Saturday, June 26, 2010
A new Solution for Network Administrators to Prevent Cyber Hacking
Friday, June 25, 2010
An International Partnership Against Cyber Terrorism in Malaysia
Source:
http://security.org.my/index.php?/archives/Making-an-IMPACT-on-Cyber-terrorism.html
Thursday, June 24, 2010
Some Hints to Prevent Your Bank Accounts from Being Hacked
These days the hackers are looking for the ways to earn some money as well as destroying and making problem for the websites. One of these way is to penetrate the users bank account and transfer and steal money from their accounts. As we see nowadays most of us are doing our banking activities via internet so in case we won’t be precautious we may lose all our assets. There are some hints which might help us to prevent our bank accounts and credit card from being hacked. Some of them are as follows:
· Try to use OS like Linux instead of windows as this OS is the most vulnerable one.
· Try to use the most secure web browsers and email services.
· It would be necessary to install a firewall and antivirus program on your system.
· Using Wi-Fi connections just in the secure place like your office and your home.
· Encrypting all your valuable information on your hard drives including your bank account passwords.
· Social networking websites such as Twitter and Facebook can be another source of being hacked, so try to be very cautious while surfing these websites.
· Last but not least, try to use strong password by combining alphabets and numeric in your password.
As a conclusion the bank all over the world are trying to make their websites as much secure as they can, but still the carefulness of the costumers is required to decrease such the events.
Source:
http://www.panamalaw.org/prevent_bank_account_hacking-Dec2009.html
Tuesday, June 22, 2010
Hacker Arrested By FBI
Monday, June 14, 2010
A Scientist Infected By a Computer Virus
Nowadays using these micro computers in medical science makes the scientist to be worry about the threats that these electronic devices might have for human beings. Dr Gasson attached one of these micro-chips to his hand to make a secure connection with his university building and his mobile phone. As he mentioned when this device implanted in his body it became a part of his body and whatever happened to the function of this device will affect him. The results of his experience as the first human being who has infected by a computer virus were presented at the IEEE International Symposium on Technology and Society in Australia in June 2010.
This scientist threatens us about the dangers we might encounter in the near future because of using such the technologies to enhance ourselves.
Source:
Thursday, May 27, 2010
How Hacking Of Passwords Is Achieved?
These days several methods of password hacking is getting popular.
These methods can be categorized into 3 main sections which are as follows:
-the first and probably the most convenient method for hackers is social engineering which will get some personal information from you and will guess your password according to those info.
-the second way is decrypting your encrypted password key which was made by a hash program to achieve your password, this method needs lots of knowledge and a skilled and experienced hacker.
-the third and the last method is by using Brute Force technique which is done by a program , the procedure is very simple ,these programs will try several random keys with different combination to find your password but it would be a bit time-consuming.
My suggestion is to choose longer and less guessable password to make sure your accounts are safe.
http://www.hackingalert.com/hacking-articles/password-hackers.php
Wednesday, May 12, 2010
Iranian Cyber Army Hacked TWITTER for Several Hours
Doing this activity on a website like twitter caused lots of problems both for the home and business users which were using this platform to communicate with their friends, families and partners and it also make a fear in the user that their personal information and message is not on a secure place on the web.so what will be the result? The result will be a sharp decrease in the number of users who uses this website and it’ not the thing that the creator of such the website looking for. Although the security team of twitter solved the problem several hours later but the effect will last for several months.
The new threat which might encounter the users in the new future is about FACEBOOK , another huge virtual place for the users from different parts of the world.they can not be sure any more that their personal info will keep secure or not?
source:
http://fvdb.wordpress.com/2009/12/18/twitter-hacked-by-iran-cyber-army/
Wednesday, May 5, 2010
Data Theft via Portable Device
As the new portable devices such as Mobile phones, Flash memories and Mp3 players are getting more and more popular, a new security threat is showing up in the networks where the employees are bringing such the things to their workplace for their personal use.
Recently two computer scientists from University of Strathclyde, in Glasgow published an article in “International Journal of Electronic Security and Digital Forensics” which shows the illegal usage of these new portable devices in the workplace computing systems. These two researchers are introducing two methods in their article to decrease the numbers of data theft and malwares distribution via these devices into the computer networks.
