Skip to main content

Home/ Fabroa ICS2O/ Group items tagged hacked

Rss Feed Group items tagged

Ira Garcia

How To Crack the Passcode of Any iOS Device - 0 views

  •  
    You think your iPhone or Android phone is safe from hackers just because of a passcode lock? Well, the Swedish security firm Micro Systemation just developed a cracking program that is called "XRY" that can hack into any, I repeat, any passcode of any mobile device. It works by first jailbreaking the phone to expose security flaws in the OS, then proceeds to brute-force the default four-digit pin, which only has 10,000 possible combinations to begin with. This all happens in under two minutes. Once the device has been unlocked, they can get any information they want- from logs contacts and even DELETED items.
  •  
    It's a shame that this only works by jailbreaking the phone... This could have been... Useful.
Brian Agas

Lifehacker, tips and downloads for getting things done - 2 views

  •  
    this is whrer 100 words description. this is great!
  •  
    I like the article its so amazingly amazing! But it doesnt show me how to hack
  •  
    You can make your friends think they're being hacked by dropping a .bat file that has these commands in their startup folder: echo Loading virus.exe... echo Virus.exe loaded! echo Transmitting passwords... echo Transfer complete! pause
Marco D

Microsoft Store India hacked, username and password database leaked - 1 views

  •  
    Turns out storing private information with no encryption is a bad idea. In other news, researchers today have discovered that the sky is in fact, blue.
Mr. Fabroa

Snapchat hack spams users with smoothie photos | Security & Privacy - CNET News - 0 views

  •  
    this is where your 125 (min) words summary and thoughts/opinion go
  •  
    this is where your 125 (min) words summary and thoughts/opinion go
Walter White

IBM's new services zero in on fraud, financial crime | Business Tech - CNET News - 0 views

  •  
    The article that I have chosen to share for week 4 is about IBM and their new services to help eliminate fraud and financial crime. The article interested be because around 3.5 trillion dollars are lost per year to financial crime and fraud through technology. While the software is being marketed to big companies it also directly involves us, the consumers. For example when Sony's PSN was down thousands of peoples accounts were hacked and had money taken from their accounts. This new software interested me because now people can feel a little more secure using online programs knowing that their information can be safer. It is a new time where many things are bought through the internet and with better security people won't feel as worried about their security
  •  
    The article that I have chosen to share for week 4 is about IBM and their new services to help eliminate fraud and financial crime. The article interested be because around 3.5 trillion dollars are lost per year to financial crime and fraud through technology. While the software is being marketed to big companies it also directly involves us, the consumers. For example when Sony's PSN was down thousands of peoples accounts were hacked and had money taken from their accounts. This new software interested me because now people can feel a little more secure using online programs knowing that their information can be safer. It is a new time where many things are bought through the internet and with better security people won't feel as worried about their security
Radu Cernatescu

Wendy's now lets you pay for a meal with its mobile app - 0 views

  •  
    This is becoming more famous, along with mobile banking, the payment of goods in a store with a mobile phone. This is good for technological advancement and it shows how much we have evolved from paying with paper money to paying electronically. But, there is a downside to this, since it is electronic, it is not very safe because people can hack your mobile phone and steal your money. This fits the eLifestyle tag because it represents how our lives are different with electronics, than it was 50 years ago.
Farid Manafov

Adobe Fixes Flash Privacy Panel so Hackers Can't Check You Out | Webmonkey | ... - 0 views

  •  
    Adobe flash turns out to be a easy to get hacked file. There are ways to access  your microphone or webcam without proper prevention. Adobe has updated their software and it should be prevented.
  • ...3 more comments...
  •  
    So somehow hackers could hack your flash privacy panels, for short is that they can check you out on your camera. But now they fixed it so they can't see you through your camera, especially if you don't have your clothes on.
  •  
    spam
  •  
    no one read's this
  •  
    hola signor
  •  
    hi
Joshua Soosaithasan

Facebook's Never Had A Big User Data Breach, But May Never Recover When It Does | TechC... - 0 views

  •  
    This article talks about the problems Facebook could have if it were to be breached by a hacker. Facebook is one of the biggest social networking websites to date and is the biggest holder of personal information, and yet they have been able to keep this information safe from hackers. Comparing to Twitter who had 250,000 accounts accessed by hackers, Facebook has done a remarkable job to keep our information safe, and although they have been able to do so for now, eventually they will have to face the problems of hackers. When you look at Facebook over other social networking sites like Twitter and Tumblr, there is a big difference when it comes to privacy and security. Twitter, for instance, is a more public social networking site with the odd soul that locks their account from the public. Facebook has privacy by default, which means Facebook has a lot more to lose if they were to get hacked. The physical damage that would pertain to us would include some of our photos and messages might be stolen, and the worst that could happen would pertain to credit card information, but Facebook would jump on and respond to these problems with password changes and other stuff. The real damage that would hit Facebook hard would be the psychological damage, and it would nearly destroy them. When something big happens in our society, the media jumps on this and will twist the truth in the story to give us, the viewers, the best story that will manipulate us into thinking an entire wrong. Facebook would be all over the media, whether it be on the radio, on the internet, on the news or in newsprint. The world would know about what happened, and fear would sweep across the globe.  People would start asking questions about what is safe on Facebook and if it is safe at all. Facebook already has a problem with people not being sure if everything is safe on Facebook, and this would just ruin everything for Facebook. No matter how much Facebook tries to keep its network safe, i
  •  
    TL;DR
  •  
    TL;DR
Justin Hernandez

