Skip to main content

Hacking Comes of Age

This is a guest post by Izzy .The recent sting operation that took down the group of fake companies that used a Conficker worm to steal $72 million US from consumers brought computer hacking back into the spotlight in a big way. Identity theft had been the focus of the majority of computer-related security reporting since the mid-2000s, so it was interesting to hear about a case of relatively “Old School” hacking succeeding to such a large degree. Though the group did steal client information, their way into the client’s accounts was a fairly simple one. In fact, the Conficker used had been around for almost three years, but it was never used to such an incredible degree, or with so much success.

Hacking in a Nutshell

Computer users everywhere understand that having your computer hacked is not a welcome action. Hacking is, in essence, the act of altering computer and software so that it functions differently from the way it was intended. Just as diaries, notebooks, and photo albums once stored our most precious memories or thoughts, computers serve the same purpose now. Add to that the fact that the majority of our financial transactions occur with the assistance of a computer, and there is the potential for real damage to be caused if a network is compromised.

Mind you, everyone does a little hacking all the time. Whether it is jumping levels in a videogame by inputting a particular sequence of numbers, or altering the code on a website, or downloading music illegally, we all modify software or hardware so that it performs to our liking at least a little bit. We just do not call it hacking. It becomes hacking when an entire program or tool is created in order for the alteration to occur on a large scale, like the open x hacking program that began appearing in OpenX banner ads in 2009. Virus software, security systems and packages, and entire safety networks have been designed and implemented in order to combat this problem.


Hacking Developments

In the 90s and even in the early 2000s, erstwhile hackers would dig through the trash of computer users to find mail and other documents that contained account information, passwords, and other personal content. Private individuals and companies invested in industrial-sized shredders and everyone felt safe once again. However, hackers adapted to the times, and suddenly harvesting information became a game of stealing it during transactions that were occurring online, or hacking directly into the directories of large corporations to gain access to client lists. Viruses were created to maximize the amount of data that could be harvested over a short amount of time.

When virus software began to make it difficult to gather information that way, “phishing” appeared. “Phishing” tricked users into giving away their personal information. The programs required that customers input their personal information into websites that were purportedly legitimate, but were actually merely built to harvest information and then use it in whatever way the hackers saw fit. The average person has become increasingly aware of the various ways that their account information, identity, or funds can be stolen online, and their educated diligence has made it more difficult for large scale hacks to be as wildly successful as they might have been just five years ago.

Why The Recent Hack Worked

The success of the “scareware” ring that resulted in $72 million in losses is notable because it was those very fears upon which the scam played. It was the very idea that the tricked consumers were protecting themselves from being hacked, which allowed the hack to collect such a large amount of money in such a short time. The hack tricked people into buying anti-virus protection by bombarding them with fake security alerts. They then stole client banking information and took small amounts of money from multiple people in various countries. It took cyber-security authorities in the United States, the Netherlands, Latvia, Germany, France, Lithuania, Sweden, and the UK, working together, to pinpoint where the hack originated, as the fake company had servers in multiple cities.

Computer design and development is occurring at lightning speed. For proof, just look to the recent rapid-fire releases of the iPad 2, the Samsung Galaxy, and the Kindle Fire. The computer market is incredibly competitive currently. However, hackers seem to be developing as rapidly as the new technologies. The question then becomes not, what will designers think of next, but what will hackers do to alter it?


Technology Blog

Comments

Popular posts from this blog

Motorola Atrix - Half a year ahead of the iPhone 5

This is guest post by Simon about the Atrix and the iPhone.The Motorola Atrix was released in April, months ahead of the new iPhone. We look at the features the device has brought to the market half a year before the new Apple product even sparks up its iOS.



Motorola Atrix has Dual Core Chip



The Atrix came out of the blocks at a gallop, sporting its new dual core Tegra 2 chip. The device can run at a super fast rate and is future proofed for years to come, such is its pace. This dual core processor and the innards of the Atrix will be something that Apple can only hope to emulate when it arrives. The Atrix shares the same inside as the iPad competing Xoom tablet and Apple will probably rely on the same iPad processor for the iPhone 5 upon its introduction.



