Skip to main content

Home/ Fabroa ICS2O/ Group items tagged hack

Rss Feed Group items tagged

keno aguiar

Student who Hacked into Facebook Employee Account Gets Jail Time [VIDEO] - 0 views

  •  
    A 26 year old software development student named Glenn Mangham had hacked into a facebook employees account. He claimed he was helping facebook to increase security. He is now going to jail for 8 months,  and facebook had to pay $200, 000 to deal with the hack. This has to do with the class because it deals with computers and using programs to hack into other websites.
  •  
    this article is about a twenty six year old man named Glenn Mangham who hacked facebook and said it was to help them with their security issues. He was sent to jail for eight months and Facebook spent $200,000 dealing with this hacker. i thought this was interesting because it seemed pretty unbelievable one guy hacked into the biggest social networking site. 
Alyssa Ayade

NASA Was Hacked 13 Times Last Year - 0 views

  •  
    These hackers have stolen a lot from NASA such as access codes to over 150 NASA employees and causing significant disruption to mission operations. This just goes to show that big important companies like NASA aren't as secure with their stuff if people are able to hack into their computers.  These intrusions were discovered to be hackers working through China-based IP addresses. This worries me as to how easily people are able to hack because if they are able to bypass even NASA's computers then they could also hack into other places just as easily.
Stephanie Bortolin

3 Celebrity Hacks to Learn From - 1 views

  •  
    On the internet, it,s our responsibility to keep our personal lives private. This article is about how 3 celebrities got hacked, and how we can learn from it. The celebrities include Paris Hilton, who's phone got hacked and her personal information was posted. Scarlett Johansson had nude pictures of her, and lastly, Brett Favre who also had nude pictures of himself. We need to be aware of the fact that our personal information may be falling into the wrong hands. Celebrities have different lives than us, particularly those who have paparazzi who follow them around all day which means the information a celebrity chooses to keep on a digital device is in jeopardy. Imagine if someone was constantly trying to hack into your e-mail or social accounts to post embarrassing things about you? This is why we have to be careful about what we post online.
Alyssa Ayade

Hackers Will Replace Terrorists as Top Threat, Says FBI - 0 views

  •  
    As the title states, hacking will soon be a top threat over terrorists. Hacking is a big deal because the people who do hack are able to take data - especially important data - from their sources and use it for their own benefit. For businesses, this is highly critical because just like that, any ideas you may have stored on computers could be gone and in the hands of others. Also, hacking might not be just for stealing data but also inputting viruses into other computers. In the US, two bills are being set to beef up the security of government networks to be protected from any cyber attacks. 
  •  
    scary, but true
Lynn Bui

Man arrested over bizarre hacking campaign involving cat - 0 views

  •  
    This article is about a man in Tokyo who sent many mass killing threats to a comic book event and many schools. Each threat would be followed by a riddle. The man hacked computers and sent messages to newspapers and broadcasters saying that details of a computer virus used to send the threats were strapped to a cat living on an island near Tokyo. Police found the cat and with it found a message that said that no more messages will be sent. Police analyzed the memory card and footage taken by security cameras and suspect that Katayama -a resident of Tokyo- was responsible for the hacking campaign. This article is a prime example of the dangers of computing and shows that the security of our computers is still not perfect and can be breached. I see this man's act as a childish call for attention and believe that this man should grow up and "get a life" as some would say. I don't understand how a grown man could have the heart to threaten the lives of many innocent children; I hope that there is retribution for such an offense.
Boris Smirnov

Evernote Hack Exposes User Data, Forces Extensive Password Resets | Threat Level | Wire... - 0 views

  •  
    Previously, Twitter, Apple, and Facebook have been on the list of tech companies hacked within the last couple of weeks. As of March 2nd, 2013, Evernote also joins this list when their network is breached by an attempt to access secure areas of the Evernote Service. Evernote has notified users via  e-mail, blogs, and social media to change passwords so that users personal information can remain safe on the Evernote network. The hackers had successfully accessed usernames, e-mail adresses and encrypted passwords, however, they were stopped before any damage could be done. This relates to the "Privacy & Security" category because users data and personal information is being accessed without authorization. Obviously, this can cause many problems for users especially because their work and information can be stolen or deleted. Evernote encourages creating a strong password to ensure that an account remains secure, however, this is a questionable matter because the website should also consider upgrading their system in order to keep users safe. As part of the eLifestyle, many users rely on cloud storage to store information, especially on Evernote. The recent hacking just proves how reliable cloud storage really is. When saving data, it is important to consider the possibility of it being stolen or deleted. With this in mind, one shouldn't depend on cloud storage for saving all of their work or important material as it hasn't proven to be very reliable. And if you are using cloud storage, it would be smart to backup important files on a USB or Computer.
Michael Cambare

