• About Us
    • — About Digitized House
    • — Editorial Guidelines
  • Policies
    • — Ad Policy
    • — Privacy Policy
    • — Cookie Policy (US)
Thursday, May 8, 2025
  • Login
Digitized House Reviews
  • Alexa
  • Apple HomeKit
  • Google Home
  • SmartThings
  • Smart Components
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Shades
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
  • About + Policy
    • About Us
    • Copyright Notice
    • Privacy Policy
    • Advertising, Affiliate Link, and Sponsorship Policy
No Result
View All Result
  • Alexa
  • Apple HomeKit
  • Google Home
  • SmartThings
  • Smart Components
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Shades
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
  • About + Policy
    • About Us
    • Copyright Notice
    • Privacy Policy
    • Advertising, Affiliate Link, and Sponsorship Policy
No Result
View All Result
Digitized House Reviews
No Result
View All Result
Home Featured Articles

4 Most Common Password Attacks and How to Protect Against Them

Chris Jones by Chris Jones
12 August 2019
in Featured Articles, How-To, Privacy & Safety, Secure Home, Smart Homes, Smartphones
Reading Time: 6 mins read
Hackers work hard to get around security, but you can thwart them by being smarter with your credentials. Image: Pixabay.

Hackers work hard to get around security, but you can thwart them by being smarter with your credentials. Image: Pixabay.

Table of contents
  1. Brute Force Attack
  2. Dictionary Attacks
  3. Social Engineering Attacks
  4. Rainbow Table Attacks
  5. How to Thwart Attacks
    1. [1] Install a VPN
    2. [2] Confirm Links
    3. [3] Password Managers
    4. [4] Multi-Factor Authentication
  6. Conclusion

Password thieves operate very covertly and most people do not even realize they have been scammed until it’s too late. Being one step ahead of the hackers is the only way you can protect your data from these unscrupulous thieves. First, you have to know the techniques the hackers employ.

Brute Force Attack

Brute force is, simply explained, guesswork on the part of the hackers. The hacker uses a program that guesses passwords that they think you are likely to use. The program runs all likely passwords and even try upper and lowercase. In short, it is trial-and-error that the software uses to generate a substantial number of guesses. Brute force attacks are used by hackers to decrypt data or for testing a system’s security.

Dictionary Attacks

A dictionary attack is another variation of brute force attacks and as the name suggests, the hackers use commonly used words to try and crack your password. Most people use common words to create passwords. Hackers obtain a list of all the commonly used words (hence the term dictionary) and run them through a program, also inserting numbers either before, after or between the words. 

Many companies can be a hacker’s paradise. The usernames are mostly based on the employees’ names, and the hacker does not have to struggle to obtain the user names.

Social Engineering Attacks

Social engineering attacks use different techniques to steal passwords from unsuspecting users, and they include:

  • Phishing: Users are tricked via emails or texts that purport to be from legit sources. Clicking on the provided ink redirects you to the hacker’s site where they proceed to ask for and steal your login details.
  • Spear Phishing: This is no different from phishing, except this is a more elaborate scam, involving emails that target you specifically, armed with details the hacker had gathered beforehand. For example, you might have had a problem with your bank, which the hacker is aware of, and they might send you an email or text purporting to be your bank.
  • Baiting: Hackers plant USBs or other malware infected gadgets lying around public places, or organizations they are targeting, hoping someone uses it and thus infecting the system with malware.
  • Quid Pro Quo: The hacker impersonates someone from an organization, for example, the telephone company, and tries to extract information from the user.

Rainbow Table Attacks

This technique involves the values of passwords, which are encrypted as hashes. The Rainbow table is a pre-computed table of hashes used to reverse cryptographic hashes, mostly used for cracking the encrypted password hashes. These tables are normally used to recover a password that is of a specific length and consists of limited characters.

How to Thwart Attacks

Now that you have an idea of how password thieves work, it is much easier to protect your data and thwart off attacks. There are various ways to do this:

[1] Install a VPN

Using a VPN service is among the best options out there for securing your credentials and devices, either at home or away. Image: Stefan Coders from Pixabay.
Using a VPN service is among the best options out there for securing your credentials and devices, either at home or away. Image: Stefan Coders from Pixabay.

