Some of you may have lost some money to hackers after they took hacked your credit card information.

Most of the information hackers get is by hacking your password.

There are some common techniques that hackers use tohack passwords.

How do Hackers Hack your Passwords?

Most of the time, hackers use sexual posts to lure victims into divulging their accounts.

Social engineering

The most popular low-tech method for gathering passwords issocial engineering.

It has existed since the time computers became popular but has only been regarded as high risk now.

spot_img

Anyone who has an interest in your passwords has to look over your shoulders and note down the passwords.

It can happen at an ATM, in a cyber cafe, or at an airport.

you’ve got the option to always protect yourself by glancing around before keying in the password.

These keyloggers log all the keystrokes you pop in.

A log is created and then it is sent to the Hacker.

The most famous keylogger is the Ardamax Keylogger.

It can be customized so it doesnt show up in Windows Processes and notify the victim.

RAT

RAT stands for Remote Administration Tool.

With RAT, a hacker can connect to your PC, without your knowledge.

It also has the built-in functionality of a keylogger.

Hacker can copy files from your Hard disk to his computer, and all this without your knowledge.

A good example of RAT isPoison Ivy.

It can be customized to connect to your PC on a particular port number specified while creating the RAT.

Trojans

Now, these are the most common throw in of malware.

Trojans spread throughwarez sites,torrent websites, or by clicking on mostly risky links.

All of you want free software.

When you download from warez sites or torrent websites.

In all probability, all software, keygens, and patches could contain trojans.

This means you will get the software for free, but your system will be infected by a trojan.

To beat such hackers, alwaysavoid public Wi-Fi spotsfor banking, emails, etc.

enter using HTTPS websites as they encrypt the traffic between you and the server leaving the sniffers toothless.

Glance over your shoulders, use hard passwords, and use password management software to manage your passwords.

source: www.techworm.net