The main problem with these devices is because of their large capacity and web connectivity capabilities which let even the normal users to carry huge amounts of data in a very small portable device and also can transfer them to internet or send them as email with Wi-Fi.Their suggestion to the organizations is that they should ban these portable devices to be brought to the workplace which contains valuable and confidential information by their employees. But as we know there is no possible way to remove the data leakage in the workplace completely.
Source:
http://www.sciencedaily.com/releases/2010/03/100331081133.htm
Saturday, May 1, 2010
CNET News on Identity Theft in Facebook
In the first look it doesn’t seem too much critical but it will be a problem when you find out that this basic information can be the password hint for user’s accounts. The same problem was reported by this blog last year which was solved by the Facebook several months ago.
This weblog tries to introduce such the problem to Facebook security team to fill the gaps as soon as possible.
Source:
http://news.cnet.com/8301-13577_3-10270002-36.html
Wednesday, April 28, 2010
Hacking a TV program in Netherland
In this video you will see a well-skilled hacker. As he mention in his video he has hacked a famous live TV program by changing it's subtitles which will confuse the presenter.
you wont believe this?but it is real
Source:
www.youtube.com
Monday, April 26, 2010
A new Laser Security device to prevent Hackers from Accessing CIA
Recently a university professor named “ Dr. Jacob Scheuer” in Tel Aviv University introduce a new digital security method by means of Laser technology. In this method the encryption data for accessing the system is in the form of light pulses.
His device acts like a sender and reciver to encrypt and decrypt the lock-keys, so only the person with the provided device can access to the database.
His new invention will be presented in the upcoming Lasers and Electro-Optics (CLEO) conference in California. As Dr. Jacob Scheuer mentioned his new device is the best ever as it has no signal loss in the long distance, he indicates that according to his testing there had been no problem for over 3000 miles distance and it can be even more with no major problem.
This new technology will be used in the near future in CIA and other Corporations which need a high security for their databases access.
Source:
http://www.sciencedaily.com/releases/2010/03/100323121834.htm
Tuesday, April 20, 2010
Meaning of Hacking and the Different Kinds of Hackers
BLUE HAT HACKERS: A person outside computer security team, who tries to bug test a system prior to its launch, looking for exploits so they can be closed. The Microsoft employees who have blue badges are the origin of this name.
GRAY HAT HACKERS: Grey Hat hackers are morally ambiguous. They act in their own self-interests and do not think about the legal aftereffect of their actions. They do not actively seek to break the law, but are not concerned if such is the outcome.
WHITE HAT HACKER: White Hat hackers are individuals who hack into computer systems solely to see how the computer's security systems work and discover security weaknesses to help the system administrator.
BLACK HAT HACKER: Black Hat hackers are the complete opposite of "White Hats." Black Hats break into security systems in order to steal credit card numbers, vandalize websites or otherwise do harm.
SCRIPT KIDDIES: Script Kiddies are fake-hackers. They use pre-packaged, pre-written software to slip past Internet security protocols and are generally looked down upon in the various hacking communities.
HACKTIVIST (rare): A hacktivist is a hacker who uses technology to announce a political message. Web vandalism is not necessarily hacktivism.
Sunday, April 18, 2010
Hacking Incidents 2009
Therefore the output will definitely have some US-centricity but is nevertheless interesting.
There is no secret that the attackers go for money. Cybercrime came from cool to cash! If you look what the attacker did after a successful attack, this proves this statement once more:
Saturday, April 17, 2010
Email Hacking
Social Engineering
If caught, the hacker can lose his email account and, if he does perpetuate a financial crime as a result of the hack, can be arrested and prosecuted for fraud.
Workplace Sabotage
Some of the most grievous cases of email hacking happen in the workplace. In one such case an information systems manager for an organ donation database was fired and was able to hack into her email account and maliciously delete important data before the company locked her account. She was arrested, tried and convicted of unauthorized computer use and was sentenced to two years in prison.
General Sentencing Guidelines
While the most common penalty is loss of email account services, in some instances fines, prison sentences and a combination of these two penalties can result from successful prosecution of email hacking. Sentences range from a $5,000 fine for one instance of unauthorized access to twenty years in prison for multiple offenses involving multiple victims and damage greater than $1 million.