In the past, we’ve shed light on how to create strong passwords and how multi factor authentication can provide another layer of defence.

Today, we’ll be explaining some of the ways passwords get hacked, as highlighted by the brilliant minds at @hackercombat

#Passwords
#Thread
1. Interception happens when an attacker is able to capture your data in transit. Typically, they need to have access to your wireless network or the service you are connecting to. If your online connection isn’t encrypted - which maskes the data you send, ...

#Passwords
... the attacker will be able to see & understand what you have sent.

So if you log into a non secure website, and the login data is intercepted, the attacker will know your username and password. The attacker in this scenario is also called a “Man-in-the-Middle”
2. Passwords can be stolen in many ways; eg: If you write it on sticky notes, in a diary or even a word document on your computer.

It can also be stolen from your browser by malware, and from your password manager by someone who knows your master password (highly unlikely).
3. Social engineering happens when a user is pushed or tricked into doing something or divulging personal information. This can happen via email (phishing), voice (Vishing) or text (smishing), to name a few. The aim is usually to get login details or money from victims.
4. Brute forcing is the use of computers to attempt gaining access to an account by trying several (even millions of) passwords.

It uses dictionary words, known passwords from past data breaches, randomly generated passwords, customized word lists, and so on.

#Passwords
5. Key logging is the recording of keystrokes from a keyboard. It can be done using Software or hardware keyloggers. Software keyloggers (spyware) can also take screenshots & activate the webcam, making them more dangerous.
...

#Passwords
...

Hardware keyloggers have been seen on ATMs in Europe, where they capture the Card pins entered by users.
(Google ‘ATM skimmers’)

They can also be attached to desktops as the user may not regularly inspect the connections behind the CPU.

#Passwords
6. Shoulder surfing involves peeking to see someone’s login credentials as they type it. It’s common in offices, ATM queues, & even kids do it when adults are unlocking their devices.

An unusual method is via CCTV, especially in places where there’s direct view on the cashier.
Now that we’ve explained the terms, let look at how we can make it more difficult for our passwords to be hacked.

In addition to not writing down your pin or password, and not sharing them with anyone, below are some more donts

#Passwords
We hope you found the information worthwhile. Please go the extra mile; enlighten your Colleagues, friends, & family on these techniques and tips.

Remember to Stay Alert & Stay Safe.

Once again, welcome to June! https://abs.twimg.com/emoji/v2/... draggable="false" alt="🎉" title="Party popper" aria-label="Emoji: Party popper">

#June
#Passwords
You can follow @cyberexpertsng.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: