Smart Home Automation


Are your passwords stored securely?

1 August 2019 Smart Home Automation Information Security

The use of malware designed to harvest consumers’ digital data – known as password stealers – has seen a significant rise in 2019. According to Kaspersky’s data, the number of users targeted by the stealers peaked from less than 600 000 in the first half of 2018 to over 940 000 during the same period in 2019.

Password Stealing Ware (PSW) is a major weapon in the cybercriminals’ toolkit to sabotage users’ privacy. This malicious type of software grabs data directly from users’ web browsers using various methods. Quite often, this information is sensitive and includes access details for online accounts as well as financial information – like saved passwords, autofill data and saved payment card details.

In addition, some families of this type of malware are designed to steal browser cookies, user files from a specific location (for example, a user’s desktop) as well as app files, such as messenger services. One of the most widespread stealer Trojans was multifunctional Azorult, detected on the computers of more than 25% of all users who encountered Trojan-PSW type malware in the examined period.

“Modern consumers are increasingly active online and understandably rely on the Internet to carry out many tasks in their daily lives. This fills their digital profiles with more and more data and details and makes them a lucrative target for criminals as they could be monetised in numerous ways afterwards. By securely storing passwords and credentials, consumers can use their favourite online services in confidence that their information will not be put at risk. This should also be supported by installation of a security solution as one can never be too careful,” notes Alexander Eremin, security researcher at Kaspersky.

Kaspersky recommends that consumers follow this advice to ensure their passwords and other credentials remain secure:

•Do not share passwords or personal information with friends or family as they could unwittingly make them vulnerable to malware. Do not post them on forums or social media channels.

•Always install updates and product patches to ensure protection from the latest malware and threats.

•Start using a reliable security solution that is designed to securely store passwords and personal information, including passports, driver's licences and bank cards.

Read more about how cybercriminals use malware to steal passwords and other confidential information on www.securelist.com





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved