5 tricks to steal your passwords you must know to protect yourself
Common password theft tricks
The keys We can say that it is our main security barrier to prevent hackers in our accounts. If they steal the password, they will have access and that means our data can be exposed, they can control, make payments on our behalf, impersonate in the mail…
An obvious example of the strategy hackers use to steal passwords is the use of phishing attacks. What exactly does it consist of? We can say it’s a way they want to impersonation From an official page, such as a social network, a bank, an email … the victim enters this site and, by entering the password, is actually sent to a server controlled by the attackers.
Avoiding phishing attacks is easy. The main thing is to maintain common sense, double-check the addresses of the web pages where you will put the data and never reach it through links that you receive via SMS or email.
Another very common trick they use to steal passwords is to simply use guesswork. It is very common for many users to use the . extension same type of password. That is, for example 123456 and the like. Although it is a huge mistake, the truth is that it is still widely used because it is very easy to remember.
Hackers know this and can try to guess those most typical keys. Also things like the victim’s name, date of birth, etc. In short, the usual things they can use.
Something similar to divination is the use of brute force. They can use the tools to crack weak passwords. Basically what they do is try various possibilities until they find the right option and thus can access a social network, email or any internet history.
To prevent this from happening, it is necessary to use a strong password. It is important that it is completely random, that it does not contain anything that could relate to you (such as your name or date of birth), and that it is of a suitable length. Entering a single number or other letter can make this password more secure.
In addition, they can also use keyloggers. it’s a Malware type It is responsible for recording all the keystrokes we make. This way you can find out what password we use to enter any of the records we have on the Internet. They can sneak through fake software that we install or some files that we download from the Internet.
The best thing to avoid this is to always have a good antivirus. In addition, installing only official applications is necessary to avoid problems and use programs that may have been maliciously modified.
Stealing from another account
Another trick is to get a password via Another stolen account. For example, you might have been registered to some internet forum and there were some security holes. The attacker gained access to this password and what he can do is test whether it is the same password to enter Facebook, Gmail or any other service. you can always Use Has Been Pwned To see if your passwords have been stolen.
To avoid this problem, the ideal option is to use a unique key in each case. It is important to use a password for mail, another for social networks, etc. This way you will avoid the domino effect in case an intruder steals some.
“Pop culture advocate. Troublemaker. Friendly student. Proud problem solver.”