{"id":261091,"date":"2022-06-22T10:04:52","date_gmt":"2022-06-22T07:04:52","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-protect-your-password-from-theft"},"modified":"2023-06-22T10:11:55","modified_gmt":"2023-06-22T07:11:55","slug":"how-to-protect-your-password-from-theft","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-protect-your-password-from-theft","title":{"rendered":"How to protect your password from theft"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|5.1%||3%|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111111&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">The password is the first degree or first factor of protection against account hacking. It&#8217;s very important to take care of its security, because if hackers <\/span><span style=\"font-weight: 400;\">steal your password,<\/span><span style=\"font-weight: 400;\"> your personal data, documents, important correspondence and much more will be at risk. In this article, we will tell you about the most actual methods <\/span><span style=\"font-weight: 400;\">of password protection<\/span><span style=\"font-weight: 400;\">, but first let&#8217;s find out how an intruder intercepts passwords.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">As the famous English proverb says, \u201cForewarned is forearmed\u201d.<\/span><\/p>\n<h2><b>How passwords<\/b> <b>are stolen<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are three main ways<\/span> <span style=\"font-weight: 400;\">to capture passwords:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">get passwords from the user himself;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">intercept passwords on the way from the client to the server;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Intercept passwords on the server side, exploiting its vulnerabilities.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We will consider in detail only the first two ways in which the user can influence the situation. If, of course, he is informed. Accordingly, the protection against <\/span><span style=\"font-weight: 400;\">password theft<\/span> <span style=\"font-weight: 400;\">will vary from case to case.<\/span><\/p>\n<h3><b>Client-side password<\/b> <b>cracking<\/b><\/h3>\n<h4><b>Password selection<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Passwords are generated by entering user identification information known to the hacker: name, last name, year of birth, nicknames, hobbies, slogans posted in statuses, etc. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers can also pick up passwords using the \u201cdictionary attack\u201d method. Its essence is to go through the frequently used words and catchphrases. After hacking into one account, hackers may also try to use the same password on your other accounts.<\/span><\/p>\n<h5><b>Hacker<\/b> <b>password<\/b> <b>protection<\/b><\/h5>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not use short and simple passwords like 12345, qwerty, abvgd, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You don&#8217;t need to encrypt your password with your data, which can easily be found in the public domain: name, year of birth, phone number or slogan.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not use the same password in different accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hide your personal numbers and mailing addresses on social networks. So that attackers can not for sure know your login, which can be an address or phone number. Do not use public information to create <\/span><span style=\"font-weight: 400;\">passwords<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not use your company email credentials (passwords) to sign up for other services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use additional account<\/span> <span style=\"font-weight: 400;\">protection<\/span><span style=\"font-weight: 400;\">, such as physical security keys.<\/span><\/li>\n<\/ol>\n<h4><b>\u0410\u0442\u0430\u043a\u0438 Brute Force<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This method is also called the \u201cbrute force\u201d or \u201ctotal overkill\u201d method. Password matching in this case is done with the help of utilities with built-in dictionaries and frequent combinations. The most popular crackers are Brutus, RainbowCrack, Wfuzz and Medusa. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Short passwords of up to 7 characters are picked by machines in a matter of seconds. For more complex passwords, it may take weeks, months, or even years. Although to speed up the process, hackers can spread tasks over several machines. Thus, <\/span><b>in a local network up to 2000 passwords can be checked in 1 second!<\/b><span style=\"font-weight: 400;\">!<\/span><\/p>\n<h5><b>Protect passwords<\/b> <b>from brute force<\/b><\/h5>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is recommended to change passwords in all accounts from time to time, namely once every 30, 60 or 90 days.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create complex passwords using different characters and letter cases.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not use the same password for all accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect your data on social networks. Provide phone numbers and addresses unrelated to account login.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Connect<\/span> <a href=\"https:\/\/shop.thekernel.ua\/en\/two-factor-authentication\"><span style=\"font-weight: 400;\">two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ol>\n<h4><b>Keylogger and other surveillance methods<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">An intruder can snoop on your password when you use it in a public place, such as at work or in a co-working space. Or find your password sticker, install a keylogger, plant a flash drive with malware. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">A keylogger is a software that allows you to track which keys you press on your keyboard.<\/span><\/i><\/p>\n<h4><b>Password protection<\/b> <b>from keyloggers<\/b><\/h4>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not leave devices unattended.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect entry to computers, tablets, and phones.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use password managers in your workplace so that your keystrokes cannot be tracked and recorded.