What is it?
Cyber criminals seek user credentials that will enable access to valuable systems and resources.
How does it work?
Key-logging malware captures user keystrokes during login; a phishing site is designed to look like a legitimate login page; cyber criminals hack into e-commerce websites and social networks to extract the user database, including user credentials. Since users often re-use credentials, there is a high likelihood that the same credentials can be used for logging into other systems as well.
Should I be worried?
Yes, stolen credentials enable fraudulent activity related to personal information. They are also often used for breaching corporate environments and compromising systems and operations.
How can I prevent it?
Don’t login to sensitive applications from
unprotected machines. Change passwords often and don’t use the same credentials across