ALL >> Computers >> View Article
How Hackers Get Your Passwords: Phishing
Our lives and personal information are tied up in our computers and in various websites. Access to personal information or even our money is protected by passwords. To get access to this information, unscrupulous people will try to get these passwords. In recent years, one common way this information is taken is by a phishing attack. In this type of attack, you are tricked into actually giving the hacker your personal information, usually by someone posing as an agent of a trusted source.
Phishing goes all the way back to 1987 and started with a group of early hackers who were attempting to get free service from America Online. The original method of generating false credit card data was discovered and stopped, so they came up with the idea of hijacking actual accounts. Sending an e-mail claiming to be from AOL, they asked people to verify their login and password information. Even though AOL started putting a disclaimer on all their sites saying they would never ask for password information, customers were stilled duped.
With access to credit card information, hackers started attacking corporations and financial ...
... institutions. Typical phishing scams usually come in the form of an email, claiming problems with a bank or credit account and asking for verification. Social networks have also been used by phishing scams, offering a fun looking application which, when accessed, will claim a problem and ask you to sign in again, gaining access to your password and personal information.
Using the best online password manager such as Logaway, you can keep all your personal information secure by the monitoring and encrypting supplied as part of the service. Logaway monitors your accounts 24/7 and ensures you're in charge of your own security. It also allows you to sign in using one secure password, so you never have to worry about hackers learning your vital information.
Author
===============
William Peter writes reviews on various Secure password websites. In this piece of write up, the author highlights on the best online password manager to keep your password safe.
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






