One of the biggest fears that Internet users have is that someone will steal our password. Hackers use different techniques to achieve this and take control of some services, social networks or email between them. Once inside, they have the power to do what they please. From taking control of our identity or, worst of all, accessing other keys to managing our bank details or making online purchases. Therefore, someone knowing our password is really dangerous.
Now, how do you know if someone has it? It is possible that we are so calm that a hacker really knows it and can make use of it at any time. There are some methods to find out. Keep reading to know them.
Troy Hunt, Australian security researcher and creator of Have I been Pwned ?, expanded his website last summer with a section to find out if our password has been compromised. This is Pwned Passwords, which has a database of 306 million leaked passwords. In this way, it is possible to know if any are on the list. To use the tool you just have to enter, type your password in the search box and click on pwned ?. Seconds later you will be able to know if your pass is in a database or has not been registered. You should bear in mind that the fact that it does not appear does not necessarily mean that it is a good password, it simply is not indexed on this site. However, it is always better to check.
In the event that it is compromised, you will see a message in red that will indicate how many times it has been involved in a leak. In that case, it is advisable that you change it immediately and find a strong and safe one.
If you are somewhat suspicious and you are afraid that when you enter your password to verify it, this website will save it in its database, there is also the possibility of accessing the information without having to write a letter. The page provides the ability to download the complete list of all compromised passwords. Of course, it is an Excel file with a weight of 5 GB, so you will have to have some patience when downloading.
Check your email
If you use Google's email service, Gmail, you can rest assured that you will be notified if someone tries to access your account. If at any time when entering your email you find a message from Google that indicates the following: "A suspicious login has been prevented", this means that an attempt to login to your account has recently been blocked because from the company weren't sure it was you. To help protect your account, Google sends an email when it detects unusual sign-in activity, such as an attempt to sign in from a different location or mobile than usual.
For greater security, if you receive an email from Google in your inbox informing you that some unusual activity has been detected, follow the instructions below in order to verify it and be able to change your password if you see something out of the ordinary. the normal.
- Go to the My Activity page.
- Review recent activity and see if there are any unknown devices or locations. It is also possible to click on any of the events in the list to have more details about it on the right side.
- If you detect any activity that you don't recognize, click Protect your account.
- Follow the steps that appear to change the password.
On the other hand, if you see suspicious activity on your account at any time, it is possible that someone else is using it without your permission. In the event that you are unable to log in, go to the account recovery page to answer as many questions as you can. Also, if possible, use a tablet, mobile or PC that you usually log in normally. Likewise, with the browser and in your usual location (home or work).
Details matter, so write your password and security answers exactly as they are. Pay attention to the use of upper and lower case. If Google asks you for the last password you remember, write it down, the more recent the better. On the other hand, a secondary email address will help you regain control of your account. Therefore, try to enter an email that is associated with it.
Sometimes prevention is the best weapon to prevent a hacker from stealing our passwords. All precautions are little, therefore we recommend that you change them periodically. For example, once a month put a new one in the different services you use. Also, don't put the same on all. On the other hand, always choose a strong and secure password. As we always recommend, avoid the type "1234", your date of birth, pet's name ... On the Internet there are pages and programs that generate robust passwords of the extension you choose.
Of course, if you are on a public computer, avoid typing your passwords. But, if you have no choice, make sure that you do not save or record them and that you erase all traces of your passage through that team at the end. Similarly, pay attention to your surroundings. When entering a password in a public place, see if someone is watching. Believe it or not, there are people who are aware of this and then appropriate your password and your identity.