Wednesday, April 28, 2010

Hacking a TV program in Netherland




In this video you will see a well-skilled hacker. As he mention in his video he has hacked a famous live TV program by changing it's subtitles which will confuse the presenter.
you wont believe this?but it is real


Source:
www.youtube.com

Monday, April 26, 2010

A new Laser Security device to prevent Hackers from Accessing CIA


Accessing the user’s confidential information and also big corporations like Pentagon or CIA by hackers shows the need of developing a new method for the network security programmers.
Recently a university professor named “ Dr. Jacob Scheuer” in Tel Aviv University introduce a new digital security method by means of Laser technology. In this method the encryption data for accessing the system is in the form of light pulses.
His device acts like a sender and reciver to encrypt and decrypt the lock-keys, so only the person with the provided device can access to the database.
His new invention will be presented in the upcoming Lasers and Electro-Optics (CLEO) conference in California. As Dr. Jacob Scheuer mentioned his new device is the best ever as it has no signal loss in the long distance, he indicates that according to his testing there had been no problem for over 3000 miles distance and it can be even more with no major problem.
This new technology will be used in the near future in CIA and other Corporations which need a high security for their databases access.

Source:
http://www.sciencedaily.com/releases/2010/03/100323121834.htm

Tuesday, April 20, 2010

Meaning of Hacking and the Different Kinds of Hackers



Nowadays, the term "hacking" most commonly refers to gaining unauthorized access to computer resources, such as databases or websites, typically through software-based exploits, with or without criminal intent. We have different types of hackers, I’ll give a brief description on each of them:

CRACKERS: A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs just for fun of it and sometime to prove his technical skills.
BLUE HAT HACKERS: A person outside computer security team, who tries to bug test a system prior to its launch, looking for exploits so they can be closed. The Microsoft employees who have blue badges are the origin of this name.
GRAY HAT HACKERS: Grey Hat hackers are morally ambiguous. They act in their own self-interests and do not think about the legal aftereffect of their actions. They do not actively seek to break the law, but are not concerned if such is the outcome.
WHITE HAT HACKER: White Hat hackers are individuals who hack into computer systems solely to see how the computer's security systems work and discover security weaknesses to help the system administrator.
BLACK HAT HACKER: Black Hat hackers are the complete opposite of "White Hats." Black Hats break into security systems in order to steal credit card numbers, vandalize websites or otherwise do harm.
SCRIPT KIDDIES: Script Kiddies are fake-hackers. They use pre-packaged, pre-written software to slip past Internet security protocols and are generally looked down upon in the various hacking communities.
HACKTIVIST (rare): A hacktivist is a hacker who uses technology to announce a political message. Web vandalism is not necessarily hacktivism.

Sunday, April 18, 2010

Hacking Incidents 2009

There is a project called the web hacking incident database (WHID), which collects data and statistics on web-application related security incidents. I was just looking into their report called The Web Hacking Incident Database 2009 which has some pretty interesting statistics in.
In order to judge the results and statistics of this database, we have to make sure we understand the contributors and where they come from:




Therefore the output will definitely have some US-centricity but is nevertheless interesting.

There is no secret that the attackers go for money. Cybercrime came from cool to cash! If you look what the attacker did after a successful attack, this proves this statement once more:


But how do they get in? How does a hacker actually attack a Web-Application? Again, not a lot of surprise here, more a confirmation of what we know already:


So, looking at it is definitely worth in order to get a better picture from a security intelligence point of view.

Saturday, April 17, 2010

Email Hacking

As the Internet has grown, email hacking has become a more common problem and one that both Internet service providers (ISPs) and law enforcement continue to fight. Because email is considered private information, email hacking can be a criminal offense and is defined as unauthorized use of an email account. Here's how emails can be hacked, and the punishment that can befall the hacker, if caught.

Social Engineering
Considered almost an art among hackers, social engineering is a scam combining psychological and computer skills. Simply, it is the process whereby a hacker convinces an Internet user via email that she is corresponding with someone she can trust. The hacker asks the victim to email personal information to an untraceable address, usually under the guise of checking security.
If caught, the hacker can lose his email account and, if he does perpetuate a financial crime as a result of the hack, can be arrested and prosecuted for fraud.

Workplace Sabotage
Some of the most grievous cases of email hacking happen in the workplace. In one such case an information systems manager for an organ donation database was fired and was able to hack into her email account and maliciously delete important data before the company locked her account. She was arrested, tried and convicted of unauthorized computer use and was sentenced to two years in prison.

General Sentencing Guidelines
While the most common penalty is loss of email account services, in some instances fines, prison sentences and a combination of these two penalties can result from successful prosecution of email hacking. Sentences range from a $5,000 fine for one instance of unauthorized access to twenty years in prison for multiple offenses involving multiple victims and damage greater than $1 million.