Threat of the month: Credentials theft

Share this article:
Threat of the month: Credentials theft
Threat of the month: Credentials theft

What is it?

Cyber criminals seek user credentials that will enable access to valuable systems and resources.

How does it work?

Key-logging malware captures user keystrokes during login; a phishing site is designed to look like a legitimate login page; cyber criminals hack into e-commerce websites and social networks to extract the user database, including user credentials. Since users often re-use credentials, there is a high likelihood that the same credentials can be used for logging into other systems as well.

Should I be worried?

Yes, stolen credentials enable fraudulent activity related to personal information. They are also often used for breaching corporate environments and compromising systems and operations. 

How can I prevent it?

Don't login to sensitive applications from
unprotected machines. Change passwords often and don't use the same credentials across
multiple systems.



Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Threat of the Month

Sign up to our newsletters

TOP COMMENTS