Cross-site Scripting Attacks Up 69% - 0 views

  •  
    This articles talks about how a computer security attacking program called Cross-site Scripting (XSS) is being more popular among hackers. As we know, ISC2O which is us, spend our classes on the computers each day. This scripting partially relates to what we do since we have already learned basics of HTML and CSS programming languages. Not to mention, we're leading up to learning about Java Script which is one example of a scripting language such as XSS. There are probably a few of us that have had our own computers attacked(hacked) or put our own secretive information has been put onto the web. Many of us use social networks and sometimes, we display some personal information which can be retrieved by others through using this program. In addition, when we buy different products online, we put out some credit card details that can also be stolen and potentially be used. In addition, the number of cyber attacks can still rise as the holidays come by and eCommerce will increase and can cause more attacks. This relates to Privacy and Security this has to do with social networking as information that's displayed can be stolen and any other personal information can be taken.
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
jose valenzuela

The Evolution of Anonymous - 0 views

  •  
    This article is about the history of anonymous, and the top ten hacks that made them famous. the group anonymous says that they support the free speech of the internet. Alot of people see anonymous as a group of bad hackers but, they say that they only attack for a reason. Like when they took down the mega upload site anonymous attacked the FBI site to defend the people and to show that there are consequences for taking down a site.
Sarah Karam

Samsung tweaking Face Unlock to require blinking, smiling still optional -- Engadget - 0 views

  •  
    When your friends get into your phone and know your password it can get quite annoying. Now Samsung has an app that allows you to open your phone with facial expressions. You can blink a certain amount of times and smile and then it will open. This amazing because there has never been something like this before. It relates to the course because you need the software and app to get this on your phone. I personally like this because it would be fun to unlock your phone with facial expressions. It makes a social impact because then it will be harder to hack your friends phone. Overall, I think this was a great idea Samsung brought up. 
Jason Strassler

Google Claims Latest Chrome is Speedier | PCWorld - 0 views

  •  
    This article notifies readers that Google has boosted the speed and their browser's hardware acceleration with the launch of Google Chrome, version 18. Google paid more than $210,000 to outside researchers to identify and prevent a number of bugs, flaws, and hacking challenges from this past year so these same problems wouldn't be involved in this new update. This interests me because I am a Google Chrome user both at home and school and when I hear that another version is offered that speeds up Web applications, various software's such as Adobe Flash Player, games, internet, etc, I am more than pleased to get on my computer to update my browser to overall experience a better and more efficient use while on my computer that Google has to offer. But in my opinion, the most intriguing part of this article is how even with Google constantly updating and improving their web browser, Google Chrome, in the month of February, Google's browser is only third with 18.9% of users, next to Firefox with 20.9% of users, and in first, Microsoft Internet Explorer with more than half of users at 52.8%. People are least invested in Google's web browser and this largely adds to the reason to why they are constantly changing their Google Chrome design to attract but also to maintain their users. My thoughts are how I think it be interesting to see what Google has next up their sleeve because they have the money, technology, and resources to develop a browser that has enough features and limited problems to double and almost triple their amount of web users in hopefully the near future. 
Adrian Galope

New Flashback Trojan Variant Doesn't Need A Password to Infect Your Mac - 1 views

  •  
    This article is about a new virus, namely OSX/Flashback.k, that can hack into your Mac without the need for the admin password. Once infected, the Trojan will attempt to download a code for the main piece of malware, also known as "payload" and attempt to install it one of two ways. The way it installs it depends on whether or not the user inputs his admin password. Once the Mac is infected, the malware then hijacks Safari every time it launches and redirects the user to it's targeted website.
Alyssa Ayade

Keep Your Data Secure Abroad - Wired How-To Wiki - 0 views

  •  
    This article basically gives you an idea on how to protect all the information and data on your computers if you are planning on going abroad. It's helpful especially if you are going to hostile countries because you never know when you'll be targeted by someone who could easily hack into your computers and erase all your data. In short, the article gives you tips on how to easily conceal your data during situations like these. It is important to remember that even if you are going abroad, going on the internet isn't exactly the same as going online in the comfort of your own homes.
Jihae Jeon

Networking News, Videos, Reviews and Gossip - Lifehacker - 1 views

  •  
    This article is very important if you have important files in your computer or of you share your wi-fi with someone else. This article tells you how to protect your computers and data when someone else is using your network. Similar things happened to my family when someone hacked into my network. We had to change our password. There are many ways to protect your computer such as creating a difficult password, turning off file sharing and network discovery, hiding your files, creating a separate network for guest network, or by locking down your network. This would be a very useful for my family to ensure that no one else will break into our network again. I think this article would be very helpful to everyone because I think everyone has something they want to hide form anyone else in their computer and this article could help them to hide those files. 
thomas genga

Snapchat Hacked By Fruit Smoothie Enthusiast | TechCrunch - 0 views

  •  
    i believe that this is an invasion of someones personal privacy.
Robert Augustynowicz

Government spying tools will worsen Internet security - experts - 0 views

  •  
    The United States governments is spying on everyone, and the easiest way to monitor people is through the internet. Many people believe that one day the US government's way of monitoring people will be shared with or found out by a criminal organization. I believe that although it is important for that US governments to put surveillance they should just monitory anyone suspicious. Also I believe that if they spy on everyone it will become easier to find and hack them back. Personally I would not care if a government was watching my every move on the internet because I have nothing to hide. Finally I believe that most people would sleep better if the Government would tell the population if their spying program was compromised.      
‹ Previous 21 - 40 of 43 Next ›
Showing 20 items per page