Welcome to June
https://abs.twimg.com/emoji/v2/... draggable="false" alt="đ" title="Grinning face with smiling eyes" aria-label="Emoji: Grinning face with smiling eyes">
https://abs.twimg.com/emoji/v2/... draggable="false" alt="đ" title="Party popper" aria-label="Emoji: Party popper">
Because it& #39;s the 6th month of the year, we& #39;ll be sharing some useful information in groups of 6.
Stay tuned!!!
#Thread
#June
Because it& #39;s the 6th month of the year, we& #39;ll be sharing some useful information in groups of 6.
Stay tuned!!!
#Thread
#June
In the past, weâve shed light on how to create strong passwords and how multi factor authentication can provide another layer of defence.
Today, weâll be explaining some of the ways passwords get hacked, as highlighted by the brilliant minds at @hackercombat
#Passwords
#Thread
Today, weâll be explaining some of the ways passwords get hacked, as highlighted by the brilliant minds at @hackercombat
#Passwords
#Thread
1. Interception happens when an attacker is able to capture your data in transit. Typically, they need to have access to your wireless network or the service you are connecting to. If your online connection isnât encrypted - which maskes the data you send, ...
#Passwords
#Passwords
... the attacker will be able to see & understand what you have sent.
So if you log into a non secure website, and the login data is intercepted, the attacker will know your username and password. The attacker in this scenario is also called a âMan-in-the-Middleâ
So if you log into a non secure website, and the login data is intercepted, the attacker will know your username and password. The attacker in this scenario is also called a âMan-in-the-Middleâ
2. Passwords can be stolen in many ways; eg: If you write it on sticky notes, in a diary or even a word document on your computer.
It can also be stolen from your browser by malware, and from your password manager by someone who knows your master password (highly unlikely).
It can also be stolen from your browser by malware, and from your password manager by someone who knows your master password (highly unlikely).
3. Social engineering happens when a user is pushed or tricked into doing something or divulging personal information. This can happen via email (phishing), voice (Vishing) or text (smishing), to name a few. The aim is usually to get login details or money from victims.
4. Brute forcing is the use of computers to attempt gaining access to an account by trying several (even millions of) passwords.
It uses dictionary words, known passwords from past data breaches, randomly generated passwords, customized word lists, and so on.
#Passwords
It uses dictionary words, known passwords from past data breaches, randomly generated passwords, customized word lists, and so on.
#Passwords
5. Key logging is the recording of keystrokes from a keyboard. It can be done using Software or hardware keyloggers. Software keyloggers (spyware) can also take screenshots & activate the webcam, making them more dangerous.
...
#Passwords
...
#Passwords
...
Hardware keyloggers have been seen on ATMs in Europe, where they capture the Card pins entered by users.
(Google âATM skimmersâ)
They can also be attached to desktops as the user may not regularly inspect the connections behind the CPU.
#Passwords
Hardware keyloggers have been seen on ATMs in Europe, where they capture the Card pins entered by users.
(Google âATM skimmersâ)
They can also be attached to desktops as the user may not regularly inspect the connections behind the CPU.
#Passwords
6. Shoulder surfing involves peeking to see someoneâs login credentials as they type it. Itâs common in offices, ATM queues, & even kids do it when adults are unlocking their devices.
An unusual method is via CCTV, especially in places where thereâs direct view on the cashier.
An unusual method is via CCTV, especially in places where thereâs direct view on the cashier.
Now that weâve explained the terms, let look at how we can make it more difficult for our passwords to be hacked.
In addition to not writing down your pin or password, and not sharing them with anyone, below are some more donts
#Passwords
In addition to not writing down your pin or password, and not sharing them with anyone, below are some more donts
#Passwords
Bonus content for following this thread so far... coincidentally, it also has 6 points
https://abs.twimg.com/emoji/v2/... draggable="false" alt="đ" title="Eyes" aria-label="Emoji: Eyes">
Consider the points in the image below, to gauge how secure your password is.
Note that password length and complexity are suggestions, but as they say, âlonger is betterâ.
#Passwords
Consider the points in the image below, to gauge how secure your password is.
Note that password length and complexity are suggestions, but as they say, âlonger is betterâ.
#Passwords
We hope you found the information worthwhile. Please go the extra mile; enlighten your Colleagues, friends, & family on these techniques and tips.
Remember to Stay Alert & Stay Safe.
Once again, welcome to June!
https://abs.twimg.com/emoji/v2/... draggable="false" alt="đ" title="Party popper" aria-label="Emoji: Party popper">
#June
#Passwords
Remember to Stay Alert & Stay Safe.
Once again, welcome to June!
#June
#Passwords