1. Phishing / Tabnabbing (New Phishing Method ) Tabnabbing is a modern type of phishing method used to hack websites passwords. As we all know normal Phishing attack is easily detectable on many site such as Facebook,Gmail, yahoo etc.
Like Facebook has implemented an extra code that validates the previous arriving URL and some basic functions. If it founds that page from which you arrived is a Facebook Phish or fake page, it displays a warning message to user that You have been arrived from fraudulent or fake page. So please change you Facebook account password immediately. So Victim easily came to know that was made fool by someone and he changes his account password again.
2.Keylogging Keylogging, is the easiest way to hack a password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
3.Stealers Almost 80% percent people use stored passwords in their browser to access the webpage, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful. I have already explained about RATs and keyloggers to hack email account passwords, where you have to send your keylogged file to victim. In the same way, stealer can be used to hack email account password and find passwords of various emails.
4.RAT(Remote Administration Tool) A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it. By using this Rats we can easily hack email account passwords.
5.Mobile Phone Hacking Millions of users access webpage through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
6.USB Hacking If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browse..
Be Aware With Such Kind Of Persons