Skynet Alert! US Military Drones Infected By Mysterious Virus - 0 views

  •  
    Military drones based in Pakistan have been hacked this week by an unknown source. They have yet to turn on their masters and the hacking has been so far benign. The question is, who is doing the hacking? This outlines the government's susceptibility to computer attack. Their ignorance and dependance on conventional warfare will fire back at them one day.
Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
Ira Garcia

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 0 views

  •  
    This is just crazy. These guys have just taken hacking to the extreme level. I mean there is totally no privacy anymore. People from the U.S. government go to China or Russia with few or no electronic devices due to the fear of getting hacked. There is this guy named Kenneth Lieberthal who is an expert in travelling, takes extraordinary precautions whenever he goes to China. When he is there, he disables his bluetooth and Wi-Fi, never lets his phone out of sight, and in meetings, not only does he turn off his phone, but also takes out the battery, for fear that hacker might snoop in to their discussions by turning on his microphone remotely. Personally, I would hate to see what would happen for the next ten years of technological advancement.
Nikita Varabei

Are Your Future Passwords Hidden In the Jiggling of Your Eyeballs? - 0 views

  •  
    This article describes how scientists are working to create new top off the line security. As we've seen in many sci-fi movies ; there is such a thing as eye scanners. they have existed for sometime now, but they have been primitive and worked just by using the iris of your eye. This could be faked easily by someone just taking a picture of your eye and simply holding it to the screen. This new technology however is a lot more sophisticated. It uses your eyes "fixations" and "saccades" to determine if it is really you. Fixations is how your eye behaves when it is still and saccades is how your eye behaves when it is moving from point to point. This new technology is a breakthrough in security, as it is virtually impossible to fake. no more stolen passwords, or hacked systems. Now unless its really you, the system wont let the person in. THis is extremely important as it prevents theft, hacking, and many other problems. To conclude, this technology is extremely important to our security and will greatly contribute to our future
anthony garisto

Cyberwar Imperative: We Need A Next-Generation Internet - ReadWrite - 0 views

  •  
    With people becoming more tech savvy, the security and firewalls of major websites and servers are becoming just obstacles to hackers looking for valuable information these websites contain.  Michael Tchong suggests that we need a new internet, one built from the ground up. He says that China is far more advanced with technology and internet security than that of the United States and Canada. Some suggestions that Michael Tchong has made for this new internet is making the internet so secure that to hack it, you will need to be a genius with alot of time on your hands. He proposes that there should be a next-generation eye-recognition technology using a computer or mobile camera. This will help sites like Facebook and LinkedIn in their endless battle against identity fraud. Also he thinks that it should only be accessed by Americans for obvious reasons that the Chinese and other known hacking countries would try and destroy the new internet.  
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Jason Strassler

6 Tips for Better Mobile Security - eSecurity Planet - 0 views

  •  
    I learned from this article how to secure your information on your mobile device using 6 simple tips. Setting a solid password, installing antivirus or security apps, and using encryption, a hardware security system, are just a few various methods of how to help and improve the security on the everyday use of your phone. Mobile security is important especially if you have a lot of important and valuable data and information, such as passwords or your email is accessible, you want to know that this information is stored and saved safely on your mobile device for no one but yourself to be able to use. With technology evolving and more and more people are being familiar and learning about hacking and breaking into systems, it is more important and necessary than ever in our society for everyone to have their information secured. Taking your mobile device's security seriously and keeping it at high maintenance is crucial so nobody can hack or see what information is important to you but also so that you aren't giving people the opportunity to rearrange or change this data that you trust that you are the only person to see and alter your personal data at your leisure. 
marktoniolo

Ukrainian hackers claim takedown of NATO Web sites | Security & Privacy - CNET News - 0 views

