Hackers take passwords, email addresses, and user names they discover and try to sign in with them at other online services, which works surprisingly often. Different passwords for everything prevents it. The all-too-common scenario The scenario I’m about to describe is very common. While ...