Saturday, January 7, 2012

8 The 5 Most Common Tactics Used To Hack Passwords


When you think of a serious security threat, you may think of some clever malicious program that steals your data or takes over computer. In reality, you’re just as (if not more) likely to be hit by a much simpler breach – a hacked password.

Once someone has your password for an online account, they can use it however they like. There are a number of methods commonly used to obtain a password, and knowing them can help you protect yourself.

Trying Common Passwords:


Any hacker trying to break through a password will first try the most common passwords in the book. Silly though it may seem, a disturbingly large number of people rely on passwords that consist of just a few common numbers of letters. Even the word “password” is commonly used as a password.

Hackers know this, and can reference common passwords to try and gain entry. Though it won’t work on most passwords, it works frequently enough to be worth a try. If successful, the hacker can lean back and sip his Mountain Dew.

How to Protect Yourself: This one is simple. Don’t use common passwords. This includes single words, popular phrases, and simple combinations of a particular character type (like numbers). Even passwords like “superman” and “dragon” are common enough to earn mention in some studies of commonly used passwords.


Social Engineering:


If commonly used passwords don’t work, and a hacker knows the owner of the password they’re trying to bypass, social networking can be used to try and figure out what the password might be.

Hackers know that people who don’t use common passwords are still likely to use passwords that have some personal significance. The password might be the name of a pet or a favorite TV show. Such information is often included on social networking profile.

Should trying this tactic still not work, the information available on a social network can be used to construct phishing attacks. Perhaps the target lists that they play a popular online game. A fake email could then be sent asking for password information or linking to a site where password information must be entered.

How to Protect Yourself: There are two steps you can take here. One is to make your social network private to people who are not your friends, and the second is to make sure that you don’t use information about your personal life to form a password.

The Weakest Link

Should a hacker still fail to guess a password, they’ll have to start breaking out some true hacking skill – but perhaps not much. Most people use the same password on multiple sites, and many use just one password for everything. Hackers know this, and they also know that many sites have weak security.

Using the information found while reviewing your social networking profiles, a hacker may be able to identify sites you visit. Some are sure to be heavily guarded. Others, however, probably aren’t. They may be vulnerable to simple exploits that allow for the retrieval of stored passwords, and the owners may never even realize they were hacked. Alternatively, a brute force attack might be used.

How to Protect Yourself: Don’t use a single password for every website. Ideally you should use a different password for every site, but that can be difficult. A compromise you might find effective is to use the same password for low security risks, like a blog you visit and comment on, but use unique passwords to protect more important accounts, like your web mail. Yet another option is to use a password manager.

Sniffing Wi-Fi Packets:

Open wireless networks can be a nasty security issue because they are – well – open. Information transmitted on them can be picked up by anyone within range of the network, and that includes passwords.

Wi-Fi sniffing can be utilized either personally or impersonally. If someone is trying to hack your passwords specifically, they might see if you frequently visit a place with open Wi-Fi, like a coffee shop. Or a hacker might just set up an operation in such a location and pick up as many passwords as possible.

How to Protect Yourself: One answer is to just not use open Wi-Fi, but that’s not a realistic expectation for everyone. If you do use open Wi-Fi, make sure that you do not log in to sensitive accounts. If you have varied your passwords, you’ll be safe if a hacker obtains your less sensitive passwords. Also use HTTPS whenever possible. Many sites can use it, but some offer it only as an option.

KeyLogging:

Like sniffing Wi-Fi

keylogging can be used personally or impersonally. Using information gained about you while attempting to guess your password, a hacker might find a way to send you a file that you think is legitimate but actually contains a keylogger. Once installed, it can detect your passwords as you enter them.

A keylogger can also be installed as a part of any piece of malware to hack passwords. The information can then be transmitted to a location where it is compiled and passwords found. Such wide-scale keylogging attacks don’t focus on any particular person, but can be just as damaging.

How to Protect Yourself: Security software can help detect keyloggers and prevent them from being installed on your system. You can find effective solutions for free, so there’s no reason to skip it.

Conclusion

Do you have any tips that can help beef up password security? Let us know in the comments. Makeuseof readers are likely to be a bit more security-aware than the average, but nobody is perfect. Sharing information can help us keep our passwords as strong as possible.




8 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. Wow, that was strange. I just wrote a really long comment but after I clicked submit my comment didn't show up. Grrrr... well, I'm not writing all that over again. Anyways, just wanted to say fantastic blog!
    cash for cars gold coast
    cash for car removal gold coast

    ReplyDelete
  4. Great post. People out there who are looking for car recyclers can contact GDM Wrecking. GDM wrecking actively buys all types of cars and offer used car parts for all models such as Mitsubishi, Nissan, Holden, Toyota, Mazda, Ford, Hyundai etc.
    Car wreckers
    used spare parts

    ReplyDelete
  5. Local car buyer, a platform where you can get top cash for all types of vehicles. We are buying cars for cash from Brisbane, Gold coast, Canberra, Perth, Melbourne etc. We ensure quick car selling with free removal at the comfort of your home.

    cash for car Brisbane
    cash for car Gold coast

    ReplyDelete
  6. If you have an old car you’re looking to be rid of, why not drop it off to the team at Perth Auto Wreckers? We’re the Perth car parts experts when it comes to the sustainable and thoughtful disposal of scrap vehicles that can be repurposed for their auto parts. Give us a call today on 0427 399 677 or contact us here.

    ReplyDelete
  7. A very awesome blog post. We are really grateful for your blog post. You will find a lot of approaches after visiting your post. used auto parts

    ReplyDelete
  8. Hello I am so delighted I located your blog, I really located you by mistake, while I was watching on google for something else, Anyways I am here now and could just like to say thank for a tremendous post and a all round entertaining website. Please do keep up the great work. 먹튀검증

    ReplyDelete

 

Creative Brains Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates