SlideShare a Scribd company logo
1 of 1
Download to read offline
Stay one step ahead of the bad guys

Account hijackers prey on the bad habits of the average Internet user. Understanding common hijacking
techniques and using better security practices will help you stay one step ahead of them.

The most common ways hijackers can get access to your Google password are:

    l   Password re-use: You sign up for an account on a third-party site with your Google username and
        password. If that site is hacked and your sign-in information is discovered, the hijacker has easy
        access to your Google Account.
    l   Malware: You use a computer with infected software that is designed to steal your passwords as
        you type (“keylogging”) or grab them from your browser’s cache data.
    l   Phishing: You respond to a website, email, or phone call that claims to come from a legitimate
        organization and asks for your username and password.
    l   Brute force: You use a password that’s easy to guess, like your first or last name plus your birth
        date (“Laura1968”), or you provide an answer to a secret question that’s common and therefore
        easy to guess, like “pizza” for “What is your favorite food?”

As you can see, hijackers have many tactics for stealing your password, and it’s important to be aware of
all of them.

Take control of your account security across the web

Online accounts that share passwords are like a line of dominoes: When one falls, it doesn’t take much for
the others to fall, too. This is why you should choose unique passwords for important accounts like Gmail
(your Google Account), your bank, commerce sites, and social networking sites. We’re also working on
technology that adds another layer of protection beyond your password to make your Google Account
significantly more secure.

Choosing a unique password is not enough to secure your Google Account against every possible threat.
That’s why we’ve created an easy-to-use checklist to help you secure your computer, browser, Gmail,
and Google Account. We encourage you to go through the entire checklist, but want to highlight these tips:

    l   Never re-use passwords for your important accounts like online banking, email, social
        networking, and commerce.
    l   Change your password periodically, and be sure to do so for important accounts whenever you
        suspect one of them may have been at risk. Don’t just change your password by a few letters or
        numbers (“Aquarius5” to “Aquarius6”); change the combination of letters and numbers to something
        unique each time.
    l   Never respond to messages, non-Google websites, or phone calls asking for your Google
        username or password; a legitimate organization will not ask you for this type of information. Report
        these messages to us so we can take action. If you responded and can no longer access your
        account, visit our account recovery page.

More Related Content

Viewers also liked

PhotoSketch: Internet Image Montage
PhotoSketch: Internet Image MontagePhotoSketch: Internet Image Montage
PhotoSketch: Internet Image MontagediTii
 
T-Mobile, Microsoft
T-Mobile, Microsoft T-Mobile, Microsoft
T-Mobile, Microsoft diTii
 
BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)
BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)
BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)BizTalk360
 
BizTalk Practical Course Session 1
BizTalk Practical Course Session 1BizTalk Practical Course Session 1
BizTalk Practical Course Session 1MoustafaRefaat
 
Google Second Quarter 2010 Financial Results
Google Second Quarter 2010 Financial ResultsGoogle Second Quarter 2010 Financial Results
Google Second Quarter 2010 Financial ResultsdiTii
 
Docs for facebook pages
Docs for facebook pagesDocs for facebook pages
Docs for facebook pagesdiTii
 
Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009diTii
 
Top 10 BizTalk Admin Tips
Top 10 BizTalk Admin TipsTop 10 BizTalk Admin Tips
Top 10 BizTalk Admin TipsDaniel Toomey
 
Aspire Easystore H340 Service Book
Aspire Easystore H340 Service BookAspire Easystore H340 Service Book
Aspire Easystore H340 Service BookdiTii
 

Viewers also liked (9)

PhotoSketch: Internet Image Montage
PhotoSketch: Internet Image MontagePhotoSketch: Internet Image Montage
PhotoSketch: Internet Image Montage
 
T-Mobile, Microsoft
T-Mobile, Microsoft T-Mobile, Microsoft
T-Mobile, Microsoft
 
BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)
BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)
BizTalk Server Tips & Tricks for Developers and Admins (Deep Dive)
 
BizTalk Practical Course Session 1
BizTalk Practical Course Session 1BizTalk Practical Course Session 1
BizTalk Practical Course Session 1
 
Google Second Quarter 2010 Financial Results
Google Second Quarter 2010 Financial ResultsGoogle Second Quarter 2010 Financial Results
Google Second Quarter 2010 Financial Results
 
Docs for facebook pages
Docs for facebook pagesDocs for facebook pages
Docs for facebook pages
 
Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009
 
Top 10 BizTalk Admin Tips
Top 10 BizTalk Admin TipsTop 10 BizTalk Admin Tips
Top 10 BizTalk Admin Tips
 
Aspire Easystore H340 Service Book
Aspire Easystore H340 Service BookAspire Easystore H340 Service Book
Aspire Easystore H340 Service Book
 

More from diTii

Windows Azure Platform Business Model: Know about Windows Azure Platform pric...
Windows Azure Platform Business Model: Know about Windows Azure Platform pric...Windows Azure Platform Business Model: Know about Windows Azure Platform pric...
Windows Azure Platform Business Model: Know about Windows Azure Platform pric...diTii
 
Creative Canvas: A guide to Google media solutions
Creative Canvas: A guide to Google media solutionsCreative Canvas: A guide to Google media solutions
Creative Canvas: A guide to Google media solutionsdiTii
 
Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009diTii
 
Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic diTii
 
Server Core Remote Management by Sander Berkouwer & Joachim Nässlander
Server Core Remote Management by Sander Berkouwer & Joachim NässlanderServer Core Remote Management by Sander Berkouwer & Joachim Nässlander
Server Core Remote Management by Sander Berkouwer & Joachim NässlanderdiTii
 
PhotoSketch: Internet Image Montage
PhotoSketch: Internet Image MontagePhotoSketch: Internet Image Montage
PhotoSketch: Internet Image MontagediTii
 
Windows 7 Product Guide
Windows 7 Product GuideWindows 7 Product Guide
Windows 7 Product GuidediTii
 

More from diTii (7)

Windows Azure Platform Business Model: Know about Windows Azure Platform pric...
Windows Azure Platform Business Model: Know about Windows Azure Platform pric...Windows Azure Platform Business Model: Know about Windows Azure Platform pric...
Windows Azure Platform Business Model: Know about Windows Azure Platform pric...
 
Creative Canvas: A guide to Google media solutions
Creative Canvas: A guide to Google media solutionsCreative Canvas: A guide to Google media solutions
Creative Canvas: A guide to Google media solutions
 
Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009Cenzic_AppSecTrends_Q1-Q2-2009
Cenzic_AppSecTrends_Q1-Q2-2009
 
Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic Web Application Security Trends Report by Cenzic
Web Application Security Trends Report by Cenzic
 
Server Core Remote Management by Sander Berkouwer & Joachim Nässlander
Server Core Remote Management by Sander Berkouwer & Joachim NässlanderServer Core Remote Management by Sander Berkouwer & Joachim Nässlander
Server Core Remote Management by Sander Berkouwer & Joachim Nässlander
 
PhotoSketch: Internet Image Montage
PhotoSketch: Internet Image MontagePhotoSketch: Internet Image Montage
PhotoSketch: Internet Image Montage
 
Windows 7 Product Guide
Windows 7 Product GuideWindows 7 Product Guide
Windows 7 Product Guide
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

9d80b96e bb9d-46c2-bf78-9ebe01990b4f

  • 1. Stay one step ahead of the bad guys Account hijackers prey on the bad habits of the average Internet user. Understanding common hijacking techniques and using better security practices will help you stay one step ahead of them. The most common ways hijackers can get access to your Google password are: l Password re-use: You sign up for an account on a third-party site with your Google username and password. If that site is hacked and your sign-in information is discovered, the hijacker has easy access to your Google Account. l Malware: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data. l Phishing: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password. l Brute force: You use a password that’s easy to guess, like your first or last name plus your birth date (“Laura1968”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “pizza” for “What is your favorite food?” As you can see, hijackers have many tactics for stealing your password, and it’s important to be aware of all of them. Take control of your account security across the web Online accounts that share passwords are like a line of dominoes: When one falls, it doesn’t take much for the others to fall, too. This is why you should choose unique passwords for important accounts like Gmail (your Google Account), your bank, commerce sites, and social networking sites. We’re also working on technology that adds another layer of protection beyond your password to make your Google Account significantly more secure. Choosing a unique password is not enough to secure your Google Account against every possible threat. That’s why we’ve created an easy-to-use checklist to help you secure your computer, browser, Gmail, and Google Account. We encourage you to go through the entire checklist, but want to highlight these tips: l Never re-use passwords for your important accounts like online banking, email, social networking, and commerce. l Change your password periodically, and be sure to do so for important accounts whenever you suspect one of them may have been at risk. Don’t just change your password by a few letters or numbers (“Aquarius5” to “Aquarius6”); change the combination of letters and numbers to something unique each time. l Never respond to messages, non-Google websites, or phone calls asking for your Google username or password; a legitimate organization will not ask you for this type of information. Report these messages to us so we can take action. If you responded and can no longer access your account, visit our account recovery page.