How email accounts are getting hacked?
How hackers penetrate into our computers?

1. Phishing attack
2. Stealing attack
3. Key logging attack
Phishing attack
In this type of attack hacker creates a fake login page of the trusted site and sends its link to the user. When user clicks that link and enters the user ID and password and clicks login or sign in the, the entered ID and password will be sent to the hacker immediately.
Stealing attack
Stealer is the mind blowing and very small tool. What happens when it start running on your computer is, all the password saved on the computer such as windows admin passwords as well as the password stored in the web browser are sent to the hacker immediately.
Key logging attack
Key logger is also a small tool. When it start running it will start listening the key stokes of the user i.e. keys pressed by user on keyboard and sends to the hackers.
What Hackers do with Key logger and Stealer is, they use to integrate the key logger or stealer with some file such as audio or video and upload that file on to internet. When the users download the file and open it means the key logger or stealer integrated to it also starts running silently at the back ground without the knowledge of the user. And all the user IDs and passwords saved to the computer are sent to the hacker.
Only because of the pirated content and un trusted sites, Accounts are getting hacked 80% of the hacks can be prevented by staying out of piracy.
Solution:
So say no to piracy so that you can be safe and secure.
ABDUR RAHMAN S
CSE ‘A’ 3rd Year