgotten it by the time you\u2019re in your thirties \u2014 or sixties \u2014 so try not to choose questions whose answers you\u2019re likely to forget in a decade or two.<\/p>\n<p>4. <b>Simplicity<\/b> \u2014 some questions have multiple correct answers. Where was your first kiss? That might be \u201cNew York,\u201d \u201cNew York City,\u201d \u201cNYC,\u201d \u201cCentral Park,\u201d or at least a few other options. Don\u2019t give yourself easy options to fail; avoid questions you might answer in a variety of ways.<\/p>\n<p>5. <b>Choice multiplicity<\/b> \u2014 questions that require \u201cyes\u201d or \u201cno\u201d answers are terrible. Even a stranger has a 50% chance of guessing right! Good security questions can be answered in infinite ways \u2014 and you should be the only person who knows the right answer.<\/p>\n<h3>Beware social media phishing<\/h3>\n<p>You\u2019ve probably seen some social media surveys or quizzes inviting you to wax nostalgic and share the \u201cfirst 7 places I worked\u2026\u201d or \u201cyour first airplane trip\u2026.\u201d Those are a treasure trove for social engineers. Actually, they often originate with criminals.<\/p>\n<p><a href=\"https:\/\/www.facebook.com\/howardgr\/posts\/10153905111253178\"><img decoding=\"async\" class=\"aligncenter wp-image-13007 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/09\/06021557\/myfirstsevenjob-flashmob-is-bad.jpg\" alt=\"How I hacked my Apple ID security questions\" width=\"504\" height=\"347\"><\/a><\/p>\n<p>If you want, you can change the answer to even the worst security question ever such that nobody could guess it \u2014 what is your mother\u2019s maiden name? XCU*(&amp;S1042! \u2014 but of course, you need to be careful not to confuse yourself as well.<\/p>\n<p>As a better option, you might take the maiden name <strong>Woodhouse<\/strong> and strip it down to the consonants: <strong>wdhs<\/strong>. Evenly intersperse the birth date 04.08.80 to get <strong>04wd08hs80<\/strong>. Not a brilliant trick, but much better than the original.<\/p>\n<p>This kind of method is best for those security questions you have to answer often \u2014 for example, when you call your bank. If you have to remember it from time to time, the combination will stay fresh in your memory.<\/p>\n<p>Ultimately, however, there are better ways to protect your accounts than security questions \u2014 for example, <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">two-factor authentication<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why questions like \u201cWhat is your mother\u2019s maiden name?\u201d and \u201cWhat did you do last summer?\u201d don\u2019t protect you.<\/p>\n","protected":false},"author":522,"featured_media":13005,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1600,1161,363,43,97,1805],"class_list":{"0":"post-13004","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple-id","9":"tag-finance","10":"tag-personal-data","11":"tag-privacy","12":"tag-security-2","13":"tag-security-questions"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-questions-are-insecure\/13004\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-questions-are-insecure\/7658\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-questions-are-insecure\/7660\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-questions-are-insecure\/7687\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-questions-are-insecure\/9102\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-questions-are-insecure\/8950\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/security-questions-are-insecure\/2438\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-questions-are-insecure\/6075\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/security-questions-are-insecure\/6557\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/security-questions-are-insecure\/5398\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/security-questions-are-insecure\/8723\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-questions-are-insecure\/12630\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-questions-are-insecure\/13004\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-questions-are-insecure\/13004\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apple-id\/","name":"Apple ID"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13004"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13004\/revisions"}],"predecessor-version":[{"id":30152,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13004\/revisions\/30152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13005"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}