Ways Computer Hackers Hack Your Passwords

Virus software and strong passwords are the average computer users’ best defense against being hacked. But even, with these security measures in place computer data can still be at risk. The impact may be simply annoying-a computer hacker hacking a yahoo, Gmail or hotmail account and spamming your contacts list–or truly devastating, if it is a bank account or credit account that is hacked. The first line of defense for the computer and internet user is knowing what they are up against. Below are five techniques used to hack passwords.

Brute Force Attack

A brute force attack is used when a computer hacker uses a hacking program to systematically work through each possible password combination until the correct password is found. The stronger, or more complex the password the better it is able to withstand a brute force attack.

Dictionary Attack

A dictionary attack is a hacking system used to break into password protected systems by using words contained in the dictionary. This is useful as many passwords consist only of letters, making them vulnerable to a dictionary attack by computer hackers. Protect against this type of attack by using multiple word or phrase passwords. Where a dictionary attack fails the computer hacker may try a brute force attack, which is more time consuming.

Key Logging

Keylogging software may be delivered onto your computer via a virus or Trojan. One version of keylogging then records all keystrokes on the computer, including the entry of userids and passwords and sends that data to a remote computer. The best defense against keylogging virus attacks is up to date computer virus software.

Phishing Attack

A Phishing attack involves the use of an email, usually spam, that leads the reader to believe there is an immediate need to check their, paypal, bank, brokerage or email internet accounts. The email directs the reader to a realistic looking imitation of the actual website that the computer hacker has developed. All keystrokes are recorded to obtain a list of user ID’s and passwords for use on the real site.

Accoustic Cryptopgraphy

Accoustic Cryptography refers to decoding keystrokes on a computer keyboard by using statistical and frequency analysis to determine which keys are being struck on a keyboard. Each key is differentiated by the sound it makes, providing the computer hacker with valuable password and userids.

Hybrid Attack

A hybrid attack involves a computer hacker using two hacking techniques in conjunction to produce a result faster. For example, a brute force attack may be limited to include only known dictionary attacks. Another technique is to first check password combinations obtained from pervious brute force attacks to increase the chance of a quick result.

Protection against hacking can be relatively inexpensive. Keep virus software up to date, and make sure you have strong passwords that are regularly changed.

Related Articles:

Five Steps to a More Secure Password

Five Ways to Protect Your Computer Data


People also view

Leave a Reply

Your email address will not be published. Required fields are marked *