• Latest
  • Trending
Line of codes

The subtle art of winning the password game against hackers

Instagram

How to request verification on Instagram

How to change your Zoom background

How to set up visual voicemail on iPhone

How to set up visual voicemail on iPhone

How to force close apps on Android

Want an undo tweet on Twitter, you’ll have to pay for it

Twitter account

Twitter wants you to watch YouTube video from a tweet

How to restore backup to an iPhone or iPad

How to soft and force restart an iPhone

How to soft and force restart an iPhone

How to factory reset an iPhone or iPad

How to factory reset an iPhone or iPad

How to create an Apple ID account on any device

How to create an Apple ID account on any device

Activate Google 2FA

How to delete a Google Account

How to use Facebook Messenger Room for video chat

How to use Facebook Messenger Room for video chat

  • Best Products
  • Buying Guide
  • Reviews
Friday, April 16, 2021
  • Login
Techvocast
  • Best Products
  • Buying Guide
  • Good Deals
    • Accessories Deals
    • Phones Deals
    • Under 50
  • How To
    • Internet
  • News
    • Gaming
    • Industry
    • Rumors
  • Reviews
No Result
View All Result
  • Best Products
  • Buying Guide
  • Good Deals
    • Accessories Deals
    • Phones Deals
    • Under 50
  • How To
    • Internet
  • News
    • Gaming
    • Industry
    • Rumors
  • Reviews
No Result
View All Result
Techvocast

The subtle art of winning the password game against hackers

We have reached a stage where it is almost like no account is secure anymore

Chris JonesbyChris Jones
August 22, 2020 12:40 pm
Line of codes

Image credit: pixabay

Share on FacebookShare on TwitterShare on LinkedInShare on RedditShare on Pinterest

Hackers are on the prowl, and there seems to be nothing being done about it. With the advancement of technology comes a promise of better security, but is not the case all.

While it might not look like it, though you can beat hackers at their own game. Before we go into that, it is important to look at why that is worth consideration at all.

The Deplorable State of Account Security

We have reached a stage where it is almost like no account is secure anymore. Depending on the motive of a hacker, and how much they want to get into the account, chances are that they will get into it.

That is not helped by users too. In a time when security is as advanced as it is, a shameful find is one of the users still embracing simple passwords like ‘12,345,’ ‘password’ and the likes. It is almost like no one is even trying to be safe.

An IBM study also confirmed that looking to the future for better password security might not cut it, more young employees are found to have way poorer password habits than the older ones. If that is anything to go by, there is a sharp decline there, and the next set of young employees/ people will continue the trend.

Likewise, trusting your passwords to big companies is not always a great move. They do their best to ensure your passwords are safe, but they also have a big target on their back. That is why we have seen as much as 3 billion accounts get hacked on Yahoo alone, and Uber is not left out with over 57 million breaches of both driver and rider data.

Now that we all know how serious hackers take the password business, how about we look at how they do it at all?

Subscribe to Techvocast Daily CAST for the interesting stories, and best reviews we write each day. Free Sign Up

The Many Faces of Hacking

The type of hack behind any account breach will depend on the level of sophistication of the involved hacker, and the passwords they are after. I list some of the most common attacks below:
null

1. Rainbow table attack

Most services now store user password data in the form of computer-generated codes called hashes. That makes it impossible for a hacker to get hold of the password database and know what the password is–since these hashes bear no semblance to the real password, and cannot be used in their stead either.

Check ThisOut

How to set up Google Account two-step verification process

6 ways to keep your Zoom meetings safe and secure

With a rainbow table, though, a hacker can reverse the hash and get what the actual password is.

2. Malware attack

This comes from loading infected applications and programs onto your device. It doesn’t matter if it is a smartphone, tablet or computer. As long as the device can take applications and programs, they can use this attack against it.

The hacker builds an app/ software and inputs malicious code into the build. They can also find already existent applications and modify them with these codes, offering them to the public as ‘cracked versions,’ or via any other name.

On installation, the lines of code kick into action. They could be programmed to take over the computer (some form of ransomware) or just record keystrokes (keylogger) from where a user’s password can be found out. Such malicious software could be left operational for even years without the user suspecting anything out of place.

3. Dictionary attack

Passphrases are the susceptible forms of passwords here.

The computer is fed a dictionary file that allows it to run through a combination of different words in the dictionary which could have been used in creating such a passphrase. It doesn’t need a supercomputer for such a hacker to get through as much as millions of combinations in mere minutes, and it won’t be long till every password for the list of accounts being hacked shows up.

