How hackers get passwords - and ways you can protect yours
From sophisticated programs to simple guesswork, there are many ways hackers steal passwords. No matter how your password lands in the hands of a cybercriminal, a hacked email account can be a real headache with often unforeseen consequences. Discover how to protect yourself from the most common methods of password theft.
So that hackers don't stand a chance, take a few minutes to learn about the methods they use to steal passwords – and, most importantly, how you can protect yourself.
Six popular methods of password theft:
?1. Guessing weak passwords
One common way to crack a password is simply to guess it. It’s not even all that hard. That’s because many of us want a password that will be easy to remember, so we often use the names of pets, children or spouses, not to mention dates like wedding anniversaries and numbers such as ZIP codes. The problem is that much of this information can be found on social media or through a quick internet search.
Such passwords are also easy targets for anyone who knows some personal details about you – friends, family members, coworkers… Although it may be as harmless as your kid cracking the Netflix password to get some extra screentime, just think of the damage an angry ex-partner or a disgruntled former colleague could do with your email or social media password.
In many cases, no particular personal knowledge is even needed to guess a password. If you use a weak yet widespread password such as “123456,” “Password,” or “qwerty” you can be fairly certain that it can be cracked quickly by the first person who puts their mind to it.
How to protect yourself against someone guessing your password:
?2. Dictionary and brute force attacks
Cybercriminals use algorithms that systematically test all kinds of number and letter combinations to hack passwords. It's all about trial and error – but on a grand scale. This is not a case of a hacker sitting in front of a computer and painstakingly typing in one word after another – if that was necessary, a lot of time and luck would be needed to actually land in an account. Instead, special automated hacking programs in conjunction with very powerful computers are used to enter thousands of potential passwords per second.
In a?dictionary attack, dictionaries such as Merriam-Webster or Oxford are used by hackers as “password lists.” After all, dictionaries contain thousands of words that people use as passwords. So they can be used to try out as many passwords as possible, as quickly as possible.
Similarly, in a?brute force attack, the hacking program simply tries out as many random character combinations as possible in as short a time as possible. Studies have shown that with this method, it takes just 0.03 seconds to crack a password with five characters (three letters, two numbers).
How do you protect yourself against automated password attacks?
3. Phishing for passwords
Phishing is one of the most common ways that hackers gain access to other people’s login data. Phishing emails often contain links that lead to fake websites designed to trick you into entering your password. This works by imitating a message from a trusted sender, like your bank, a parcel service, or a well-known online retailer. The types of phishing tricks used by scammers are too numerous to list, but what they generally have in common is that they create a sense of urgency that immediate action is required on your part. For example, they might claim that a payment is overdue, so you need to log in to the website to correct the error or you will have to pay a late fee.
In other cases, phishing mails contain attachments infected with malware that can be used to spy out your passwords, as explained below.
领英推荐
How do you protect yourself from password phishing?
4. Malware on your computer
Hackers can also make use of?malware?to spy on you when you type in your passwords and other login details. With the help of a kind of spyware known as a keylogger program, you are tracked while typing on the infected device. By recording your keystrokes, the hacker can steal your passwords and other sensitive data and use it to access your accounts, including email, social media and online banking.
Sounds scary, right? And how does this malware get into your device in the first place? There are several possibilities. As we explained earlier, scammers might place links in phishing emails or on fake websites that trigger a malware download if you click on the link. Sometimes malware can also be hidden in a program that you download voluntarily, e.g. you download software online that turns out not to be as trustworthy as you thought.
How do you protect yourself against spyware?
As a general rule, you should always exercise caution on the internet! Always think twice before opening websites or using applications recommended to you by strangers or unknown sources on the internet. In addition:
?5. Physical theft and spying (shoulder surfing)
We have all been told to make sure that no one sees us entering our debit card PIN, but the same applies to your passwords. When you are working on your laptop in a café or on the subway, anyone could be watching over your shoulder as you login into an online account.?The process of spying out passwords in public is common enough to have its own name – “shoulder surfing.”
Writing passwords on a Post-it stuck to your screen or keyboard also opens you up to password theft. And the same applies to saving your passwords in the web browser of a shared or public computer.
How do you protect yourself against shoulder surfing?
6. Passwords leaked in data breaches
It seems like at least once a year there’s a report of a major data breach in which a large company loses the passwords, logins and other personal data of its customers. Hackers break into corporate databases and servers to steal this information to use in scams or sell on the Dark Web to identity thieves and other cybercriminals.
How can you protect yourself in case of a data breach?
Why not take some time today to make sure your passwords are safe? And if you still don't have a mail.com account, you can?create your free email address here.
Images: 1&1/Shutterstock