create account

How Exactly Do Passwords Get Stolen? Hacking Isn't As Hard As Most Would You Think. by guineapig

View this thread on: hive.blogpeakd.comecency.com
· @guineapig · (edited)
$19.15
How Exactly Do Passwords Get Stolen? Hacking Isn't As Hard As Most Would You Think.
<center>http://infactcollaborative.com/wp-content/uploads/2011/11/Cyber-bullying-facts-Stolen-password.jpg</center>
Odds are that the keys to your car or your house are never too far from your sight since having them stolen would mean. Breaking a window to get back in or calling a lockout service at best or i guess there's the worst case scenario of having someone be able to go into your house rifle through all your stuff and drive off in your VW bus or whatever it is you used to get around. Fortunately keeping track of a single physical key or a few on a keychain isn't too hard. But online passwords can be a little bit trickier to manage. As the fact that many users have tons of them to keep track of and the fact that they're stored on a bunch of server somewhere instead of being a physical thing you carry around in your pocket gives miscreants more opportunities to pry into your online life. 
<hr>
<h1>But how exactly do passwords gets stolen? </h1>
<center>http://betanews.com/wp-content/uploads/2015/07/terrorist_hacker-600x381.jpg</center>
I mean very supposed to be encrypted right. Well Yes! But you might be surprised to know that many times passwords aren't stolen by some crack group of cyber criminals using super fancy hacking techniques. But are instead harvested through social engineering methods. 

<center><h1>1. Phishing </h1>
http://www.entrepreneur-resources.net/wp-content/uploads/2016/06/Phishing.jpg</center>
Where the bad guys will straight up asked for someone else's password. This usually takes the form of a Phishing attempt. For some now content will send you an email or a steam message that claims to be from your isp or your bank or valve, Asking you to send your login credentials for some vague security-related reason. 
<hr>
<center><h1>2. Tab Napping</h1>
https://mtekk.us/wp-content/uploads/real_fake_TCF-990x556.jpg</center>
There's a similar concept to called tab napping, where you will actually get redirected to a fake website that's built to look as much like the real thing as possible, Where are you well enter your login information because the page looks official. 
<hr>
<center><h1>3. Keyloggers</h1> 
http://the-best-keylogger.keyloggers.com/screenshot/149/max-01.jpg</center>
Even if your tech-savvy are smart enough to realize what's going on when you see a phishing attempt's actually still quite easy to inadvertently click link in scam email ' or dodgy websites, That install key loggers onto your system and everything you type including passwords back to an attacker. That's how i got nabbed. Keyloggers don't require a whole lot of technical expertise to use making them a popular choice for amateur online thieves and then once someone unscrupulous has your username and password combo. It's quite easy for them to use automated tools that will try your credentials on lots of different websites. And since statistics have shown us that over half of all internet users we use the same password on multiple sites. There is a distinct possibility that if your password for one site is stolen your other accounts could be compromised as well. 
<hr>
<center><h1>But let's suppose you're quite careful about Phishing and suspicious links and you use a unique password for every site exactly how safe are you?</h1>
https://img.ifcdn.com/images/d26dedbfc10c567924dc184b7774df47229e70caf4bc8cbbb3106f4fa8118d80_1.jpg</center>
Well if an attacker exploit vulnerabilities in a server security and is able to find encrypted passwords they could break the encryption if it's not sufficiently strong or if the password themselves aren't very long. A common way that password dumps that leaked your credentials to the entire internet can happen. Even a mid-range modern home computer can guess millions of passwords per second and billions if it uses a discrete graphics card meaning that many passwords can be cracked within just a few days or even hours, if you're using commonly used words or phrases.  Password like qwerty and 123456 are terrible ideas and yet they're used all too often and are very easy for attackers to guess. So maybe don't put those questionable conversations you had with your ex behind a password that week.
<hr>
Maybe After reading this post you might me thinking How secure is my password?. Well don't worry i already posted a blog on How to choose a Secure Password With the Help of Salting And Pseudo Random Passwords. For reading this post click the link below.

https://steemit.com/security/@guineapig/how-to-choose-a-secure-password-with-the-help-of-salting-and-pseudo-random-passwords

Image Credits -  <a href="http://infactcollaborative.com/wp-content/uploads/2011/11/Cyber-bullying-facts-Stolen-password.jpg">1</a>  <a href="http://betanews.com/wp-content/uploads/2015/07/terrorist_hacker-600x381.jpg">2</a>  <a href="http://www.entrepreneur-resources.net/wp-content/uploads/2016/06/Phishing.jpg">3</a>  <a href="https://mtekk.us/wp-content/uploads/real_fake_TCF-990x556.jpg">4</a>  <a href="http://the-best-keylogger.keyloggers.com/screenshot/149/max-01.jpg">5</a>  <a href="https://img.ifcdn.com/images/d26dedbfc10c567924dc184b7774df47229e70caf4bc8cbbb3106f4fa8118d80_1.jpg">6</a>

Thanks for reading.... Follow me @guineapig
<hr>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 24 others
properties (23)
authorguineapig
permlinkhow-exactly-do-passwords-get-stolen-hacking-isn-t-as-hard-as-most-would-you-think
categorysecurity
json_metadata{"tags":["security","hacker","howto","password","life"],"users":["guineapig"],"image":["http://infactcollaborative.com/wp-content/uploads/2011/11/Cyber-bullying-facts-Stolen-password.jpg","http://betanews.com/wp-content/uploads/2015/07/terrorist_hacker-600x381.jpg","http://www.entrepreneur-resources.net/wp-content/uploads/2016/06/Phishing.jpg","https://mtekk.us/wp-content/uploads/real_fake_TCF-990x556.jpg","http://the-best-keylogger.keyloggers.com/screenshot/149/max-01.jpg","https://img.ifcdn.com/images/d26dedbfc10c567924dc184b7774df47229e70caf4bc8cbbb3106f4fa8118d80_1.jpg"],"links":["https://steemit.com/security/@guineapig/how-to-choose-a-secure-password-with-the-help-of-salting-and-pseudo-random-passwords","http://infactcollaborative.com/wp-content/uploads/2011/11/Cyber-bullying-facts-Stolen-password.jpg","http://betanews.com/wp-content/uploads/2015/07/terrorist_hacker-600x381.jpg","http://www.entrepreneur-resources.net/wp-content/uploads/2016/06/Phishing.jpg","https://mtekk.us/wp-content/uploads/real_fake_TCF-990x556.jpg","http://the-best-keylogger.keyloggers.com/screenshot/149/max-01.jpg","https://img.ifcdn.com/images/d26dedbfc10c567924dc184b7774df47229e70caf4bc8cbbb3106f4fa8118d80_1.jpg"]}
created2016-10-26 19:01:18
last_update2016-10-26 19:02:39
depth0
children0
last_payout2016-11-27 02:47:57
cashout_time1969-12-31 23:59:59
total_payout_value14.406 HBD
curator_payout_value4.743 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length5,228
author_reputation11,016,790,366,434
root_title"How Exactly Do Passwords Get Stolen? Hacking Isn't As Hard As Most Would You Think."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id1,626,704
net_rshares36,832,245,605,300
author_curate_reward""
vote details (88)