Sunday, 24 September 2017
Guest Post Ray Daniel Hacked
Guest Post Ray Daniel Hacked
Im not going to lie, this is one of the most useful guest posts weve ever had. Stolen passwords haunt our lives on the daily. Thankfully, Ray Daniel gives us some tips on how to protect ourselves from those pesky hackers, in correlation with his latest release, Hacked. The fourth book in the Tucker Mysteries, which is available now!

Hackers love passwords. They love to use them, sell them, and trade them with their friends. Once they have passwords they can steal identities, publish secrets, and create a wide variety of mischief and mayhem. So, how do they get them? Most importantly, how could they get yours.
Its perhaps comforting to know that they dont get your password because they know your birthday, your dogs name, or the names of your loved ones. While not using any of that personal information to create a password is good advice, we dont live in a creepy world where hackers are omniscient.
Hackers have two primary ways of getting your password: they can guess it, or they can trick you into giving it to them. Lets look at both of those approaches and then see what we can do to protect ourselves.

When it comes to guessing passwords, one imagines the hacker going to amazon,com and trying passwords until one hits. This, of course, does not work. amazon,com and other sites place limits on the number of guesses.
Instead hackers need to steal databases full of email addresses and their associated encrypted password. Encryption takes your password and turns it into an unintelligible string of letters. For example, the password password becomes the following:
5E884898DA28047151D0E56F8DC6292773603D0D6AABBDD62A11EF721D1542D8
Theres no way to figure out the word password from that. The very similar password Password looks like this:
E7CF3EF4F17C3999A94F2C6F612E8A888E5B1026878E4E19398B23BD38EC221A
As you can see theres no discernable pattern between them even though they are similar passwords. However, if I told you that my password was password but I didnt tell you whether the P was capitalized, you could figure out which password was mine by guessing. Youd encrypt password and then encrypt Password and check to see which one matched the encrypted string. Thats exactly how hackers guess your password except on a huge scale.
Hackers regularly break into insecure servers and steal databases of email addresses and encrypted passwords. When you heard that hackers broke into Yahoo and stole information for one billion (billion with a B!) accounts these username-password pairs were some of the information stolen.
Once they have the encrypted passwords, hackers use bastardized graphics engines to create hacking machines that can guess a billion passwords in a second. They take your password and compare it to lists of previously guessed passwords, then they compare it to words in a dictionary, then they replace the e with 3 and add numbers and letters to the end, they use advanced prediction mechanisms to create guesses from a first letter such as s.
Using techniques such as these hackers can guess between 60 and 80% of passwords in a typical stolen database. If youd like to know whether your password information is in the hands of hackers, follow this link to this New York Timesarticle:
https://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html
Or to be more precise type your email address into http://haveibeenpwned.com.
Both sites will tell you whether your information may be out there. (But, come on, we almost all have a Yahoo account.)
The other way hackers get your password is by asking for it with a phishing attack. In this approach hackers send you an email that looks to be from a coworker or, even better, a boss or the IRS. The message says something like, "You had better read this right now or youre screwed!" The goal is to get you to panic, click on a link, and log in to see the information. Once you do that, the hackers have your password. This is how John Podesta of the Hillary Clinton campaign lost his password to Russian hackers. To be fair to Podesta, he shared the email with his IT department who told him it was legitimatewhen the person had meant to type illegitimate. (One cannot make this up.)
If you think youre immune to being phished I suggest listening to the Reply All podcast from Gimlet Media named What Kind of Idiot Gets Phished?. https://gimletmedia.com/episode/97-what-kind-of-idiot-gets-phished/
There are three things you can do to minimize password-related damage:
1. Use a different password on every site. Id worry if I had used my Yahoo password to protect my bank account.
2. Use a password manager to generate unguessable random strings to all sites and save them. That way you only need to remember one password. (Here is a comparison of password managers: http://www.pcmag.com/article2/0,2817,2407168,00.asp)
3. Set up two-factor authentication on all sites that allow it. John Podesta would have survived losing his password if he had turned this on. Two-factor authentication requires the hackers to have both your password and your cell phone to get into your account. They probably dont have your cell phone. (Two-factor authentication saves Tucker in Hacked.)
The modern world of hacking and password can seem like a scary place, but its not difficult to stay safe. If you use a password manager to generate different random passwords for all your sites and turn on two-factor authentication you wont wind up like John Podesta.
***
Aloysius Tucker vows vengeance when a hacker terrorizes his ten-year-old cousin online. But the situation goes sideways fast, threatening to take Tucker off-line for good. #TuckerGate

With death threats filling his inbox, Tucker battles Anonymous, Chinese spies, and his own self-destructive rage while chasing a murderer the online community has named the HackMaster. Can Tucker clear his name and build a case against the killer before the death threats come true?

download file now