Birgitta Jónsdóttir's Twitter account: a US court has ruled that Twitter must comply with a Department of Justice demand to release private data held by the social media company, which it seeks as part of its investigation into WikiLeaks. Photograph: guardiannews.com
"In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook."
Andy Coulson, David Cameron's former director of communications was arrested today, shortly after a press conference in which the prime minister took "full responsibility" for his appointment but refused to apologise for it.
There's nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking.
First, don't make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather 'most popular passwords' lists each year. The word 'password', number sequences, and other simplistic phrases or numbers fill the top spots. Also, don't use your name, a password related to another one you might have on a different site, or a login name.
Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them.
By-The Xpert Crew @ http://techvedic.com
Have fun and make games, or hack your homework using Ruby!
Just tell your parents or teachers you're learning Ruby programming... ;)
Free and works on any computer. Click here to see what it looks like
Are you in a habit of using short or same passwords? Then change it now. Online world is becoming risky day by day. Hackers are always ready to hack your account and thus, it is your responsibility to protect yourself against cyber-crimes. We are providing you important tips to create strong as well as secure password.
Everyone is familiar about the term SIM (Subscriber Identification Module) which means small card slides into the back of many smartphones available in the market. Basically, it acts as an official identifier which depicts that your mobile phone belongs to you.
Hacking is not a recent invention. In fact, it has been around since the 1930s, although not always associated with computers. Here's a rundown of some of the most noteworthy hackers in history.