{"id":623,"date":"2018-12-19T10:57:24","date_gmt":"2018-12-19T15:57:24","guid":{"rendered":"https:\/\/t2mio.com\/blog\/?p=623"},"modified":"2023-08-07T15:06:54","modified_gmt":"2023-08-07T19:06:54","slug":"what-are-the-3-most-used-methods-by-hackers-to-hijack-your-google-account-t2m-url-shortener","status":"publish","type":"post","link":"https:\/\/t2mio.com\/blog\/what-are-the-3-most-used-methods-by-hackers-to-hijack-your-google-account-t2m-url-shortener\/","title":{"rendered":"What are the 3 most used methods by hackers to hijack your Google account?"},"content":{"rendered":"<p>Every day, millions of people access their Google account to check email or watch videos on YouTube.\u00a0Meanwhile, hackers monitor their Internet activity very closely.\u00a0What strategies do they use to steal their data and passwords?<\/p>\n<p>According to Google, hackers mainly use three techniques that pose a risk to all\u00a0online\u00a0account services. We tell you what they are.<\/p>\n<h2>Phishing<\/h2>\n<p class=\"medium-size-text\">The study authors identified 12.4 million account credentials that were stolen using a technique known as\u00a0phishing.<\/p>\n<p class=\"medium-size-text\">That computer thermal comes from the English word that in Spanish is translated as\u00a0<b>&#8220;fishing&#8221;\u00a0<\/b>and refers to the identity theft by scammers to obtain personal data of users.<\/p>\n<p class=\"medium-size-text\">The goal can vary from\u00a0<b>usernames and passwords\u00a0<\/b>to bank details and access accounts to other online services. The &#8220;fishermen&#8221; access the information using false messages as &#8220;bait&#8221; for their victims, pretending to be other people or entities through <a href=\"https:\/\/powerdmarc.com\/what-is-a-phishing-email\/\" target=\"_blank\" rel=\"noopener\">phishing emails<\/a>, messages or phone calls.<\/p>\n<p class=\"medium-size-text\">A password is not enough to access Google, so\u00a0more sophisticated\u00a0hackers\u00a0tried to collect sensitive data that we could ask to verify the authenticity of the user, such as\u00a0the IP address and location, the phone number or the model of the device.<\/p>\n<h2>Keyloggers<\/h2>\n<p class=\"medium-size-text\">The second threat is\u00a0keyloggers, a type of programs that allow us to\u00a0<b>record every typing\u00a0<\/b>that we make on the computer or everything we see through the screen and send it to an external server.<\/p>\n<p class=\"medium-size-text\">This type of\u00a0digital scam\u00a0occurs frequently in places of public connection, such as cybercaf\u00e9s.\u00a0It is usually part of major infections through\u00a0malware. Computer criminals distribute these programs through computer worms and other types of Trojans (computer viruses).<\/p>\n<p class=\"medium-size-text\">A simple signal to detect this type of infection is when typing we observe a double tilde (&#8221;).<\/p>\n<h2>Security Breaches<\/h2>\n<p class=\"medium-size-text\">The third way that hackers use is, according to Google, the security breaches in third-party services.\u00a0In those cases, cybercriminals\u00a0<b>steal the databases\u00a0<\/b>of a company.<\/p>\n<p class=\"medium-size-text\">The company\u00a0<b>identified 1,900 million data\u00a0<\/b>product of these failures and later verified if some of those commercialized data were used to access Gmail accounts and other services.<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"post-excerpt\">Every day, millions of people access their Google account to check email or watch videos on YouTube.\u00a0Meanwhile, hackers monitor their Internet activity very closely.\u00a0What strategies do they use to steal&hellip;<\/div>\n","protected":false},"author":1,"featured_media":668,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,80],"tags":[94,93],"class_list":["post-623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-web-security","tag-account-security","tag-gmail-security"],"aioseo_notices":[],"views":654,"_links":{"self":[{"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/posts\/623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/comments?post=623"}],"version-history":[{"count":2,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/posts\/623\/revisions"}],"predecessor-version":[{"id":1575,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/posts\/623\/revisions\/1575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/media\/668"}],"wp:attachment":[{"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/media?parent=623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/categories?post=623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/t2mio.com\/blog\/wp-json\/wp\/v2\/tags?post=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}