Saturday, June 26, 2010
A new Solution for Network Administrators to Prevent Cyber Hacking
Friday, June 25, 2010
An International Partnership Against Cyber Terrorism in Malaysia
Source:
http://security.org.my/index.php?/archives/Making-an-IMPACT-on-Cyber-terrorism.html
Thursday, June 24, 2010
Some Hints to Prevent Your Bank Accounts from Being Hacked
These days the hackers are looking for the ways to earn some money as well as destroying and making problem for the websites. One of these way is to penetrate the users bank account and transfer and steal money from their accounts. As we see nowadays most of us are doing our banking activities via internet so in case we won’t be precautious we may lose all our assets. There are some hints which might help us to prevent our bank accounts and credit card from being hacked. Some of them are as follows:
· Try to use OS like Linux instead of windows as this OS is the most vulnerable one.
· Try to use the most secure web browsers and email services.
· It would be necessary to install a firewall and antivirus program on your system.
· Using Wi-Fi connections just in the secure place like your office and your home.
· Encrypting all your valuable information on your hard drives including your bank account passwords.
· Social networking websites such as Twitter and Facebook can be another source of being hacked, so try to be very cautious while surfing these websites.
· Last but not least, try to use strong password by combining alphabets and numeric in your password.
As a conclusion the bank all over the world are trying to make their websites as much secure as they can, but still the carefulness of the costumers is required to decrease such the events.
Source:
http://www.panamalaw.org/prevent_bank_account_hacking-Dec2009.html
Tuesday, June 22, 2010
Hacker Arrested By FBI
Monday, June 14, 2010
A Scientist Infected By a Computer Virus
Nowadays using these micro computers in medical science makes the scientist to be worry about the threats that these electronic devices might have for human beings. Dr Gasson attached one of these micro-chips to his hand to make a secure connection with his university building and his mobile phone. As he mentioned when this device implanted in his body it became a part of his body and whatever happened to the function of this device will affect him. The results of his experience as the first human being who has infected by a computer virus were presented at the IEEE International Symposium on Technology and Society in Australia in June 2010.
This scientist threatens us about the dangers we might encounter in the near future because of using such the technologies to enhance ourselves.
Source:
Thursday, May 27, 2010
How Hacking Of Passwords Is Achieved?
These days several methods of password hacking is getting popular.
These methods can be categorized into 3 main sections which are as follows:
-the first and probably the most convenient method for hackers is social engineering which will get some personal information from you and will guess your password according to those info.
-the second way is decrypting your encrypted password key which was made by a hash program to achieve your password, this method needs lots of knowledge and a skilled and experienced hacker.
-the third and the last method is by using Brute Force technique which is done by a program , the procedure is very simple ,these programs will try several random keys with different combination to find your password but it would be a bit time-consuming.
My suggestion is to choose longer and less guessable password to make sure your accounts are safe.
http://www.hackingalert.com/hacking-articles/password-hackers.php
Wednesday, May 12, 2010
Iranian Cyber Army Hacked TWITTER for Several Hours
Doing this activity on a website like twitter caused lots of problems both for the home and business users which were using this platform to communicate with their friends, families and partners and it also make a fear in the user that their personal information and message is not on a secure place on the web.so what will be the result? The result will be a sharp decrease in the number of users who uses this website and it’ not the thing that the creator of such the website looking for. Although the security team of twitter solved the problem several hours later but the effect will last for several months.
The new threat which might encounter the users in the new future is about FACEBOOK , another huge virtual place for the users from different parts of the world.they can not be sure any more that their personal info will keep secure or not?
source:
http://fvdb.wordpress.com/2009/12/18/twitter-hacked-by-iran-cyber-army/
Wednesday, May 5, 2010
Data Theft via Portable Device
As the new portable devices such as Mobile phones, Flash memories and Mp3 players are getting more and more popular, a new security threat is showing up in the networks where the employees are bringing such the things to their workplace for their personal use.
Recently two computer scientists from University of Strathclyde, in Glasgow published an article in “International Journal of Electronic Security and Digital Forensics” which shows the illegal usage of these new portable devices in the workplace computing systems. These two researchers are introducing two methods in their article to decrease the numbers of data theft and malwares distribution via these devices into the computer networks.
The main problem with these devices is because of their large capacity and web connectivity capabilities which let even the normal users to carry huge amounts of data in a very small portable device and also can transfer them to internet or send them as email with Wi-Fi.Their suggestion to the organizations is that they should ban these portable devices to be brought to the workplace which contains valuable and confidential information by their employees. But as we know there is no possible way to remove the data leakage in the workplace completely.
Source:
http://www.sciencedaily.com/releases/2010/03/100331081133.htm
Saturday, May 1, 2010
CNET News on Identity Theft in Facebook
In the first look it doesn’t seem too much critical but it will be a problem when you find out that this basic information can be the password hint for user’s accounts. The same problem was reported by this blog last year which was solved by the Facebook several months ago.
This weblog tries to introduce such the problem to Facebook security team to fill the gaps as soon as possible.
Source:
http://news.cnet.com/8301-13577_3-10270002-36.html
Wednesday, April 28, 2010
Hacking a TV program in Netherland
In this video you will see a well-skilled hacker. As he mention in his video he has hacked a famous live TV program by changing it's subtitles which will confuse the presenter.
you wont believe this?but it is real
Source:
www.youtube.com