• About Us
    • — About Digitized House
    • — Advertise
    • — Editorial Guidelines
  • Policies
    • — Ad Policy
    • — Privacy Policy
    • — Cookie Policy (US)
Digitized House | Guide to the Connected Home
  • Home
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Window Coverings
    • Connected Home and Gadget Resources
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Assistant
    • SmartThings
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
No Result
View All Result
Digitized House | Guide to the Connected Home
  • Home
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Window Coverings
    • Connected Home and Gadget Resources
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Assistant
    • SmartThings
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
No Result
View All Result
Digitized House | Guide to the Connected Home
No Result
View All Result
Home Connected Home

4 Most Common Password Attacks and How to Protect Against Them

Chris Jones by Chris Jones
12 August 2019
in Connected Home, Featured Articles, How-To, Privacy & Safety, Secure Home, Smartphones
Reading Time: 6 mins read
Hackers work hard to get around security, but you can thwart them by being smarter with your credentials. Image: Pixabay.

Hackers work hard to get around security, but you can thwart them by being smarter with your credentials. Image: Pixabay.

Share on FacebookShare on Twitter
Read on Apple News

Password thieves operate very covertly and most people do not even realize they have been scammed until it’s too late. Being one step ahead of the hackers is the only way you can protect your data from these unscrupulous thieves. First, you have to know the techniques the hackers employ.

Brute Force Attack

Brute force is, simply explained, guesswork on the part of the hackers. The hacker uses a program that guesses passwords that they think you are likely to use. The program runs all likely passwords and even try upper and lowercase. In short, it is trial-and-error that the software uses to generate a substantial number of guesses. Brute force attacks are used by hackers to decrypt data or for testing a system’s security.

Dictionary Attacks

A dictionary attack is another variation of brute force attacks and as the name suggests, the hackers use commonly used words to try and crack your password. Most people use common words to create passwords. Hackers obtain a list of all the commonly used words (hence the term dictionary) and run them through a program, also inserting numbers either before, after or between the words. 

More Original Content FromDigitized House

Kohler H2Wise+ Marks Rise of the Water Network

How Smart Tech Drives Sustainable Home Decisions

6 Steps to Furnishing Your Space Sustainably Without Compromising Aesthetics 

Smart Housing’s Promise for Rural Development

Healthier Smart Home Air Filtration: Aura Air Review

Many companies can be a hacker’s paradise. The usernames are mostly based on the employees’ names, and the hacker does not have to struggle to obtain the user names.

Social Engineering Attacks

Social engineering attacks use different techniques to steal passwords from unsuspecting users, and they include:

  • Phishing: Users are tricked via emails or texts that purport to be from legit sources. Clicking on the provided ink redirects you to the hacker’s site where they proceed to ask for and steal your login details.
  • Spear Phishing: This is no different from phishing, except this is a more elaborate scam, involving emails that target you specifically, armed with details the hacker had gathered beforehand. For example, you might have had a problem with your bank, which the hacker is aware of, and they might send you an email or text purporting to be your bank.
  • Baiting: Hackers plant USBs or other malware infected gadgets lying around public places, or organizations they are targeting, hoping someone uses it and thus infecting the system with malware.
  • Quid Pro Quo: The hacker impersonates someone from an organization, for example, the telephone company, and tries to extract information from the user.

Rainbow Table Attacks

This technique involves the values of passwords, which are encrypted as hashes. The Rainbow table is a pre-computed table of hashes used to reverse cryptographic hashes, mostly used for cracking the encrypted password hashes. These tables are normally used to recover a password that is of a specific length and consists of limited characters.

How to Thwart Attacks

Now that you have an idea of how password thieves work, it is much easier to protect your data and thwart off attacks. There are various ways to do this:

[1] Install a VPN

Using a VPN service is among the best options out there for securing your credentials and devices, either at home or away. Image: Stefan Coders from Pixabay.
Using a VPN service is among the best options out there for securing your credentials and devices, either at home or away. Image: Stefan Coders from Pixabay.

Virtual Private Networks (VPNs) are an excellent way to ward off attacks from hackers. A VPN provides you with a secure connection to the internet in a secure network, protecting your privacy by guarding your online traffic from prying eyes. In this way, they put up a strong layer of defense against hackers or anyone who might be interested in your online activities. And yet another key feature of a VPNs: they hide your IP address and give you a high level of anonymity from the websites you visit.

The additional defense layer provided by a VPN protects your security and encrypts your data, reducing any chances of hacking. Avoid free VPNs at all costs as they might be compromised and sell your data to interested parties. Instead, use a reputable VPN service provider.

[2] Confirm Links

Before you click on any links in an email, make sure you check on the URL. If the URL is prefaced by HTTP, and not HTTPS, that link is insecure. Try instead to copy-paste the link directly on your browser and check its authenticity.

[3] Password Managers

A password manager is a brilliant way to ward off attacks. The password manager generates, then stores for you, long, random, and unique passwords which you do not have to remember. A single authenticating password or biometric fingerprint controls access to the password manager. In many password managers, they can be set to auto-fill the account login fields for any sites you visit. This greatly curtails any phishing attempts.

Passwords are typically meant to be long and generated at random, or they will be too easy for hackers to guess. The password manager makes this process very easy for you, but harder for the hacker.

