Skip to main content

Home/ Fabroa ICS2O/ Group items tagged hacker

Rss Feed Group items tagged

Lynn Bui

Exclusive: Apple, Macs hit by hackers who targeted Facebook | Reuters - 0 views

  •  
    This article is about how Apple was hacked on Tuesday February the 19th, 2013. Basically, unknown hackers infected some Apple workers computers when they visited a website for software developers This website had been infected with malicious software that was designed to target Mac computers. Some people are saying that the malware could have originated from China, but there is no proof. Some of the malware was distributed through a site aimed at iPhone developers. It might still be infecting visitors who haven't disabled Java in their browser. F-Secure a security firm wrote that the hackers might have been trying to get access to codes for apps on smartphones which would allow them to infect millions of app users. Hackers recently found out a sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc's Flash software. What I find very interesting is that the breaches described by Apple mark the highest-profile cyber-attacks to date on businesses running Mac computers. This shows that we should make an effort to protect our information especially since one of the largest technology companies has been breached. With cyber security attacks on the rise, we should all be aware and careful of the sites that we are visiting. Apple workers simply visited a website for software developers and became infected with the virus. The hackers are breaking many laws by hacking Apple, Apple intents to find the hackers with the help of the police.
ecaterina smirnov

South Carolina - State Computer System Is Hacked - NYTimes.com - 0 views

  •  
    This article is about South Carolina which had a hacker break into the state's computer system. It was said that a hacker from another country staged several attacks on the State Department of Revenue since August. This exposed 3.6 million social security numbers and 387,000 credit and debit card numbers and all but 16,000 of the credit card numbers are protected by encryption, but hackers can decrypt them. People that filed tax returns since 1998 are to contact state law enforcement officials to prevent identity theft. They still haven't found the hacker. This article relates to Privacy and Security as well as legal issues because it deals with hacking important information profiles of people such as their credit card numbers and social security numbers. As well as creating a possibility for identity theft.  This could create lots of problems for people and the government because of a hacker. It is times like these where we think how we can tighten security for these things stored on the computer? We also think is it just best to stay away from technology for these matters, because of moments like these where mass information that was stored is now exposed.
Joshua Soosaithasan

Facebook's Never Had A Big User Data Breach, But May Never Recover When It Does | TechC... - 0 views

  •  
    This article talks about the problems Facebook could have if it were to be breached by a hacker. Facebook is one of the biggest social networking websites to date and is the biggest holder of personal information, and yet they have been able to keep this information safe from hackers. Comparing to Twitter who had 250,000 accounts accessed by hackers, Facebook has done a remarkable job to keep our information safe, and although they have been able to do so for now, eventually they will have to face the problems of hackers. When you look at Facebook over other social networking sites like Twitter and Tumblr, there is a big difference when it comes to privacy and security. Twitter, for instance, is a more public social networking site with the odd soul that locks their account from the public. Facebook has privacy by default, which means Facebook has a lot more to lose if they were to get hacked. The physical damage that would pertain to us would include some of our photos and messages might be stolen, and the worst that could happen would pertain to credit card information, but Facebook would jump on and respond to these problems with password changes and other stuff. The real damage that would hit Facebook hard would be the psychological damage, and it would nearly destroy them. When something big happens in our society, the media jumps on this and will twist the truth in the story to give us, the viewers, the best story that will manipulate us into thinking an entire wrong. Facebook would be all over the media, whether it be on the radio, on the internet, on the news or in newsprint. The world would know about what happened, and fear would sweep across the globe.  People would start asking questions about what is safe on Facebook and if it is safe at all. Facebook already has a problem with people not being sure if everything is safe on Facebook, and this would just ruin everything for Facebook. No matter how much Facebook tries to keep its network safe, i
  •  
    TL;DR
  •  
    TL;DR
Holly Di Bart

Etsy Will Send 20 Women to Summer Hacker School - 0 views

  •  
    This article is about Etsy sending 20 of their female engineers to a hacker school in New York City to learn more about coding. Etsy finds it very important that they send women because in the engineering field women are a minority. Etsy's VP, Marc Hedlund believes that we need to start introducing engineering to women sooner, like in elementary school. I found this very interesting because I think it would be great if the school systems started introducing engineering earlier. As well I found it interesting how so few women were in the engineering field. 
Marquise Swaby

Hackers attempt to access AT&T customer records, prompts millions to Rethink Passwords - 1 views

  •  
    A bunch of hackers got close to busting down AT&T's virtual equivalent. The hackers were hard at work, trying to access account information. The carrier discovered the attack and shut it down before they could breach.
marktoniolo

Ukrainian hackers claim takedown of NATO Web sites | Security & Privacy - CNET News - 0 views