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not pick up \u201clost\u201d flash drives and do not put them into your computer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not click on suspicious links and install only licensed software.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set<\/span> <a href=\"https:\/\/shop.thekernel.ua\/en\/what-is-2-step-verification\"><span style=\"font-weight: 400;\">two-step<\/span><\/a> <span style=\"font-weight: 400;\">or two-factor<\/span> <span style=\"font-weight: 400;\">password protection from hackers.<\/span><\/li>\n<\/ol>\n<h4><b>Social Engineering<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Stealing passwords<\/span><span style=\"font-weight: 400;\"> with the help of social engineering methods is quite common. Its essence is that the attacker contacts the victim by phone, mail or in social networks and, influencing his emotions, extracts the desired information. He does this either through threats: \u201cyour accounts have been blocked,\u201d \u201cyou have been fined,\u201d \u201cyour daughter is in danger,\u201d etc.; or by reporting a big win in the lottery, an unexpected inheritance, etc. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This method requires the cheater to know psychology and empathy skills. In addition, information about the victim is often collected beforehand (name, phone number, position, interests, children, services used), so it is sometimes difficult for a normal person to recognize the trick. Especially if he expects to win or is really afraid of fines, blocked accounts, etc.<\/span><\/p>\n<h5><b>Password theft protection<\/b> <b>using social engineering<\/b><\/h5>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Never give out personal data: passwords, code words, SMS-codes. Real employees of banking, government and other institutions never ask for them. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t write publicly about your goals, plans, accomplishments, pains. Or at least limit the range of people in social networks for whom personal posts can be accessed. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check your sources of information. Make sure it comes from real people in the appropriate position. You have the right to ask for the name of the institution, the full name and position of the employee.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If, after communication, you feel that you were \u201ctricked\u201d, immediately change the passwords and block the cards.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update your software regularly and install a reliable antivirus.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remember: two-factor authentication is a more secure way <\/span><span style=\"font-weight: 400;\">to protect your information<\/span> <span style=\"font-weight: 400;\">than<\/span> <span style=\"font-weight: 400;\">passwords<\/span><span style=\"font-weight: 400;\">, which can become known to third parties.<\/span><\/li>\n<\/ol>\n<h4><b>Phishing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This method also belongs to social engineering, as it is based on surveillance of the victim. The essence of this method is that the scammer, already knowing what services you use, substitutes them for you. He offers to go to <\/span><span style=\"font-weight: 400;\">a site for password theft instead <\/span><span style=\"font-weight: 400;\">of a real one, sent an allegedly special offer from the company, for example, to the mail.<\/span><\/p>\n<h5><b>Protection against phishing<\/b><\/h5>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Carefully study the site on which you enter data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not make purchases on unknown sites.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pay attention to the site protocol in the browser: the https protocol is protected. It means that the site has been verified and is genuine, the owner has rights to it, and the data on it is encrypted.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enable two-step authentication. At the very least, <\/span><span style=\"font-weight: 400;\">protection<\/span> <span style=\"font-weight: 400;\">with one more<\/span> <span style=\"font-weight: 400;\">password<\/span> <span style=\"font-weight: 400;\">will create an additional barrier<\/span> <span style=\"font-weight: 400;\">against<\/span> <span style=\"font-weight: 400;\">data theft.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use<\/span> <b>hardware security keys<\/b><span style=\"font-weight: 400;\">that work on the principle of asymmetric encryption. They will not send your data to a phishing site for the simple reason that they must first receive an encrypted request from the real server. <\/span><\/li>\n<\/ol>\n<h4><b>Trojan programs<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This method<\/span> <span style=\"font-weight: 400;\">of stealing passwords<\/span><span style=\"font-weight: 400;\"> is also indirectly related to social engineering, if the attacker chooses a victim to learn data from specific services that she uses. Further technical matters \u2014 he drops <\/span><span style=\"font-weight: 400;\">a Trojan to steal passwords<\/span><span style=\"font-weight: 400;\">, offered to download something for free. And when the program works, he gets access to the computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trojan programs also accompany pirated products that users try to download online for free. In this case, the victim himself opens access to the attackers.<\/span><\/p>\n<h5><b>Ways<\/b> <b>to protect passwords<\/b> <b>from Trojan programs<\/b><\/h5>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use licensed software.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regularly update programs to eliminate vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install a reliable antivirus.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use security keys or other methods of two-factor authentication. In this case, if an attacker steals a file with passwords, it will be difficult for him to enter the service under your name.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update your passwords regularly as they can be compromised.