Home | Goldstreet Business
Wednesday, March 29, 2023
  • Home
  • General News
    • Extractives
    • Auto
  • Business
    • Banking and Finance
    • AgriBusiness
    • Insurance
    • Mining
    • Oil and Gas
    • Real Estate/Housing
  • News
    • Top Stories
    • Agriculture
    • Maritime/Aviation
    • Energy
    • Education
    • Construction
  • Technology
    • ICT
    • Telecom
  • World
    • Africa
    • International
  • Editorial/Features
  • GSB Data Services
No Result
View All Result
  • Home
  • General News
    • Extractives
    • Auto
  • Business
    • Banking and Finance
    • AgriBusiness
    • Insurance
    • Mining
    • Oil and Gas
    • Real Estate/Housing
  • News
    • Top Stories
    • Agriculture
    • Maritime/Aviation
    • Energy
    • Education
    • Construction
  • Technology
    • ICT
    • Telecom
  • World
    • Africa
    • International
  • Editorial/Features
  • GSB Data Services
No Result
View All Result
Gold Business Logo
No Result
View All Result
Home Technology

3 Tactics Hackers Use to Steal Passwords

May 8, 2021
in Technology, Telecom, Top Stories
0
Share on FacebookShare on Twitter

Passwords, a basic yet essential part of cybersecurity, are the first line of defence against cyberattacks in our increasingly digital world. However, according to research from Check Point Software, many users are under the false impression that cybercriminals have no interest in their personal information or data on their computers.

And it is for this reason that the robustness and strength of passwords are more important now than ever. With that in mind – thanks to Checkpoint – here are three of the tactics used to steal passwords along with the necessary steps to prevent any person from becoming a victim of cybercrime:

RELATED POSTS

I came to resolve Africa challenges – US Vice President

Ghana records $752.8m trade surplus in first 2 months of 2023

1. Phishing attacks

This method has become one of the most widely used tactics for stealing passwords and usernames. It works in a simple way: by sending an email that appears to come from a trusted source (such as banks, energy companies, etc.), but aims to manipulate the recipient and extract confidential information.

An example of a successful phishing attack was the data breach at Experian, where a fraudster purported as a legitimate client obtained the personal information of as many as 24 million South Africans and nearly 793,749 business entities.

One of the best ways to prevent a phishing attack is by implementing a two-step authentication. This extra layer of security prompts the user to enter a second password, which is usually sent via SMS. This way, access to an account is prevented even if they have the user’s credentials.

2. Brute-force or dictionary hacking

This type of cyber-attack involves trying to crack a password through repetition. The cybercriminals will try multiple random combinations, combining names, letters, and numbers, until they gain access.

To prevent them from achieving their goal, it is essential that users create complicated and complex passwords that cybercriminals would never be able to guess randomly.

To do this, it is necessary to leave out names, dates, and common words. Instead, it is best to create a unique password of at least eight characters that combine letters (both upper and lower case), numbers and symbols.

3. Keyloggers

These programmes are capable of recording every keystroke made on a computer and even record what is displayed on the screen. This information is then sent and stored on external servers, then used by cybercriminals.

These cyber-attacks are commonly part of malware that is been previously installed on a computer. The worst thing about these attacks is that many people often use the same password for different user accounts.

To prevent this, it is essential to use a different password for each profile or account. A password manager can be used to do this, which allows both managing and generating different and robust password combinations for each service based on the guidelines decided upon.

facebookShare on Facebook
TwitterTweet
Source: Goldstreet Business
Tags: HackersKeyloggersPhishing attacks
ShareTweetShare

Related Posts

I came to resolve Africa challenges – US Vice President

I came to resolve Africa challenges – US Vice President

March 27, 2023
Ghana records $752.8m trade surplus in first 2 months of 2023

Ghana records $752.8m trade surplus in first 2 months of 2023

March 27, 2023
The Power of Community in Entrepreneurial Success and Our Call to Action

The Power of Community in Entrepreneurial Success and Our Call to Action

March 27, 2023
Restore confidence in the economy — GUTA 

Restore confidence in the economy — GUTA 

March 22, 2023
Ghana’s economic outlook to remain negative until fiscal economy improves – Fitch

Fitch upgrades Ghana’s rating to ‘CCC’

March 22, 2023
Next Post

GNPC Foundation celebrates 17 awards in 2020

GOIL takes giant step into bitumen production

Discussion about this post

Archives

<
March 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
▼
>
MonTueWedThuFriSatSun
  12345
6789101112
13141516171819
20212223242526
2728293031  
       