[4] Multi-Factor Authentication

Multi-factor authentication is recommended as additional defense against hackers. In the case of Apple devices, the company offers two-factor authentication (2FA). Image: Apple.
Multi-factor authentication is recommended as additional defense against hackers. In the case of Apple devices, the company offers two-factor authentication (2FA). Image: Apple.

Strong passwords are often not enough on their own. Hackers are becoming more innovative by the day, so you have to apply more stringent measures. Organizations are especially at risk, with hackers targeting data in return for a return for a ransom payment through ransomware. As such, they should employ tools that make authentication more rigorous, such as multi-factor or two-step authentication. This technique requires the user to add extra details during logins, such as a retina scan, fingerprint, or unique code sent to a trusted smartphone. This makes it very hard for impersonation by a hacker or even a fellow employee.

Conclusion

Hackers work hard at ways to get around security measures. Some measures work better than others, but ultimately, being vigilant works best. Avoid clicking suspicious links and logging into public Wi-Fi without the protection of a VPN. You have to work as hard as, if not harder, than the hacker at protecting your precious information.

More About This Topic:

  • More from Digitized House | Guide to the Connected Home
  • Sign Up to Get Weekly Digitized House Updates
  • More info about VPNs at TurnOnVPN.org
  • Tips for Managing Security Settings on Apple iOS 12
  • 7 Ways to Protect Your Privacy on Latest Smart Devices
  • With Smart Security Cameras, Location Is Everything
  • How Much Internet Speed Does Your Smart Home Need?
Tags: ExpressVPNnon-affiliatesecurityVirtual Private Networks
Previous Post

Forthcoming Features in Apple iOS 13 You Should Care About

Next Post

Digital Needs of the Modern TV Den

Chris Jones

Chris Jones

Chris Jones is a technology writer at TurnOnVPN.org.

Related Posts

Kohler H2Wise+ Smart Home Water Monitor. Image: Digitized House Media.
Review

Kohler H2Wise+ Marks Rise of the Water Network

9 June 2022

Kohler Company recently expanded its smart home portfolio with the Kohler H2Wise+ water monitor, a system designed to surveil a...

The Google Nest Hub displaying home energy data for a Reliant Energy customer. Image: Digitized House.
Sustainable Home

How Smart Tech Drives Sustainable Home Decisions

18 April 2022

Most people try to do their part to cut down on carbon and help save the planet. From recycling to...

Image: Spacejoy on Unsplash.
Sustainable Home

6 Steps to Furnishing Your Space Sustainably Without Compromising Aesthetics 

18 April 2022

Going green has never looked so good. More homeowners than ever are looking to decorate their interior with gorgeous, but...

Next Post
Considering setting up your TV den? Big TVs and smart sound form the foundation. Image: Sonos.

Digital Needs of the Modern TV Den

Are you a freelancer? Getting your at-home workstation just right is key to productivity in the gig economy. Image: Twelve South.

Setting Up a Home Workstation for Freelance Success in the Gig Economy

Ring Stick Up Cam Battery, with the mount configured for sitting on a shelf. Image: Digitized House.

Ring Stick Up Cam Battery Review

As an Amazon Associate, Digitized House may earn a commission from qualifying purchases made through links, ads, or buttons on this page. See our full Affiliate Link, Sponsorship, and Ad Policy.

About Us

Digitized House is the Guide to the Connected Home.

We help global consumers make their 
Connected Homes smarter, healthier, safer, and 
more sustainable through streams of original content. You can see our story here.

Like what you see on this website? You can also read us on our Apple News App Channel.

More Info

  • About Us
    • — About Digitized House
    • — Advertise
    • — Editorial Guidelines
  • Policies
    • — Ad Policy
    • — Privacy Policy
    • — Cookie Policy (US)

Affiliate Disclosure

As an Amazon Associate, Digitized House may earn a commission from qualifying purchases made through links, ads, or buttons on this page. See our full Affiliate Link, Sponsorship, and Ad Policy.

Recent Content

Kohler H2Wise+ Marks Rise of the Water Network

How Smart Tech Drives Sustainable Home Decisions

6 Steps to Furnishing Your Space Sustainably Without Compromising Aesthetics 

Smart Housing’s Promise for Rural Development

Healthier Smart Home Air Filtration: Aura Air Review

Smart Tech Helping Build Sustainable Homes

© 2015-2022 Digitized House Media, LLC. All Rights Reserved.

No Result
View All Result
  • Home
  • Connect Your Home
    • Deals
    • News
    • Reviews
    • Security Cameras
    • Security Systems
    • Smart Displays
    • Smart Door Locks
    • Smart Lighting
    • Smart Plugs
    • Smart Product Round-ups
    • Smart Speakers
    • Smart Thermostats
    • Smart Water
    • Smoke + CO Detectors
    • Solar Photovoltaics
    • Window Coverings
    • Connected Home and Gadget Resources
  • Ecosystems
    • Amazon Alexa
    • Apple HomeKit
    • Google Assistant
    • SmartThings
    • Open Systems
  • Design Your Home
    • Architecture
    • Healthy Home
    • Home Design
    • How-To
    • Green Building
    • Real Estate
    • Sustainable Home
  • About Us + Policies
    • About Us
    • Advertise
    • Editorial Guidelines
    • Ad Policy
    • Privacy Policy
    • Cookie Policy (US)

© 2015-2022 Digitized House Media, LLC. All Rights Reserved.

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}