Are your passwords stored securely?

August 2019 Home Security, Cyber Security

The use of malware designed to harvest consumers’ digital data – known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users targeted by the stealers peaked from less than 600 000 in the first half of 2018 to over 940 000 during the same period in 2019.

Password Stealing Ware (PSW) is a major weapon in the cybercriminals’ toolkit to sabotage users’ privacy. This malicious type of software grabs data directly from users’ web browsers using various methods. Quite often, this information is sensitive and includes access details for online accounts as well as financial information – like saved passwords, autofill data and saved payment card details.

In addition, some families of this type of malware are designed to steal browser cookies, user files from a specific location (for example, a user’s desktop) as well as app files, such as messenger services. One of the most widespread stealer Trojans was multifunctional Azorult, detected on the computers of more than 25% of all users who encountered Trojan-PSW type malware in the examined period.

“Modern consumers are increasingly active online and understandably rely on the Internet to carry out many tasks in their daily lives. This fills their digital profiles with more and more data and details and makes them a lucrative target for criminals as they could be monetised in numerous ways afterwards. By securely storing passwords and credentials, consumers can use their favourite online services in confidence that their information will not be put at risk. This should also be supported by installation of a security solution as one can never be too careful,” notes Alexander Eremin, security researcher at Kaspersky.

Kaspersky recommends that consumers follow this advice to ensure their passwords and other credentials remain secure:

•Do not share passwords or personal information with friends or family as they could unwittingly make them vulnerable to malware. Do not post them on forums or social media channels.

•Always install updates and product patches to ensure protection from the latest malware and threats.

•Start using a reliable security solution that is designed to securely store passwords and personal information, including passports, driver's licences and bank cards.

Read more about how cybercriminals use malware to steal passwords and other confidential information on www.securelist.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Check Point appoints new regional director for Africa
September 2019 , News, Cyber Security
Check Point Software Technologies has appointed Pankaj Bhula as regional director for Africa.

Read more...
ISO standard for protecting personal data
September 2019 , News, Cyber Security
Tackling privacy information management head on: first ISO standard for protecting personal data has been published.

Read more...
The hunt for the Carbanak group
September 2019 , Editor's Choice, Cyber Security, News
Tomorrow Unlocked has released a free four-part documentary that tells the story of the notorious Carbanak APT group and its $1 billion bank heist.

Read more...
Building automation vulnerable to hacks
September 2019 , News, Cyber Security
New vulnerability revealed in Internet-connected building automation devices at the DEF CON IoT Village that could impact critical building systems.

Read more...
Capture every detail with Smart PIR kits
August 2019, Longse Distribution , Home Security, CCTV, Surveillance & Remote Monitoring, Residential Estate (Industry)
Longse Technology offers DIY smart security kits that are easy to install and offer a Wi-Fi range that can reach up to 300 metres.

Read more...
Inundated with cyberattacks from all directions
August 2019 , Editor's Choice, Cyber Security, Security Services & Risk Management
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up-to-date technology.

Read more...
Eliminating forced gate opening scenarios
August 2019, ET Nice , Home Security, Access Control & Identity Management
When activated by the gate forced open alarm feature, the transmitter transmits a wireless alarm signal up to 750 metres in any direction.

Read more...
Technology is no replacement for good safety habits
August 2019, Fidelity ADT Security , Home Security, Residential Estate (Industry)
No security product or service can replace basic and responsible personal safety habits, such as being aware of your surroundings and maintaining a high level of awareness.

Read more...
Patient critical – healthcare’s cybersecurity pulse
August 2019, Wolfpack Information Risk , News, Cyber Security, Healthcare (Industry)
The healthcare industry has become one of the leading cybersecurity attack vectors worldwide for several reasons.

Read more...
Cyber tools and solutions
August 2019, Technews Publishing , Editor's Choice, Cyber Security, IT infrastructure, Residential Estate (Industry)
Hi-Tech Security Solutions looks at the various options we have when it comes to protecting yourself from the ever-growing scourge of cybercrime?

Read more...