  •  
    This week, pro-russian hacking groups have said that they have took down many of NATO's websites. The group that claimed attack was Cyber Berkut a hactivist group. The type of attack was a DDOS attack (distributed-denial of service). The attacks came when Ukraine decided if its Crimea region was to join Russia. The Russian government has also ordered ISP's (internet service providers) to block certain anti-Putin websites. I believe this hacking is just a less violent form of Ukraine vs Russia. I still do not believe why Pro-Russian hackers would interfere with a referendum that would actually co-inside with their very own beliefs.
Farid Manafov

Adobe Fixes Flash Privacy Panel so Hackers Can't Check You Out | Webmonkey | ... - 0 views

  •  
    Adobe flash turns out to be a easy to get hacked file. There are ways to access  your microphone or webcam without proper prevention. Adobe has updated their software and it should be prevented.
  • ...3 more comments...
  •  
    So somehow hackers could hack your flash privacy panels, for short is that they can check you out on your camera. But now they fixed it so they can't see you through your camera, especially if you don't have your clothes on.
  •  
    spam
  •  
    no one read's this
  •  
    hola signor
  •  
    hi
Alyssa Ayade

NASA Was Hacked 13 Times Last Year - 0 views

  •  
    These hackers have stolen a lot from NASA such as access codes to over 150 NASA employees and causing significant disruption to mission operations. This just goes to show that big important companies like NASA aren't as secure with their stuff if people are able to hack into their computers.  These intrusions were discovered to be hackers working through China-based IP addresses. This worries me as to how easily people are able to hack because if they are able to bypass even NASA's computers then they could also hack into other places just as easily.
Justin Hernandez

Cross-site Scripting Attacks Up 69% - 0 views

  •  
    This articles talks about how a computer security attacking program called Cross-site Scripting (XSS) is being more popular among hackers. As we know, ISC2O which is us, spend our classes on the computers each day. This scripting partially relates to what we do since we have already learned basics of HTML and CSS programming languages. Not to mention, we're leading up to learning about Java Script which is one example of a scripting language such as XSS. There are probably a few of us that have had our own computers attacked(hacked) or put our own secretive information has been put onto the web. Many of us use social networks and sometimes, we display some personal information which can be retrieved by others through using this program. In addition, when we buy different products online, we put out some credit card details that can also be stolen and potentially be used. In addition, the number of cyber attacks can still rise as the holidays come by and eCommerce will increase and can cause more attacks. This relates to Privacy and Security this has to do with social networking as information that's displayed can be stolen and any other personal information can be taken.
Marco D

Hackers wanted $50,000 to keep Symantec source code private - 1 views

  •  
    ...And this is why no one should use Norton. Ever. Well that's not the only reason, it's slow, it makes you pay expensive subscription fees and it tends to put pop-ups on your desktop, but this is a good reason not to use it too.
Alyssa Ayade

Hackers Will Replace Terrorists as Top Threat, Says FBI - 0 views

  •  
    As the title states, hacking will soon be a top threat over terrorists. Hacking is a big deal because the people who do hack are able to take data - especially important data - from their sources and use it for their own benefit. For businesses, this is highly critical because just like that, any ideas you may have stored on computers could be gone and in the hands of others. Also, hacking might not be just for stealing data but also inputting viruses into other computers. In the US, two bills are being set to beef up the security of government networks to be protected from any cyber attacks. 
  •  
    scary, but true
Boris Smirnov

Evernote Hack Exposes User Data, Forces Extensive Password Resets | Threat Level | Wire... - 0 views

  •  
    Previously, Twitter, Apple, and Facebook have been on the list of tech companies hacked within the last couple of weeks. As of March 2nd, 2013, Evernote also joins this list when their network is breached by an attempt to access secure areas of the Evernote Service. Evernote has notified users via  e-mail, blogs, and social media to change passwords so that users personal information can remain safe on the Evernote network. The hackers had successfully accessed usernames, e-mail adresses and encrypted passwords, however, they were stopped before any damage could be done. This relates to the "Privacy & Security" category because users data and personal information is being accessed without authorization. Obviously, this can cause many problems for users especially because their work and information can be stolen or deleted. Evernote encourages creating a strong password to ensure that an account remains secure, however, this is a questionable matter because the website should also consider upgrading their system in order to keep users safe. As part of the eLifestyle, many users rely on cloud storage to store information, especially on Evernote. The recent hacking just proves how reliable cloud storage really is. When saving data, it is important to consider the possibility of it being stolen or deleted. With this in mind, one shouldn't depend on cloud storage for saving all of their work or important material as it hasn't proven to be very reliable. And if you are using cloud storage, it would be smart to backup important files on a USB or Computer.
Jonathan Barbieri

