Month: April 2018

Cybercriminals steal user credentials in several ways. With this lucrative user data, hackers steal funds, confidential information, and even identities. In many cases, hackers acquire sets of credentials leaked during massive data breaches from the Dark Web, but more targeted attacks are common too. Some cybercriminals harvest credentials from individuals using keyloggers. Experts believe that…

The hackers that breached the Democratic National Committee and Hillary Clinton’s presidential campaign used targeted phishing. And the next victim of an attack like this could be you. In targeted phishing attacks, cybercriminals send tailored emails to specific users to try and lure them into clicking on malicious links or attachments containing malware. As soon…

It started out as a reliable way to protect websites from the blight of automated bots. But the Completely Automated Public Turing test to tell Computers and Humans Apart, or CAPTCHA, may have met its match. Recent developments in AI software have proven very successful in beating many manifestations of this widely-used test. In many…

A common dictionary attack uses a list of words to guess the passwords for user accounts. It’s a simple tactic to understand, but much harder to mitigate. It all stems back to bad password choices The Oxford English Dictionary defines a dictionary attack as “an attempt to gain illicit access to a computer system by…