Passwords: The Achilles Heel Of Our Security

Passwords: The Achilles Heel Of Our Security

Passwords : 2014 has been the year in which we have seen truly epic breaches in cybersecurity and hacking. And if not, tell Sony.

The attacks (both the so-called “brute force” ones and the more sophisticated ones based on software and not on swarms of machines attacking a certain IP) have come from several sides and not only from cybercriminals.

The British intelligence services, the NSA, the FBI and it is not known how many other government agencies both inside and outside the United States, have carried out, and recognized, covert operations within the framework of National Security, developed in the field from the Internet.

Korean hackers have been pointed with the finger of the attack on the Japanese giant and North American conglomerate, Sony, making it look ridiculous and causing President Obama himself to have had to come forward promising public opinion that the USA will know how to give the appropriate response and in the same ground against North Korea.

And 2015 (Eugene Kspersky himself, who is one of the most important security experts, says so) seems to be a busy one in this regard. So we are going to give some recommendations that we should implement, on a daily basis and in any movement we make on the Internet, so that one of the Achilles’ heels of cybersecurity is a little more protected: we are talking about passwords.

The Passwords: The Key Is In The Keys

Some swear that password-based logins are dinosaurs about to die, but that day never seems to come. Apple seemed to have certified this death, with its fingerprint sensor for iPhones, but it seems that the rest of the manufacturers have not wanted to enter that area and that the patent has not been standardized.

Other providers of software, services and online content (including Microsoft) have pointed to password access and two-step access, to increase the security of their Hotmail and Skype accounts, among other products.

Fingerprint Password

From Google they warned Redmond that they had been trying to convince their Gmail users to use this double checking to secure their email accounts for a long time, but that the staff does not seem to be up to the task. It seems like a waste of time to customers.

So the passwords are still alive and kicking to access everything on the Internet (from Twitter, Facebook and other social networks, to the most common services such as emails, videoconferences and registration in game portals, purchases and others.)

How Do We Ensure That The Password Is Secure?

Well, this post isn’t going to be one of those great decalogues where a writer gives some wonderful tips for creating a strong password. Simply because you must understand something: There Is No Secure Password .

The specialist who is going to violate your equipment , your communications, your personal information, your email or your online banking will not be based on the complexity of your password. Quite possibly, it will place a keylogger on your PC or mobile (an application in the background that collects your keystrokes) and will have access to everything you have typed on the device, as well as on the pages where you typed it.

If you want to work a little harder, it will study your habits for a few days (for this it has your browsing history together with the data entered by typing) so that when you go to access your own online bank account or your email or social networks (in addition to entering your own passwords, because you have given them to them when typing them) they will do so at the same times and with the same frequency as you, imitating or camouflaging their IP, so that for all purposes it will be you himself who is entering their services and products.

A clean, unprovable, undetectable and fine job but, above all, very simple to execute.

Also read : Social Media Tips

Technology Monk

Technology Monk is a right destination for the people who want to consume latest news on Technology, Gadgets, Business, Marketing and Finance. It is the one-stop solution for all the queries related to the technology.

Leave a Reply

Your email address will not be published.