Remains of the Day: iOS 6.1.3 May Kill the Evasi0n Jailbreak - 0 views

  •  
    the iOS hackers who wrote the evasi0n jailbreak for iOS 6, the beta for iOS 6.1.3 will patch at least one of the vulnerabilities that the evasi0n exploits in order to work. After 6.1.3, Wang stated that they may have to build a new jailbreak from scratch. Reports indicate that iOS 6.1.3 will also fix the passcode bug that's gone unpatched since 6.0.1 as well as the newly-discovered passcode bug in 6.1. This will deny any access to free aps that people want to download. Apple has stated a more serious security issue to push out its latest update. The patch also fixes a bug discovered earlier this month that allows anyone who gains physical access to a phone to bypass its lockscreen in seconds and access contacts and photos
anthony garisto

Cyberwar Imperative: We Need A Next-Generation Internet - ReadWrite - 0 views

  •  
    With people becoming more tech savvy, the security and firewalls of major websites and servers are becoming just obstacles to hackers looking for valuable information these websites contain.  Michael Tchong suggests that we need a new internet, one built from the ground up. He says that China is far more advanced with technology and internet security than that of the United States and Canada. Some suggestions that Michael Tchong has made for this new internet is making the internet so secure that to hack it, you will need to be a genius with alot of time on your hands. He proposes that there should be a next-generation eye-recognition technology using a computer or mobile camera. This will help sites like Facebook and LinkedIn in their endless battle against identity fraud. Also he thinks that it should only be accessed by Americans for obvious reasons that the Chinese and other known hacking countries would try and destroy the new internet.  
Dragos Penelea

How to Crack a Wi-Fi Network's WPA Password with Reaver - 1 views

  •  
    This post is on cracking Wi-Fi WPA passwords with "Reaver." Many people know that cracking a WEP password is fairly easy, so they use the more bulletproof WPA security protocol. Reaver is a program that exploits a security hole in wireless routers and can crack most routers' passwords with relative ease. First off, you will need the BackTrack 5 Live DVD. Download the Live DVD from BackTrack's download page and burn it to a DVD. Next, you need a computer with Wi-Fi and a DVD drive. Lastly, you need a nearby WPA-secured Wi-Fi Network. Using four steps you can hack into a WPA Wi-Fi Network. Step 1: Boot into BackTrack, Step 2: Install Reaver, Step 3: Gather the Router's information, and Step 4: Crack the WPA password to the Wi-Fi Network. Now I will explain how you can protect against Reaver attacks. Since the vulnerability lies in the implementation of WPS, your network should be safe if you can simply turn off WPS (or, even better, if your router doesn't support it in the first place), however Reaver may still be able to crack your password, even with WPS manually turned off. You could also set up MAC address filtering on your router (which only allows specifically whitelisted devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a whitelisted device and use MAC address spoofing to imitate that computer. The good news is that there is a way to surely protect against Reaver. You can get the open-source router firmware DD-WRT installed on your router. Reaver has been tested on routers with this firmware and it was not able to crack the password. As it turns out, DD-WRT does not support WPS, so there's yet another reason to love the free router-booster.
Adrian Ma

'Jesus' and 'Ninja' Infiltrate List of Worst Passwords | TechnoBuffalo - 0 views

  •  
    According to SplashData, a new list of "Worst Passwords of 2012" has been published and some of the new worst passwords include "jesus", "ninja", "welcome", and more. SplashData gets their information based on files containing millions of stolen passwords posted online by hackers. These are perhaps the worst passwords that can ever be used when protecting your account. The best passwords contain at least eight characters and uses a combination of numbers, letters, and even symbols. "password" remains the most used, but worst password ever. For some of my less important accounts, I too also have use the password "password".
jonathan molloy

These Shortcuts and Tricks Will Help You Master Your iPad - 0 views

  •  
    This website, life hacker is used as a cool way to find easier and simpler ways to do life little challenges. this particuler artilce focuses on cool ways to get the very best out of your ipad through its many awesome uses and features that many people dont know about or know how to take full advantage of.
Ira Garcia

Electronic Security a Worry in an Age of Digital Espionage - NYTimes.com - 0 views

  •  
    This is just crazy. These guys have just taken hacking to the extreme level. I mean there is totally no privacy anymore. People from the U.S. government go to China or Russia with few or no electronic devices due to the fear of getting hacked. There is this guy named Kenneth Lieberthal who is an expert in travelling, takes extraordinary precautions whenever he goes to China. When he is there, he disables his bluetooth and Wi-Fi, never lets his phone out of sight, and in meetings, not only does he turn off his phone, but also takes out the battery, for fear that hacker might snoop in to their discussions by turning on his microphone remotely. Personally, I would hate to see what would happen for the next ten years of technological advancement.
Holly Di Bart

55% of Shoppers Are Uncomfortable Giving Credit Card Info to Social Networks [INFOGRAPHIC] - 0 views

  •  
    This article talks about how people are not comfortable giving their credit card information to social networks. I agree with these people. Something as valuable and important as your credit card info should be protected. There are many hackers online and once you put something online you can never get it back. I found it interesting to discover that men ages 45-54 use their mobile devices to access social networks more than 18-44 year old people. 
1 - 20 of 32 Next ›
Showing 20 items per page