Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Research › Nearly 250,000 User logins are being Hacked every week – Google Research

    Nearly 250,000 User logins are being Hacked every week – Google Research

    By Vikram Singh RaoDecember 24, 2017
    Facebook Twitter Reddit LinkedIn
    why a Hacker Must be a Good Programmer

    The internet users are getting subjected to security breaches every moment they are online as suggested by a number of surveys conducted at a global level. May it be credentials like mail ids and passwords to bank account details, hackers all across the web trying to get access to user data. However, the methods that these hackers put into use for getting the data from the users has been one of the most speculated topics worldwide. Putting an end to all these discussions, a research team from Google has come up with all the conclusions pertaining to the steps that hackers take to get access to the user data.

    Contents

    • SOME FACTS AND FIGURES
    • THE REMEDY
    • CONCLUSION

    SOME FACTS AND FIGURES

    A research team from Google collaborated with the cybersecurity experts from the university of California, Berkeley to scrutinize the activities of these online miscreants. After about 1 year of research, they have now finally come out with the results which put light on one major fact that most of these passwords are obtained by the hackers in two ways. Email phishing, which has been enlisted as one of the major ways account for about 12 million credential thefts in the 2016-2017 period while the third-part breaches account for about 3.3 billion credential thefts of the users in the same time period.

    The Google passwords of the users form an integral portion of these credential thefts since these hold the key to a user’s mail, Documents, photographs, drive and much more. Password no longer live up to the expectations which are evident from the fact that about 15 percent of the total account holders complain of a security breach in their accounts.

    This urgently calls for some drastic measures that need to be taken so as to secure the accounts. People now no longer trust passwords as the only key to their accounts.

    THE REMEDY

    Users might have often overlooked the warnings to use different passwords on different sites which might be one of the primary reasons that their security got breached. If any user is giving a single password for all the accounts on different sites, he is indirectly giving access to his whole kingdom to the hackers. Hence the users must use different passwords for different sites and get their phone numbers linked to each account. If it is hard to remember, they can also make use of password managers for the purpose. Google employs its own security systems like the Google Security check up to secure all the user accounts.

    The users can also double up their passwords with some biometric data like fingerprint or face id which can be used to gain access to the accounts. Since most of the devices these days come with these security measures, linking accounts with biometric information can be both convenient and safe too.

    CONCLUSION

    The above-mentioned facts and figures discovered by the investigation team comprise of only those cases that were free to be found online. In fact, these numbers can be much higher than what is revealed. Drastic measures need to be first taken at the user level to ensure a strong security for their accounts. Several sites also have been updating their security features that would prevent the hackers from their attempts to steal data.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    Understanding the Role of Cybersecurity in Emerging Technologies

    June 5, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    15 Best Wallpaper Engine Wallpapers in 2025

    January 6, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.