4. Plain text attack

This is a fault of the service where an account was created.

Quite several platforms still prefer to store their user data in plain text locked inside their database. To their credit, though, they don’t go around giving everyone access to this database, but that is where hackers come in.

Using a variety of the tactics above or more, they will get into such a platform’s database. Since the user information was stored in plain text format already, they need not do more than make copies of this file to gain access to all accounts on that database.


Winning the Password Game

The above list is not exhaustive. Hackers can still employ any of hybrid attacks, brute force attacks, man-in-the-middle attacks and other forms of data breaching techniques.

The important thing, however, is staying safe against them.

Fortunately, you don’t have to give an arm and a leg to do that. For better password safety, you should:

  • Desist from creating your password yourself. This makes them predictable since every human is predictable to a large extent. Rather, use online password generators to create strong and unique passwords that will take several years to crack.
  • Don’t attempt to remember all your passwords. If you are using a password generator as recommended, there is a slim chance you will be able to memorize the combination anyway. Thus, get a password manager to handle all that. 
  • Never use the same password for over one account. In the case of any slip-up or breach, you don’t want the hacker using a single password as the key to your other accounts.
  • Do not share your passwords with anyone. No matter how secure they inherently are, sharing your passwords makes it more likely for a leak (of the password) to happen. 
  • Set up two-factor authentication on your accounts. That way, a hacker won’t be able to get in with only your password information
Tags: Password ManagerSecurity

Related Posts

Want an undo tweet on Twitter, you’ll have to pay for it

byTimothy Iyekowa

Twitter is reportedly testing an 'undo tweet' feature that lets you undo your tweet after few seconds of posting. For...

Twitter account

Twitter wants you to watch YouTube video from a tweet

byTimothy Iyekowa

The feature will allow users to watch videos easily without opening another app, just like another social massaging app like...

whatsapp disappearing message

WhatsApp new privacy policy is misinterpreted by its users

byTimothy Iyekowa

Many think WhatsApp's spy on their message. If you consider WhatsApp collect your data and share it with Facebook, it...

Signal Messenger

Signal Messenger: Everything you need to know about the messaging app

byTimothy Iyekowa

Signal recorded a high number of users joined the app in the last few weeks. And they want to keep...

10 popular Instagram scams you need to know

byTimothy Iyekowa

When you suspect something I suggest you start speaking out. Facebook isn't just where scammers get their prey from. The...

People are downloading Telegram and Signal against WhatsApp

People are downloading Telegram and Signal against WhatsApp

byTimothy Iyekowa

The update started last week, users now see the WhatsApp Terms of service update, and it causes a stair. The...

Online scamming: Email hijacking

2020 in scam: The coronavirus scams and others

byTimothy Iyekowa

The biggest scams and fraud threat of 2020 is from online and you need to regularly know how to avoid...

WhatsApp

WhatsApp will stop working on these smartphones: check if yours is on the list

byTimothy Iyekowa

WhatsApp will completely stop running on smartphone that has older OS. From 2021, WhatsApp says all iPhone currently running iOS...

Play Station 5 and a Block

A man bought PS5 on eBay, guess what, he got a concrete block instead

byTimothy Iyekowa

Someone somewhere just sold the most expensive concrete block of all time, and guess what! It was packed inside a...

Recommended

Google Authenticator

How to transfer Google Authenticator to a new phone

Huawei

Huawei announced to reveal its Mate 40 series on October 22nd

Google Workspace

Google unlimited Drive storage is no more in Workspace

Web hosting

Here is a quick list for web hosting company

Slack

How to activate dark mode for Slack

YouTube app

How to enable dark mode for YouTube

  • About
  • Contact
  • Newsletter
  • Tip Us
  • Terms of Use
  • Privacy Policy
  • Cookies Policy

© 2021 Techvocast. All Right Reserved

No Result
View All Result
  • Best Products
  • Buying Guide
    • Accessories Buy Guide
  • Good Deals
    • Accessories Deals
    • Phones Deals
    • Under 50
    • TV Deals
  • How To
    • Android
    • Internet
    • iPhones
    • Mac
    • Security
    • Windows
  • News
    • Industry
    • Gaming
    • Movies
    • Opinions
    • Rumors
  • Reviews
    • Laptops Reviews
    • Phones Reviews
  • Newsletter

© 2021 Techvocast. All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy and Cookie Policy.