Virtual Private Networks (VPNs) are an excellent way to ward off attacks from hackers. A VPN provides you with a secure connection to the internet in a secure network, protecting your privacy by guarding your online traffic from prying eyes. In this way, they put up a strong layer of defense against hackers or anyone who might be interested in your online activities. And yet another key feature of a VPNs: they hide your IP address and give you a high level of anonymity from the websites you visit.

The additional defense layer provided by a VPN protects your security and encrypts your data, reducing any chances of hacking. Avoid free VPNs at all costs as they might be compromised and sell your data to interested parties. Instead, use a reputable VPN service provider.

[2] Confirm Links

Before you click on any links in an email, make sure you check on the URL. If the URL is prefaced by HTTP, and not HTTPS, that link is insecure. Try instead to copy-paste the link directly on your browser and check its authenticity.

[3] Password Managers

A password manager is a brilliant way to ward off attacks. The password manager generates, then stores for you, long, random, and unique passwords which you do not have to remember. A single authenticating password or biometric fingerprint controls access to the password manager. In many password managers, they can be set to auto-fill the account login fields for any sites you visit. This greatly curtails any phishing attempts.

Passwords are typically meant to be long and generated at random, or they will be too easy for hackers to guess. The password manager makes this process very easy for you, but harder for the hacker.

[4] Multi-Factor Authentication

Multi-factor authentication is recommended as additional defense against hackers. In the case of Apple devices, the company offers two-factor authentication (2FA). Image: Apple.
Multi-factor authentication is recommended as additional defense against hackers. In the case of Apple devices, the company offers two-factor authentication (2FA). Image: Apple.

Strong passwords are often not enough on their own. Hackers are becoming more innovative by the day, so you have to apply more stringent measures. Organizations are especially at risk, with hackers targeting data in return for a return for a ransom payment through ransomware. As such, they should employ tools that make authentication more rigorous, such as multi-factor or two-step authentication. This technique requires the user to add extra details during logins, such as a retina scan, fingerprint, or unique code sent to a trusted smartphone. This makes it very hard for impersonation by a hacker or even a fellow employee.

Conclusion

Hackers work hard at ways to get around security measures. Some measures work better than others, but ultimately, being vigilant works best. Avoid clicking suspicious links and logging into public Wi-Fi without the protection of a VPN. You have to work as hard as, if not harder, than the hacker at protecting your precious information.

Tags: non-affiliatesecurity
Previous Post

Forthcoming Features in Apple iOS 13 You Should Care About

Next Post

Digital Needs of the Modern TV Den

Chris Jones

Chris Jones

Chris Jones is a technology writer at TurnOnVPN.org.

Next Post
Considering setting up your TV den? Big TVs and smart sound form the foundation. Image: Sonos.

Digital Needs of the Modern TV Den

Are you a freelancer? Getting your at-home workstation just right is key to productivity in the gig economy. Image: Twelve South.

Setting Up a Home Workstation for Freelance Success in the Gig Economy

Ring Stick Up Cam Battery, with the mount configured for sitting on a shelf. Image: Digitized House.

Ring Stick Up Cam Battery Review

Amazon Disclosure

To help defray the cost of publishing, Digitized House is a participant in the Amazon Associate program. We may earn a commission from qualifying purchases made from ads, buttons, or text links to Amazon placed on our website. These links may appear within editorial content, headers, footers, and sidebars. Purchasing from one of these Amazon Associate links does not increase the amount you pay, but does help keep us publishing the content you need to stay informed.

About Digitized House

We are the Guide to the Connected Home and help global consumers make their 
Connected Homes smarter, healthier, and safer through streams of original content. You can see our story here.

Like what you see on this website? You can also read us on our Apple News App Channel.

Recent Content

© 2015-2022 Digitized House Media, LLC. All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Smart Shades
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Home
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
  • About Us + Policies
    • About Us
    • Advertising, Affiliate Link, and Sponsorship Policy
    • Privacy Policy

© 2015-2022 Digitized House Media, LLC. All Rights Reserved.