Summary

  • PASSWORDS: It is common knowledge that the best passwords are complex and “strong”.
  • This usually means that they should include a mixture of uppercase and lowercase letters, numbers, and special characters, and the more characters there are, the better.
  • However, it is important to note that even the most intricate passwords have their vulnerabilities.
  • This article explains some of the situations where, even if the attacker is not able to guess your password, they can still gain access to your accounts.
  • PHISHING ATTACKS: these are when an attacker tricks the user into believing that they are communicating with a trusted party, when in reality they are not.
  • The attacker will typically ask for password details or provide a link for the user to enter their details on a website which resembles the legitimate site.
  • KEYLOGGERS: These can often be hardware or software and are used to record keystrokes to obtain sensitive information.
  • Even if your passwords are strong, keyloggers can steal your information right from under your nose.
  • Other points highlighted in the article include credential stuffing and the threats of malware and social engineering.

By Gavin Phillips

Original Article