250,000 Google login names and passwords are hijacked a week

Google research reveals how and why these hijacks happen

passwords

Google teamed up with UC Berkeley in order to research how emails and other accounts are hacked. By tracking black markets, the research was able to provide a better understanding on how accounts are hijacked, and also found ways for people to secure and protect their accounts.

Over the course of 12 months, the study analysed how hackers steal important information. It found that 788,000 credentials were stolen by keyloggers, which records the keys someone presses on a keyboard. Another 12 million credentials were stolen stolen through phishing, or tricking people into giving their personal data away, and 3.3 billion credentials were exposed by third-party breaches.

Phishing was revealed to pose the biggest threat as the cyber crime technique was able to obtain 234,000 names and passwords every week. While less than phishing, keyloggers were still able to successfully steal 5,000 credentials per week, according to the research.

The research also warned that passwords are not the only thing these attacks are after. In fact, 74% of keyloggers and 82% of phishing attempts tried to collect user's IP address and location.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

To prevent these types of attacks, Google suggests users have recovery information linked to their account and to use the automatically generated passwords through Chrome, keeping them safe in Smart Lock.

"While we have already applied these insights to our existing protections, our findings are yet another reminder that we must continuously evolve our defenses in order to stay ahead of these bad actors and keep users safe" the Google Security Blog states.

Featured Resources

Report: The State of Software Security

This annual report explores important trends in software security

Download now

A fast guide to finding your cloud solution

One size doesn't fit all in the cloud, so how do you find the best option for your business?

Download now

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Small & Medium Business Trends Report

Insights from 2,000+ business owners and leaders worldwide

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/hardware/354723/coronavirus-starts-to-take-its-toll-on-the-tech-industry
Hardware

Coronavirus starts to take its toll on the tech industry

6 Feb 2020
Visit/operating-systems/microsoft-windows/354739/windows-7-bug-blocks-users-from-shutting-down-their-pcs
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020
Visit/in-depth/354726/sonos-speakers-are-environmentally-unsound
In-depth

Sonos speakers are environmentally unsound

9 Feb 2020