  •  
    This week, pro-russian hacking groups have said that they have took down many of NATO's websites. The group that claimed attack was Cyber Berkut a hactivist group. The type of attack was a DDOS attack (distributed-denial of service). The attacks came when Ukraine decided if its Crimea region was to join Russia. The Russian government has also ordered ISP's (internet service providers) to block certain anti-Putin websites. I believe this hacking is just a less violent form of Ukraine vs Russia. I still do not believe why Pro-Russian hackers would interfere with a referendum that would actually co-inside with their very own beliefs.
James Zabbal

FreedomPop Announces The Privacy Phone, A Fully-Encrypted Smartphone For $10 A Month | ... - 0 views

  •  
    This article is about a new phone being released by a company called FreedomPop. FreedomPop is an internet service provider that provides mobile service in the US. The phone is known as the Privacy Phone. It is the only phone currently on the market that allows for encrypted communications. It supposedly has 128 bit encryption for voice calls and text messages. Data from the internet is sent through a virtual private network, which is very secure and encrypted. Also the privacy phone allows you to change your phone number whenever you like.I think this is a great idea because many people can be hacked easily these days and finally there is a private way for people make calls, texts and access the internet. With that being said, who knows how long it will be before someone successfully hacks and bypasses the security on this phone.
Matt Visitacion

Beware of This Dangerously Convincing Google Docs Phishing Scam - 0 views

  • A very tricky phishing scam that takes advantage of Google Docs is making its way around the web. And since it uses a google.com URL and even makes use of Google's SSL encryption, it's almost impossible to tell that it's a hack. Your best safeguard, as always, is a little bit of common sense.
  •  
    A scam that takes advantage of Google Docs is making is spreading throughout the web. It uses the same google.com URL and even makes us of Google's SSL encryption. It is very difficult to tell that it is a hack. The scam starts with an email that leads to a GoogleDocs link. It then takes you to a fake login screen. Once you login, you'll be taken to an actual google doc but your credentials will be sent to a PHP script on a compromised server. To avoid this, you must be careful when clicking on links sent in emails, and if the login does not recognize you as a google user, the you should notice that it is the fake log in page. This is actually scary, and everyone should always be aware of their emails and scams.
codrin gherghel

sony gets hacked again but they be prepared - 0 views

  •  
    Sony is suffering from yet another hack attempt on its networks. But this time, the company seems to be better prepared, and apparently all credit card information is safe. Philip Reitinger, Sony's Chief Information Security Officer, has posted an article on the official PlayStation blog explaining the incident.
  • ...3 more comments...
  •  
    Sony is suffering from yet another hack attempt on its networks. But this time, the company seems to be better prepared, and apparently all credit card information is safe. Philip Reitinger, Sony's Chief Information Security Officer, has posted an article on the official PlayStation blog explaining the incident.
  •  
    PEDO BEAR
  •  
    brandon copied me
  •  
    brandon copied me
  •  
    DON'T LISTEN TO CODRIN HE COPIED ME!
Farid Manafov

Why 49% Of Gamers Won't Buy Downloadable Content | GameLife | Wired.com - 0 views

  •  
    Now when a Video Game is released, there is always DLC (Downloadable Content) to be released shortly after, but almost 50% of gamer's don't want to buy them, and the top reason is Security. And this tells why, according to Wired but personally I think that 1. That people are scared to buy anything online due to a recent oopsie when PSN got hacked, plus according to Inside Gaming at Machinima.com is that Xbox live got hacked two. And 2 is why wont they just go to a store and buy a points card at a store, they cant be THAT lazy...right?
justin venturo

How Close Are We to Internet Voting? - 0 views

  •  
    In this article it describes how many wonderful things the internet has brought to us and how they are safe. Over the internet you can do important things like transfer large sums of money or keep important medical documents but there is controversy about voting. If someone could hack something as important as a presidential election it would cause huge economic effects and possibly war. A good thing would be that more people would probably vote if it was so easy to do.
Nicole Luciani

Kitchen hacks News, Videos, Reviews and Gossip - Lifehacker - 0 views

  •  
    THIS DOES NOT RELATE TO THIS COURSE, BUT SINCE WE ALL LIKE FOOD, YOU WILL LIKE THIS. Because when you make grill cheese sandwiches, it always give off that smell no one likes and there's pans to wash and you know we're all so lazy to do that. So here is the simple thing to do, FLIP YOUR TOASTER ON IT'S SIDE! just put the bread in and put the cheese on top of the bread, and THERE YOU GO. i couldn't find ANYTHING. So this caught my eye, and i was like "wow." 
1 - 20 of 43 Next › Last »
Showing 20 items per page