  12345
6789101112
13141516171819
20212223242526
2728     
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     
   1234
567891011
12131415161718
19202122232425
262728293031 
       
 123456
78910111213
14151617181920
21222324252627
282930    
       
     12
3456789
10111213141516
17181920212223
24252627282930
31      
   1234
567891011
12131415161718
19202122232425
2627282930  
       
1234567
891011121314
15161718192021
22232425262728
293031    
       
    123
45678910
11121314151617
18192021222324
25262728293031
       
  12345
6789101112
13141516171819
20212223242526
27282930   
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     
    123
45678910
11121314151617
18192021222324
252627282930 
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
 123456
78910111213
14151617181920
21222324252627
28      
       
     12
3456789
10111213141516
17181920212223
24252627282930
31      
  12345
6789101112
13141516171819
20212223242526
2728293031  
       
1234567
891011121314
15161718192021
22232425262728
2930     
       
    123
45678910
11121314151617
18192021222324
25262728293031
       
  12345
6789101112
13141516171819
20212223242526
27282930   
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     
   1234
567891011
12131415161718
19202122232425
262728293031 
       
 123456
78910111213
14151617181920
21222324252627
282930    
       
     12
3456789
10111213141516
17181920212223
24252627282930
31      
   1234
567891011
12131415161718
19202122232425
2627282930  
       
1234567
891011121314
15161718192021
22232425262728
293031    
       
1234567
891011121314
15161718192021
22232425262728
       
       
    123
45678910
11121314151617
18192021222324
25262728293031
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
      1
2345678
9101112131415
16171819202122
23242526272829
30      
   1234
567891011
12131415161718
19202122232425
262728293031 
       
 123456
78910111213
14151617181920
21222324252627
282930    
       
     12
3456789
10111213141516
17181920212223
24252627282930
31      
  12345
6789101112
13141516171819
20212223242526
2728293031  
       
1234567
891011121314
15161718192021
22232425262728
2930     
       
    123
45678910
11121314151617
18192021222324
25262728293031
       
  12345
6789101112
13141516171819
20212223242526
27282930   
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     
     12
3456789
10111213141516
17181920212223
242526272829 
       
  12345
6789101112
13141516171819
20212223242526
2728293031  
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     
    123
45678910
11121314151617
18192021222324
252627282930 
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
      1
2345678
9101112131415
16171819202122
23242526272829
30      
   1234
567891011
12131415161718
19202122232425
262728293031 
       
1234567
891011121314
15161718192021
22232425262728
293031    
       
     12
3456789
10111213141516
17181920212223
24252627282930
       
  12345
6789101112
13141516171819
20212223242526
2728293031  
       
1234567
891011121314
15161718192021
22232425262728
2930     
       
    123
45678910
11121314151617
18192021222324
25262728293031
       
    123
45678910
11121314151617
18192021222324
25262728   
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
     12
3456789
10111213141516
17181920212223
24252627282930
31      
   1234
567891011
12131415161718
19202122232425
2627282930  
       
1234567
891011121314
15161718192021
22232425262728
293031    
       
     12
3456789
10111213141516
17181920212223
24252627282930
       
  12345
6789101112
13141516171819
20212223242526
2728293031  
       
      1
2345678
9101112131415
16171819202122
23242526272829
3031     
    123
45678910
11121314151617
18192021222324
252627282930 
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
      1
2345678
9101112131415
16171819202122
23242526272829
30      
   1234
567891011
12131415161718
19202122232425
262728293031 
       

RECOMMENDED

I came to resolve Africa challenges – US Vice President

I came to resolve Africa challenges – US Vice President

March 27, 2023
South African Rand Declines Against Rising Dollar

South African Rand Declines Against Rising Dollar

March 27, 2023

MOST VIEWED

Plugin Install : Popular Post Widget need JNews - View Counter to be installed
  • Energy
  • Health
  • Auto
  • International
  • Subscription Form
  • Staff Webmail
  • About Us
  • Contact Us
Call us: +233 24 432 0902 | info@goldstreetbusiness.com

© Copyright © 2020 goldstreetbusiness.com. All Rights Reserved.

No Result
View All Result
  • Homepages
    • Homepage Layout 1
    • Homepage Layout 2
  • World
  • Business
  • Technology
  • Health

© Copyright © 2020 goldstreetbusiness.com. All Rights Reserved.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.