How do hackers break through encrypted data

735 views

How do they manage to do it when some simple encryptions are going to take years and the really good one (theoretically) centuries. Which other mean do they use except brute forcing?

In: 20

16 Answers

Anonymous 0 Comments

Phishing is one method, the hackers will send false emails, messages, calls, or even websites that are designed to trick users into downloading malware or even sharing their sensitive information and/or personal data, could even trick them into giving up their passwords willingly, so they don’t have to brute force.

There’s also direct connection, if the hacker can get to your device (hardware), they can just plug in any of their specialized device (like a thumb drive) and run some program to compromise the device and use it to steal the device’s data or even control it.

Don’t even use any random USB cables from strangers or charging station lol, those specialized devices can be so small it can fit in the head of a USB cable (the end of the cable that you plug it in).

You are viewing 1 out of 16 answers, click here to view all answers.