• About Us
    • — About Digitized House
    • — Advertise
    • — Editorial Guidelines
  • Policies
    • — Ad Policy
    • — Privacy Policy
    • — Cookie Policy (US)
Digitized House | Guide to the Connected Home
  • Home
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Window Coverings
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Assistant
    • SmartThings
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
No Result
View All Result
Digitized House | Guide to the Connected Home
  • Home
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Window Coverings
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Assistant
    • SmartThings
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
No Result
View All Result
Digitized House | Guide to the Connected Home
No Result
View All Result
Home Connected Home

4 Most Common Password Attacks and How to Protect Against Them

Chris Jones by Chris Jones
12 August 2019
in Connected Home, Featured Articles, How-To, Privacy & Safety, Secure Home, Smartphones
Reading Time: 6min read
Hackers work hard to get around security, but you can thwart them by being smarter with your credentials. Image: Pixabay.

Hackers work hard to get around security, but you can thwart them by being smarter with your credentials. Image: Pixabay.

Share on FacebookShare on Twitter
Read on Apple News

Password thieves operate very covertly and most people do not even realize they have been scammed until it’s too late. Being one step ahead of the hackers is the only way you can protect your data from these unscrupulous thieves. First, you have to know the techniques the hackers employ.

Brute Force Attack

Brute force is, simply explained, guesswork on the part of the hackers. The hacker uses a program that guesses passwords that they think you are likely to use. The program runs all likely passwords and even try upper and lowercase. In short, it is trial-and-error that the software uses to generate a substantial number of guesses. Brute force attacks are used by hackers to decrypt data or for testing a system’s security.

Dictionary Attacks

A dictionary attack is another variation of brute force attacks and as the name suggests, the hackers use commonly used words to try and crack your password. Most people use common words to create passwords. Hackers obtain a list of all the commonly used words (hence the term dictionary) and run them through a program, also inserting numbers either before, after or between the words. 

More Original Content FromDigitized House

Why You Should Put Down Your Digital Devices Before Bed

Digital Cul-de-Sac: IBSx Show Village Homes Go Virtual

Savvy Planning for Smart Home Investing

6 Key Trends Transforming and Shaping Smart Cities in 2021 and Beyond

CES 2021 Connected Home Highlights from the All-Digital Event

Many companies can be a hacker’s paradise. The usernames are mostly based on the employees’ names, and the hacker does not have to struggle to obtain the user names.

Social Engineering Attacks

Social engineering attacks use different techniques to steal passwords from unsuspecting users, and they include:

  • Phishing: Users are tricked via emails or texts that purport to be from legit sources. Clicking on the provided ink redirects you to the hacker’s site where they proceed to ask for and steal your login details.
  • Spear Phishing: This is no different from phishing, except this is a more elaborate scam, involving emails that target you specifically, armed with details the hacker had gathered beforehand. For example, you might have had a problem with your bank, which the hacker is aware of, and they might send you an email or text purporting to be your bank.
  • Baiting: Hackers plant USBs or other malware infected gadgets lying around public places, or organizations they are targeting, hoping someone uses it and thus infecting the system with malware.
  • Quid Pro Quo: The hacker impersonates someone from an organization, for example, the telephone company, and tries to extract information from the user.

Rainbow Table Attacks

This technique involves the values of passwords, which are encrypted as hashes. The Rainbow table is a pre-computed table of hashes used to reverse cryptographic hashes, mostly used for cracking the encrypted password hashes. These tables are normally used to recover a password that is of a specific length and consists of limited characters.

How to Thwart Attacks

Now that you have an idea of how password thieves work, it is much easier to protect your data and thwart off attacks. There are various ways to do this:

[1] Install a VPN

Using a VPN service is among the best options out there for securing your credentials and devices, either at home or away. Image: Stefan Coders from Pixabay.
Using a VPN service is among the best options out there for securing your credentials and devices, either at home or away. Image: Stefan Coders from Pixabay.

Virtual Private Networks (VPNs) are an excellent way to ward off attacks from hackers. A VPN provides you with a secure connection to the internet in a secure network, protecting your privacy by guarding your online traffic from prying eyes. In this way, they put up a strong layer of defense against hackers or anyone who might be interested in your online activities. And yet another key feature of a VPNs: they hide your IP address and give you a high level of anonymity from the websites you visit.

The additional defense layer provided by a VPN protects your security and encrypts your data, reducing any chances of hacking. Avoid free VPNs at all costs as they might be compromised and sell your data to interested parties. Instead, use a reputable VPN service provider.

[2] Confirm Links

Before you click on any links in an email, make sure you check on the URL. If the URL is prefaced by HTTP, and not HTTPS, that link is insecure. Try instead to copy-paste the link directly on your browser and check its authenticity.

[3] Password Managers

A password manager is a brilliant way to ward off attacks. The password manager generates, then stores for you, long, random, and unique passwords which you do not have to remember. A single authenticating password or biometric fingerprint controls access to the password manager. In many password managers, they can be set to auto-fill the account login fields for any sites you visit. This greatly curtails any phishing attempts.

Passwords are typically meant to be long and generated at random, or they will be too easy for hackers to guess. The password manager makes this process very easy for you, but harder for the hacker.

[4] Multi-Factor Authentication

Multi-factor authentication is recommended as additional defense against hackers. In the case of Apple devices, the company offers two-factor authentication (2FA). Image: Apple.
Multi-factor authentication is recommended as additional defense against hackers. In the case of Apple devices, the company offers two-factor authentication (2FA). Image: Apple.

Strong passwords are often not enough on their own. Hackers are becoming more innovative by the day, so you have to apply more stringent measures. Organizations are especially at risk, with hackers targeting data in return for a return for a ransom payment through ransomware. As such, they should employ tools that make authentication more rigorous, such as multi-factor or two-step authentication. This technique requires the user to add extra details during logins, such as a retina scan, fingerprint, or unique code sent to a trusted smartphone. This makes it very hard for impersonation by a hacker or even a fellow employee.

Conclusion

Hackers work hard at ways to get around security measures. Some measures work better than others, but ultimately, being vigilant works best. Avoid clicking suspicious links and logging into public Wi-Fi without the protection of a VPN. You have to work as hard as, if not harder, than the hacker at protecting your precious information.

More About This Topic:

  • More from Digitized House | Guide to the Connected Home
  • Sign Up to Get Weekly Digitized House Updates
  • More info about VPNs at TurnOnVPN.org
  • Tips for Managing Security Settings on Apple iOS 12
  • 7 Ways to Protect Your Privacy on Latest Smart Devices
  • With Smart Security Cameras, Location Is Everything
  • How Much Internet Speed Does Your Smart Home Need?
Tags: ExpressVPNnon-affiliatesecurityVirtual Private Networks
Previous Post

Forthcoming Features in Apple iOS 13 You Should Care About

Next Post

Digital Needs of the Modern TV Den

Chris Jones

Chris Jones

Chris Jones is a technology writer at TurnOnVPN.org.

Related Posts

Image: Onur Binay on Unsplash.
Healthy Home

Why You Should Put Down Your Digital Devices Before Bed

23 February 2021

Many people have a basic understanding around how using a digital device just before bed can impact getting a good...

Image: Woodley Architectural Group and Professional Builder.
Design

Digital Cul-de-Sac: IBSx Show Village Homes Go Virtual

6 February 2021

For anyone attending pre-2021 NAHB International Builders' Shows, the sheer magnitude of the event has always been overwhelming. For 2021,...

Savvy smart home investing entails picking the right accessories to add function and value. Image: Digitized House.
Home Finance

Savvy Planning for Smart Home Investing

5 February 2021

Let’s face it: we live in a tech-driven world. Today’s smart technology has made our homes feel far closer to...

Next Post
Considering setting up your TV den? Big TVs and smart sound form the foundation. Image: Sonos.

Digital Needs of the Modern TV Den

Are you a freelancer? Getting your at-home workstation just right is key to productivity in the gig economy. Image: Twelve South.

Setting Up a Home Workstation for Freelance Success in the Gig Economy

Ring Stick Up Cam Battery, with the mount configured for sitting on a shelf. Image: Digitized House.

Ring Stick Up Cam Battery Review

As an Amazon Associate, Digitized House may earn a commission from qualifying purchases made through links, ads, or buttons on this page. See our full Affiliate Link, Sponsorship, and Ad Policy.

More from Digitized House

Why You Should Put Down Your Digital Devices Before Bed

Digital Cul-de-Sac: IBSx Show Village Homes Go Virtual

Savvy Planning for Smart Home Investing

6 Key Trends Transforming and Shaping Smart Cities in 2021 and Beyond

CES 2021 Connected Home Highlights from the All-Digital Event

Wasserstein 3-in-1 Floodlight with Ring Charger Review

Recycling Outdated Consumer Electronics: A Comprehensive Guide

Our Holiday 2020 Gift Guide: Top Buys, Sure Bets

Infographic: Best Ways to Secure Your Holiday Tech

Infographic: What Amenities Do Homeowners Value the Most?

About Us

Digitized House is the Guide to the Connected Home.

We help global consumers make their 
Connected Homes smarter, healthier, safer, and 
more sustainable through streams of original content. You can see our story here.

Like what you see on this website? You can also read us on our Apple News App Channel.

More Info

  • About Us
    • — About Digitized House
    • — Advertise
    • — Editorial Guidelines
  • Policies
    • — Ad Policy
    • — Privacy Policy
    • — Cookie Policy (US)

Affiliate Disclosure

As an Amazon Associate, Digitized House may earn a commission from qualifying purchases made through links, ads, or buttons on this page. See our full Affiliate Link, Sponsorship, and Ad Policy.

Recent Content

Image: Onur Binay on Unsplash.

Why You Should Put Down Your Digital Devices Before Bed

23 February 2021
Image: Woodley Architectural Group and Professional Builder.

Digital Cul-de-Sac: IBSx Show Village Homes Go Virtual

6 February 2021
Savvy smart home investing entails picking the right accessories to add function and value. Image: Digitized House.

Savvy Planning for Smart Home Investing

5 February 2021

© 2015-2020 Digitized House Media, LLC. All Rights Reserved.

No Result
View All Result
  • Home
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Window Coverings
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Assistant
    • SmartThings
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
  • About Us + Policies
    • About Us
    • Advertise
    • Editorial Guidelines
    • Ad Policy
    • Privacy Policy
    • Cookie Policy (US)

© 2015-2020 Digitized House Media, LLC. All Rights Reserved.