Are your passwords stored securely?
1 August 2019
Smart Home Automation
Information Security
The use of malware designed to harvest consumers’ digital data – known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users targeted by the stealers peaked from less than 600 000 in the first half of 2018 to over 940 000 during the same period in 2019.
Password Stealing Ware (PSW) is a major weapon in the cybercriminals’ toolkit to sabotage users’ privacy. This malicious type of software grabs data directly from users’ web browsers using various methods. Quite often, this information is sensitive and includes access details for online accounts as well as financial information – like saved passwords, autofill data and saved payment card details.
In addition, some families of this type of malware are designed to steal browser cookies, user files from a specific location (for example, a user’s desktop) as well as app files, such as messenger services. One of the most widespread stealer Trojans was multifunctional Azorult, detected on the computers of more than 25% of all users who encountered Trojan-PSW type malware in the examined period.
“Modern consumers are increasingly active online and understandably rely on the Internet to carry out many tasks in their daily lives. This fills their digital profiles with more and more data and details and makes them a lucrative target for criminals as they could be monetised in numerous ways afterwards. By securely storing passwords and credentials, consumers can use their favourite online services in confidence that their information will not be put at risk. This should also be supported by installation of a security solution as one can never be too careful,” notes Alexander Eremin, security researcher at Kaspersky.
Kaspersky recommends that consumers follow this advice to ensure their passwords and other credentials remain secure:
•Do not share passwords or personal information with friends or family as they could unwittingly make them vulnerable to malware. Do not post them on forums or social media channels.
•Always install updates and product patches to ensure protection from the latest malware and threats.
•Start using a reliable security solution that is designed to securely store passwords and personal information, including passports, driver's licences and bank cards.
Read more about how cybercriminals use malware to steal passwords and other confidential information on www.securelist.com
Further reading:
A passport to offline backups
SMART Security Solutions Technews Publishing
Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.
Read more...
The impact of GenAI on cybersecurity
Sophos
News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.
Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions
Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year,
SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.
Read more...
DoorBell with built-in AI
Ajax Systems
Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.
Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.
Read more...
Identity and authentication
Technews Publishing SMART Security Solutions
Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity.
SMART Security Solutions obtained insights into the topic and the latest developments from three companies.
Read more...
Smart surveillance and cyber resilience
Axis Communications SA
Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.
Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.
Read more...
Kaspersky detects over 1 million daily tracking attempts
Kaspersky
News & Events Information Security
Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.
Read more...
Onyyx wireless alarm
Technews Publishing
Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.
Read more...