Atrix with Fingerprint scanner



There have been so many rumours abound that the iPhone will come with this that and everything else and one of the speculations is for the device to come with a finger print scanner. Now, whether this …

List Of Common Flowers in Kerala With Pictures

Kerala is one of the famous tourist spot situated on the south of India famous for its numerous wild life and thick vegetation. Like the Himalayan ranges on the north of India,

AMOLED display coming to Samsung Galaxy Tab range

This is a guest post by Erica about the arrival of AMOLED display to Samsung Galaxy Tab range.Samsung could be transplanting a seven inch AMOLED screen into an upcoming addition to its Galaxy Tab range of tablet computers.

You may have experienced an AMOLED display in a small portable device before as Samsung, Nokia and HTC have all used them in smartphones to date. However, the expense of producing AMOLED screens has prohibited them from appearing on larger devices like tablets, until now.


The seven inch Galaxy Tab was launched last year but an update with an AMOLED screen would be most welcome, cutting energy consumption and improving colours and contrast ratios across the board.


The rumours about this device state that it will run Android 3.0, feature a three megapixel camera on the rear, a two megapixel snapper on the front and have a display resolution of 1024x600 which is not bad for a device of this size.


The hardware powering the new Galaxy Tab will consist of a 1.2GHz processor w…

Building Blocks for Virtual Businesses : Key technological systems you must have to succeed in the remote business world

This is a guest post by Ripley Daniels about "Key technological systems you must have to succeed in the remote business world.

Whenever I tell friends I had a tough day at the office, they laugh at me. That's because they know I don't really have an office. I work very hard but I work for a company that is completely remote. Only a few of my co-workers ever go into an office at all and when they do, it's only for short periods of time. Our "office" is a virtual one. To us, the traditional office workplace is a thing of the past, alongside Tyrannosaurus Rex, the slide rule, and telephones where you stick your finger in a hole and turn a dial.
Unfortunately, none of this prevents me from having tough days. I still have them. But the reasons have nothing to do with the fact that my co-workers and I don't have a brick and mortar edifice that we can use to plan, strategize, hold our meetings, make presentations, discuss sensitive business topics, build relatio…

5 Common Examples Of Website Design Mistakes by Business Owners

This is a guest post by Sachin about five Common Examples Of Website Design Mistakes by Business Owners . When most business owners think about website design, they think about a brochure online. Online shopping sites are making a lot of money with the use of web-based applications to sell products, collect payments an arrange delivery. The only work left to do is pack and send the boxes. Smart applications can even print out the labels, so the only thing left to do it stick them on the box. Unfortunately, in many cases, websites are replacing people. For those of us left with a job, we can be thankful that many business owners make the following mistakes when it comes to websites and web design.


Don’t have one. This is the first and biggest problem of most business owners when it comes to website design. They think they don’t need one. Who can ever really do with less business? The reason why they have not been getting business from online sources in the past is because they have not …

How Quality Link Building Helps to get Organic Traffic

Internet has become a successful medium of earning income by selling goods online. When sale is involved, marketing comes in evidently. So if you have a website where you are selling some goods of your own or someone else’s then you must be adopt a good marketing strategy so that many people visit your website and see the products you have to offer them. Unless they know about what products or what discount schemes you are offering to them, they will not be able to purchase goods from your website. Generating organic traffic is very important for anyone who is selling through websites. To generate such traffic, link building is the method which can yield positive impact.


What is Organic traffic

Organic traffic is the type of traffic which is resulted without any paid links, or clicks. When users give a search to any search engine like Google, the search results are displayed and after that when the user clicks on a relevant link, then this process is said to generate organic traffic fo…

Home Buying Tips For Women In Real Estate Business

Although real estate has been a booming sector for some time in our country, still it has largely been a male bastion. Usually it’s the male of the house, whether its father or brothers, who make financial decisions and that includes a decision to buy a house.