Email Hack Methods – Stealing Your Password

By on Jan 10, 2017

Category: Email, Security

3D people  holding a   padlock

For someone to gain entry to your email account, they must have access to your password.  These next blog postings are going to look at the various ways bad guys can get your password.  Today, we start with stealing of passwords.

Keeping your email password (or any other password for that matter) from being stolen is of utmost importance.  With that in mind, let’s look at how your password might be stolen:

  1.   Watching you type in your password.   If you are in a situation where you are going to type in your email password and there are other people nearby, this is the perfect time to look over your shoulder and make sure no one is watching.  Also, in this day and age of cameras everywhere, you need to make sure that there’s no camera with a view of your keyboard where someone could be watching (or video taping) you as you type in your password.
  2.   Taking the physical object where you write down your passwords.  If you keep your passwords on a Post-it-note© or in some notebook near your computer or some other place easily discovered, an unscrupulous person might simply take the note or notebook and get your password that way.  Similarly to what we mentioned in #1, the password thief might not need to actually take your password note but, rather, they could take a picture of it and you’d never be the wiser.
  3.  Discover your password via a key-logger.  If a hacker can compromise your computer and get a key-logger in place, your password can be stolen and transmitted to the hacker while you are actually typing in the password.  We’ll talk about key-loggers in another post in this series but just know that key-loggers on your computer are not a good thing!
  4.  Stealing a file where your passwords are stored.  Some people keep a file on their computer with all of their accounts and password in an unencrypted file format.  This is a definite no-no.  All a hacker has to do is get onto your computer, find the file and, bingo, he or she has your passwords. If you have your passwords stored this way, please permanently delete the files today!
  5.  Giving your password to someone who falls victim to 1-4 above.  A chain is only as strong as its weakest link so if you give your password(s) to another person, they need to be diligent, as well.

 

Fresh Ruby Red Grapefruit, Orange, Pear and Apple Gifts

Leave a Reply

Your email address will not be published. Required fields are marked *


Recent Comments

Links

Archive