Thursday, April 11

These are the 4 most common attacks against your passwords and how to protect yourself

Passwords are one of the weakest and most important aspects to take into account if you want to maintain your cybersecurity. In the following article we are going to delve into the 4 most common attacks and how you should protect yourself to avoid falling for them.

There is no doubt that passwords are one of the weakest links in cybersecurity both personal and large companies.

And it is that these are the object of constant attacks, since they are possibly one of the easiest ways for hackers to access your environment.

To better understand how to protect passwords from attackslet’s see the 4 main attacks on these and how you can do to prevent them.

brute force attacks

It sounds a bit strong, but it is a basic attack on passwords that hackers carry out on an ongoing basis. It’s based on make a large number of attempts to access a network using large lists of common or highly compromised passwords.

As its name suggests, it is based on extract your password by force. Preventing brute force attacks involves blocking accounts, account length, and passphrases longer than 20 characters. Here are some tricks to make it indecipherable.

Check your mobile: dangerous banking malware detected in 6 “antivirus” applications for Android

Check your mobile: dangerous banking malware detected in 6 “antivirus” applications for Android


Perhaps it is the one that does not sound the most since we are continually listening to them in the media. And it is that, phishing is an old attack that has been used for decades, but is still just as effective.

Phishing attacks aim to manipulate people into taking actions or divulging sensitive information and are typically attempted via email or SMS. We, from ComputerHoy, continuously warn of some frauds that are committed through these channels.

Also Read  If you like mazes, these automatic generators will win you over

To prevent it, it is vital to stay informed of any media attack, as well as avoid falling into all kinds of traps. If in doubt, call our bank or the company that supposedly sends us that email or SMS. In the following article we specify how to avoid falling.


5 online computer security courses that will open up new job opportunities for you

Credential stuffing

Credential Stuffing is a automated hacking in which stolen username and password combinations are thrown into the login process to gain entry.

Credentials can be mined from large databases of real accounts and passwords that have been breached and, unfortunately, can be easily acquired on the Internet.

To avoid it, you basically have to follow the same rules as the brute force attack: password extension, common pattern blocking, password longer than 20 characters… etc.

Amazon ghost seller scam

Watch out! The Income campaign begins and with it the first scam attempts

Password Reuse

Password reuse often leads to compromised systems. Numerous investigations have identified that over 70% of employees reuse passwords at work. And it is that, sharing passwords between personal and corporate accounts leaves your network vulnerable to the account.

If someone gets hacked for messing around where they shouldn’t and you use it for work, for example, this password will end up on the dark web and corporate systems will quickly become vulnerable. If you don’t want to complicate yourself, use a password manager.

Leave a Reply

Your email address will not be published. Required fields are marked *