Thousands of Online Services uses Password, Be it Banks, Shops, Social Networking Sites, Email's And Every other service. These Passwords are lying on the Databases of the companies, Which frequently have very basic security.
And These sites Do Get Hacked, Here Are Some Of The Greatest Attacks :
Service : | Victims : |
---|---|
Sony PlayStation Network : | 77 Million Accounts Hacked. Site Down For 24 Days. |
Evernote : | 50 Million Accounts Hacked, Including Addresses. |
LinkedIn : | 6.5 Million Accounts Hacked. |
Gamigo : | 8.24 Million Accounts Exploited. |
Yahoo Voices : | 450,000 Accounts Hacked. |
Twitter : | 250,000 Accounts Hacked. |
Most Of the Accounts Get Hacked Because the Main Site Server Gets Exploited, But Many Individual Accounts Get Hacked Because people are too damn dumb to use complexpassword, A Survey done by Mark Burnett for 12 years Indicates that 78% of online users use These passwords :
password | 2000 | hockey | dallas |
---|---|---|---|
123456 | jordan | george | yankees |
1234 | superman | charlie | 123123 |
12345678 | harley | andrew | ashley |
qwerty | 1234567 | michelle | 666666 |
dragon | fuck | love | hello |
sex | asshole | jessica | amanda |
12345 | hunter | boobs | orange |
baseball | trustno1 | legend-ary | biteme |
football | ranger | 6969 | freedom |
letmein | buster | pepper | computer |
monkey | thomas | daniel | fuckme |
696969 | tiger | access | nicole |
abc123 | robert | 123456789 | thunder |
mustang | soccer | 654321 | ginger |
micheal | porn | joshua | heather |
shadow | batman | maggie | hammer |
master | test | starwars | summer |
wintwe | jennifer | pass | silver |
fucking | carlover | killer | william |
What And How Hackers Do What They Do !
I Don't Know How, But somebody tricked us into thinking Hackers are Geeks on Laptops ( which we are) but you should also remember that Hackers have great observation skills. Hackers Follow you everywhere, Once they lay their eyes on a target, they dig out every bit of information available about you. They spy on your online photos, They know your cat's name, Your Car's Model and everything you might have mentioned in online world.Hackers Can attack you on many fronts, like : Cracking your Social networking websitepassword, Stealing Data from your personal computer, Phishing you or even using your E-Mail ID to send messages to terrorists.
You'll Love :Learn How To Crack Windows Password In Minutes.
Methods To Confuse And Avoid Hackers :
Two Factor Authentication :
Many E-mail Providers use Two Factor Authentication like Gmail And Yahoo, And it the strongest method to protect yourself from getting hacked. To access your account, First you have to sign in Using your E-mail and Password, And then An Eight Digit Code is sent to your mobile within a few seconds, Which you have to fill online to get access to your account.Pros :
Strongest Security Method.
You know when your account is being accessed.
Alert On Your Mobile if someone tries to brute-force your account.
Cons :
Not so Time Efficient.
You Need Your Mobile And Good Signal Reception.
You'll Love : Learn How To Clone A Mobile Number !
Total Rating :
Security :
Comfort :
OPENID :
A Universally Usable ID Is given to you if you use OPENID. UUID are mostly URL specially crafted for you. To Log In into any service, You'll have to just insert your OpenId, Not yourpassword. Using OpenID is also a good Idea as password have a habit of getting hacked. OpenID is usable on Google, Yahoo, LiveJournal, Hyves, Blogger, Flickr And other sites.Pros :
One-For-All Username and Password.
Saves Time.
Cons :
Not So-Many Sites Supported.
Total Rating :
Security :
Comfort :
Swipe Gestures :
Swipe gestures are a popular way to lock your Android Phones, And they very Are Simple to use, Thus easily crack-able. Anybody can remember your Swipe by seeing it first time, Also Somebody can find out your swipe by observing the scratches on the surface of your screen.Pros :
Easy And Simple.
Cons :
Easily Hack-able.
Total Rating :
Security :
Comfort :
Password Stick :
On Many Operating Systems, You Can create a password stick which can unlock yourcomputer by plugging it in. It is a time saving and secure method, Unless Your hacker is also good at picking pockets.We are not very fond of this method, as your brain is the safest place to store sensitive information.Pros :
Time Saving.
Easy.
Secure.
Cons :
Danger Of Getting Hacked if stick is stolen.
Total Rating :
Security :
Comfort :
Finger Print Scan :
One of the oldest method of securing, Finger print scanners are widely available on Laptops, Netbooks, External USB Scanner etc. Also a rumor has it that the new iPhone Might have a Fingerprint scanner in the home button. It is a good and secure way to protect your data.Pros :
Easy To Use.
Widely Available.
Cons :
Remember to clear the scanner after each scan or the print left on the scanner can be easily used by hacker.
Total Rating :
Security :
Comfort :
3D Face Analysis :
On Mobile Since Android 4.0, 3D Face Scan is an awkward way to unlock your mobile, It uses your mobile/laptop camera to take a video of your whole face each time to unlockyour device. But we don't think this type of security method is useful in Mobiles, Tough it is very useful in PC Security and Other stuff that you don't need to unlock every other second.Pros :
Very Secure.
Very Difficult To Hack.
Cons :
Good Lightning needed.
Can be cracked by a video of your's.
Total Rating :
Security :
Comfort :
Behavior Pattern :
Everybody has different way of interacting with technology, And the Swedish Firm BehavioSac Has used it to create a new security system. In this method, You Need to enter your password and have to do it in the same way you did before. Other Factors Include : Typing Rhythm, Speed, And on touchscreen Devices : Angle of gestures, pressure of angles and other stuff !Pros :
Highly Secure.
Easy To Use.
Cons :
Not available on the market Yet.
Could be a pain in the ass when you're drunk or sleepy.
Total Rating :
Security :
Comfort :
0 comments:
Post a Comment