Connect with us

Tech News

Want to know how your passwords could get hacked?

(TECH NEWS) While we all know that passwords can be hacked, it is rare that we know how they’re hacked.

Published

on

passwords dark web Chinese hacker blackmail apple

Ever wonder how passwords get stolen? I like to imagine a team of hackers like The Lone Gunmen from The X-Files, all crowded in some hideout conducting illegal computer business based on tips from rogue FBI Agents.

Turns out there’s a little more to hacking than waiting for Fox Mulder to show up with hints.

Most of the common tactics involve guessing passwords utilizing online and offline techniques to acquire entry. One of the main methods is a dictionary attack.

This method automatically tries everything listed in a small file, the “dictionary,” which is populated with common passwords, like 123456 or qwerty. If your password is something tragically simple, you’re out of luck in a dictionary attack.

To protect yourself, use strong single-use passwords for each individual account. You can keep track of these with a password manager, because no one is expecting you to remember a string of nonsensical numbers, letters, and characters that make up a strong password.

Of course, there are still ways for hackers to figure out even complex passwords.

In a brute force attack, every possible character combination is tried. For example, if the password is required to have at least one uppercase letter and one number, a brute force attack will meet these specifications when generating potential passwords.

Brute force attacks also include the most commonly used alphanumeric combinations, like a dictionary attack. Your best bet against this type of attack is using extra symbols like & or $ if the password allows, or including a variety of variables whenever possible.

Spidering is another online method similar to a dictionary attack. Hackers may target a specific business, and try a series of passwords related to the company. This usually involves using a search “spider” to collate a series of related terms into a custom word list.

While spidering can be devastating if successful, this kind of attack is diverted with strong network security and single-use passwords that don’t tie in easily searchable personal information.

Malware opens up some more fun options for hackers, especially if it features a keylogger, which monitors and records everything you type. With a keylogger, all your accounts could potentially be hacked, leaving you SOL. There are thousands of malware variants, and they can go undetected for a while.

Fortunately, malware is relatively easy to avoid by regularly updating your antivirus and antimalware software. Oh, and don’t click on sketchy links or installation packages containing bundleware. You can also use script blocking tools.

The delightfully named (but in actuality awful) rainbow table method is typically an offline attack where hackers acquire an encrypted list of passwords. The passwords will be hashed, meaning it looks completely different from what you would type to log in.

However, attackers can run plaintext passwords through a hashtag algorithm and compare the results to their file with encrypted passwords. To save time, hackers can use or purchase a “rainbow table”, which is a set of precomputed algorithms with specific values and potential combinations.

The downside here is rainbow tables take up a lot of space, and hackers are limited to the values listed in the table. Although rainbow tables open up a nightmare storm of hacking potential, you can protect yourself by avoiding sites that limit you to very short passwords, or use SHA1 or MD5 as their password algorithms.

There’s also phishing, which isn’t technically hacking, but is one of the more common ways passwords are stolen. In a phishing attempt, a spoof email requiring immediate attention links to a fake login landing page, where users are prompted to input their login credentials.

The credentials are then stolen, sold, used for shady purposes, or an unfortunate combination of all the above. Although spam distribution has greatly increased over the past year, you can protect yourself with spam filters, link checkers, and generally not trusting anything requesting a ton of personal information tied to a threat of your account being shut down.

Last but certainly not least, there’s social engineering. This is a masterpiece of human manipulation, and involves an attacker posing as someone who needs login, or password, building access information. For example, posing as a plumbing company needing access to a secure building, or a tech support team requiring passwords.

This con is avoidable with education and awareness of security protocol company wide. And also you know, not providing sensitive information to anyone who asks. Even if they seem like a very trustworthy electrician, or promise they definitely aren’t Count Olaf.

Moral of the story? Your passwords will never be completely safe, but you can take steps to prevent some avoidable hacking methods.

Always have a single-use password for each account, use a password manager to store complex passwords, update malware, keep your eye out for phishing attempts, and don’t you dare make your password “passoword.”

Lindsay is an editor for The American Genius with a Communication Studies degree and English minor from Southwestern University. Lindsay is interested in social interactions across and through various media, particularly television, and will gladly hyper-analyze cartoons and comics with anyone, cats included.

Tech News

Making Slack actionable makes you productive

(TECHNOLOGY) Slack is an amazing productivity tool, but of course can add more to your plate – this feature puts you back on track.

Published

on

slack

You know when you’re using Slack and you’re having a conversation with your teammate about whether or not you should grab lunch or go to Soul Cycle, but before you can answer, your editor Slacks you about deadlines and your design partner messages you proofs and suddenly you snap back to reality and remember that you’ve been working on a blog post for an hour and your concentration is completely shattered? You know, the exact moment when your productivity is officially derailed?

Well, Slack now offers Actions to help make sure that doesn’t happen. Your day may get busy, but at least nothing will slip through the cracks, work-wise.

Integrated with project management tools like Asana, Zendesk, and Jira, Actions allows users to create and comment on tasks, tickets or issues within conversations. That means no clicking through tabs or apps until you can no longer remember why you started clicking in the first place. More importantly, Actions keeps track of the work you need to do and when you need to do it.

So, how do Actions work?

1. Need to create a deadline or set up an appointment? Anything you see in Slack that needs a follow-up can be turned into an action when you click the ••• icon and choose an “action.”

2. When you’ve completed an action, a message appears in your Slack channel and lets your team know you’ve flagged it for follow-up.

3. Whichever app you’ve integrated with will alert Slack at which point you and your team can determine the next steps.

Bottom-line, Actions help keep your workflow moving. While it may not stop the onslaught of Slack messages from breaking your concentration, at least you’ll know what you should to be concentrating on.

If you’re curious to know more about Actions, the company has ample info on their API pages for your perusal.

Continue Reading

Tech News

Freezetab streamlines how you save tabs in Chrome

(TECH NEWS) Freezetab is the newest chrome extension that allows you to organize saved tabs in a myriad of ways.

Published

on

freezetab

Internet made easier

With the browser becoming more and more of a workspace than merely an application, the built in bookmarks tool may leave you a bit hungry for more.

bar
Chrome users who need better tools to organize and manage bookmarks may find the power they need in Freezetab.

Bookmark’s cooler, hotter younger brother

Freezetab seeks to answer the questions of “what if I could organize my bookmarks by website” or “I only want to save all but two of these tabs on zen office designs.” It seeks to give you more options beyond the “one or all” choices in chrome. Here is the lowdown:

  • The calendar feature remembers WHEN you saved a tab – so if you can’t remember the title you can just go back to the day.
  • Chrome either lets you save one or all tabs. Freezetab expands those options to include: all, current, everything but current, right of, left of, or pick and choose.
  • If you are sharing a collection of tabs with a workgroup or a partner, it exports as a nice textbox that is easy to share in integrated messaging, IM, or email. Or even social media!
  • Sorting is robust, and there is a solid search feature that searches as you type.
  • That quick save feature saves all the tabs and closes them – and you can adjust that quick save feature to meet your needs.
  • There is a handy little star feature to note important bookmarks (i.e. recipes and excel techniques).
  • Enhances your close tab capability to close everything to the left and specific tabs – this great if you work in chrome and have 75 tabs open that have one letter names.
  • It is easier to sort tabs after you save them – you can search for them and then sort into folders you create rather manually organizing them into folders.
  • As a bonus: for those who don’t want to have to sort bookmarks – unlike Chrome which requires you to pick a folder or risk turning your bookmarks to an unorganized mess, the extension automatically organizes it for you.

Freezetab findings

After spending a few moments with Freezetab, it does fit in nicely with a workflow. Solidly reviewed, the developer did solve an issue with “pinned” tabs in the 1.2 update. – so it doesn’t remove or add them. The features are nice and easy to use, and it doesn’t require more than five minutes of playing around.

One complaint – if you choose to the right or left of the current tab to close, it did close the active tab as well – which was a little funky. But once you get comfortable with the nuances, it’s easy to use.
The interface is function over form, but you won’t have any problem using or customizing this extension. Now Bookmark smart y’all!

#FreezeTab

Continue Reading

Tech News

We’ve all seen job listings for UX writers, but what exactly is UX writing?

(TECH NEWS) We seeing UX writer titles pop up and while UX writing is not technically new, there are new availabilities popping up.

Published

on

writers net neutrality twitter facebook outlook email drag

The work of a UX writer is something you come across everyday. Whether you’re hailing an Uber or browsing Spotify for that one Drake song, your overall user experience is affected by the words you read at each touchpoint.

A UX writer facilitates a smooth interaction between user and product at each of these touchpoints through carefully chosen words.

Some of the most common touchpoints UX writers work on are interface copy, emails and notifications. It doesn’t sound like the most thrilling stuff, but imagine using your favorite apps without all the thoughtful confirmation messages we take for granted. Take Eat24’s food delivery app, instead of a boring loading visual, users get a witty message like “smoking salmon” or “slurping noodles.”

Eat24’s app has UX writing that works because it’s engaging.

Xfinity’s mobile app provides a pleasant user experience by being intuitive. Shows that are available on your phone are clearly labeled under “Available Out of Home.” I’m bummed that Law & Order: SVU isn’t available, but thanks to thoughtful UX writing at least I knew that sad fact ahead of time.

Regardless of where you find a UX writer’s work, there are three traits an effective UX writer must have. Excellent communication skills is a must. The ability to empathize with the user is on almost every job post.

But from my own experience working with UX teams, I’d argue for the ability to advocate as the most important skill.

UX writers may have a very specialized mission, but they typically work within a greater UX design team. In larger companies some UX writers even work with a smaller team of fellow writers. Decisions aren’t made in isolation. You can be the wittiest writer, with a design decision based on obsessive user research, but if you can’t advocate for those decisions then what’s the point?

I mentioned several soft skills, but that doesn’t mean aspiring UX writers can’t benefit from developing a few specific tech skills. While the field doesn’t require a background in web development, UX writers often collaborate with engineering teams. Learning some basic web development principles such as responsive design can help writers create a better user experience across all devices. In a world of rapid prototyping, I’d also suggest learning a few prototyping apps. Several are free to try and super intuitive.

Now that the UX in front of writer no longer intimidates you, go check out ADJ, The American Genius’ Facebook Group for Austin digital job seekers and employers. User centered design isn’t going anywhere and with everyone getting into the automation game, you can expect even more opportunities in UX writing.

Continue Reading
Advertisement

Our Great Partners

The
American Genius
news neatly in your inbox

Subscribe to our mailing list for news sent straight to your email inbox.

Emerging Stories

Get The American Genius
neatly in your inbox

Subscribe to get business and tech updates, breaking stories, and more!