Millions of people in the UK and around the world have turned to streaming services, As the Netflix and Disney + to cope with the difficult hours of quarantine. Streaming services are in high demand. As a result, Netflix and Amazon Premium have reduced the quality of the videos to "ease" it network.
Now, security investigators warn cyber criminals are trying to steal streaming user accounts. Their goal is to sell them or use them themselves for surveillance programs free.
"People all over the world are being urged to stay home because of the coronavirus pandemic. That's why many are turning to streaming services for fun, "explained Adenike Cosgrove, its executive director Proofpoint.
Attackers can take advantage of this situation and increase it stealing and selling credentials for streaming services. "We recommend that consumers take a few simple steps to protect them accounts and detect and remove potential unauthorized users, "he said.
Proofpoint explains three key ways in which hackers can steal an account:
The first method involves use malware. Hackers install something like keylogger on the device to steal the password when the user inserts it to sign in to the account.
The second method involves shipment Phishing emails. Criminals deceive victims and make them give their codes, usually on fake login sites.
Finally, it is a common practice obtaining credentials from databases leaked by others hackers and test them on streaming accounts.
“The best ways to protect your streaming credentials is to you are updating your operating system, browser and plugins and yes do not click on links or attachments that are suspicious emails (unknown sources etc.). If you want to visit a streaming site, look for it directly in the browser. Do not access links from emails.
“It's also important to always use one unique, strong password for each of your streaming sites. One can help password manager ”.
In addition, many streaming services now provide an option that alerts you every time one is connected device in your account. This is very important because it allows you to see if an unauthorized device is connected.