Threat of the month: Credentials theft

What is it?

Cyber criminals seek user credentials that will enable access to valuable systems and resources.

How does it work?

Key-logging malware captures user keystrokes during login; a phishing site is designed to look like a legitimate login page; cyber criminals hack into e-commerce websites and social networks to extract the user database, including user credentials. Since users often re-use credentials, there is a high likelihood that the same credentials can be used for logging into other systems as well.

Should I be worried?

Yes, stolen credentials enable fraudulent activity related to personal information. They are also often used for breaching corporate environments and compromising systems and operations. 

How can I prevent it?

Don't login to sensitive applications from
unprotected machines. Change passwords often and don't use the same credentials across
multiple systems.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.