<\/span><\/li>\n<\/ol>\n<h3><b>Interception of passwords on the way from the client to the server<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">There are situations of authorized interception of the flow of information carried out by state services. In other cases, these actions are considered illegal. We will briefly describe the algorithm of actions carried out by attackers. <\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The client connects to the server and is authorized.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The attacker connects to the local network and runs<\/span> <span style=\"font-weight: 400;\">a script to steal passwords<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In response, the server sends your cookies from the browser (where, by the way, you sometimes store passwords) to the e-mail address of the attacker. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Next, it reads and decrypts the necessary data from the cookie, pretends to be the end user and gets access to all the information it needs.<\/span><\/li>\n<\/ol>\n<h4><b>Wi-Fi access points<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The most vulnerable place where data interception is possible is a public Wi-Fi network in cafes, airports, train stations, etc. In it, a hacker works a little differently: after connecting to the network, he uses utilities to read incoming IP addresses. Next, he changes his address with the help of utilities and enters the network under the name of the outgoing user. As a result, after connecting to a public network, you may lose data.<\/span> <span style=\"font-weight: 400;\">Password protection<\/span> <span style=\"font-weight: 400;\">will not help in this case.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">You can also accidentally open access to hackers if you set up your home network incorrectly.<\/span><\/p>\n<h5><b>Methods<\/b> <b>of protection against theft<\/b> <b>of passwords in<\/b> <b>Wi-Fi access points<\/b><\/h5>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not store passwords in browsers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turn off Wi-Fi and Bluetooth when you are not using the Internet.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When setting up a home Wi-Fi network, use the WPA-2 protocol.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect your Wi-Fi network with a secure password. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Log out of your accounts after the session is over.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Change passwords as often as possible if you periodically use a public Wi-Fi network, and enable two-factor authentication.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Make two-factor authentication mandatory at any login, not just on another device.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">To enter accounts easily and without entering passwords, use physical security keys.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Always try to be aware of how to protect digital information. <\/b><\/li>\n<\/ul>\n<h2><b>The most reliable<\/b> <b>password protection<\/b> <b>against theft today<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We briefly considered the most famous methods of hacker attacks and made sure that<\/span> <span style=\"font-weight: 400;\">account<\/span> <span style=\"font-weight: 400;\">protection<\/span> <span style=\"font-weight: 400;\">uses passwords<\/span><span style=\"font-weight: 400;\"> is currently insufficient. Physical security keys, which are simple and easy to use, will protect your accounts best of all. Keys produced in Sweden and the USA stand out from them \u2014 YubiKey. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Their advantages:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Absolute reliability, protection against mechanical damage, moisture and dust IP68.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They work on the principle of asymmetric encryption.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A wide range of products suitable for a variety of purposes: both for personal home use and for enhanced protection at the level of state security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Thousands of services are supported, including such giants of the IT industry as Google, Microsoft, Binance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You can use security keys instead of passwords and log in to accounts with one touch.<\/span><\/li>\n<\/ul>\n<p><b>To learn more about the possibilities of using Yubikey keys,<\/b> <a href=\"https:\/\/shop.thekernel.ua\/ru\/shop\"><b>go to the next page<\/b><\/a><b>.<\/b>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_enable_pattern_style=&#8221;on&#8221; background_pattern_style=&#8221;honeycomb&#8221; background_pattern_color=&#8221;rgba(124,218,36,0.32)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; offset_number=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The password is the first degree or first factor of protection against account hacking. It&#8217;s very important to take care of its security, because if hackers steal your password, your personal data, documents, important correspondence and much more will be at risk. In this article, we will tell you about the most actual methods of [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":261097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"How to protect password from theft? Life hack from YubiKey","_seopress_titles_desc":"Password protection on the Internet is a hot topic more than ever. How to protect your account password and not become a victim of a hacker \u2013 working proven tips from YubiKey","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403,437],"tags":[],"class_list":["post-261091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-articles-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=261091"}],"version-history":[{"count":6,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261091\/revisions"}],"predecessor-version":[{"id":261100,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261091\/revisions\/261100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/261097"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=261091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=261091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=261091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}