Skip to main content

Hacking Comes of Age

This is a guest post by Izzy .The recent sting operation that took down the group of fake companies that used a Conficker worm to steal $72 million US from consumers brought computer hacking back into the spotlight in a big way. Identity theft had been the focus of the majority of computer-related security reporting since the mid-2000s, so it was interesting to hear about a case of relatively “Old School” hacking succeeding to such a large degree. Though the group did steal client information, their way into the client’s accounts was a fairly simple one. In fact, the Conficker used had been around for almost three years, but it was never used to such an incredible degree, or with so much success.

Hacking in a Nutshell

Computer users everywhere understand that having your computer hacked is not a welcome action. Hacking is, in essence, the act of altering computer and software so that it functions differently from the way it was intended. Just as diaries, notebooks, and photo albums once stored our most precious memories or thoughts, computers serve the same purpose now. Add to that the fact that the majority of our financial transactions occur with the assistance of a computer, and there is the potential for real damage to be caused if a network is compromised.

Mind you, everyone does a little hacking all the time. Whether it is jumping levels in a videogame by inputting a particular sequence of numbers, or altering the code on a website, or downloading music illegally, we all modify software or hardware so that it performs to our liking at least a little bit. We just do not call it hacking. It becomes hacking when an entire program or tool is created in order for the alteration to occur on a large scale, like the open x hacking program that began appearing in OpenX banner ads in 2009. Virus software, security systems and packages, and entire safety networks have been designed and implemented in order to combat this problem.

Hacking Developments

In the 90s and even in the early 2000s, erstwhile hackers would dig through the trash of computer users to find mail and other documents that contained account information, passwords, and other personal content. Private individuals and companies invested in industrial-sized shredders and everyone felt safe once again. However, hackers adapted to the times, and suddenly harvesting information became a game of stealing it during transactions that were occurring online, or hacking directly into the directories of large corporations to gain access to client lists. Viruses were created to maximize the amount of data that could be harvested over a short amount of time.

When virus software began to make it difficult to gather information that way, “phishing” appeared. “Phishing” tricked users into giving away their personal information. The programs required that customers input their personal information into websites that were purportedly legitimate, but were actually merely built to harvest information and then use it in whatever way the hackers saw fit. The average person has become increasingly aware of the various ways that their account information, identity, or funds can be stolen online, and their educated diligence has made it more difficult for large scale hacks to be as wildly successful as they might have been just five years ago.

Why The Recent Hack Worked

The success of the “scareware” ring that resulted in $72 million in losses is notable because it was those very fears upon which the scam played. It was the very idea that the tricked consumers were protecting themselves from being hacked, which allowed the hack to collect such a large amount of money in such a short time. The hack tricked people into buying anti-virus protection by bombarding them with fake security alerts. They then stole client banking information and took small amounts of money from multiple people in various countries. It took cyber-security authorities in the United States, the Netherlands, Latvia, Germany, France, Lithuania, Sweden, and the UK, working together, to pinpoint where the hack originated, as the fake company had servers in multiple cities.

Computer design and development is occurring at lightning speed. For proof, just look to the recent rapid-fire releases of the iPad 2, the Samsung Galaxy, and the Kindle Fire. The computer market is incredibly competitive currently. However, hackers seem to be developing as rapidly as the new technologies. The question then becomes not, what will designers think of next, but what will hackers do to alter it?

Technology Blog


Popular posts from this blog

List Of Common Flowers in Kerala With Pictures

Kerala is one of the famous tourist spot situated on the south of India famous for its numerous wild life and thick vegetation. Like the Himalayan ranges on the north of India,

Building Blocks for Virtual Businesses : Key technological systems you must have to succeed in the remote business world

This is a guest post by Ripley Daniels about "Key technological systems you must have to succeed in the remote business world.

Whenever I tell friends I had a tough day at the office, they laugh at me. That's because they know I don't really have an office. I work very hard but I work for a company that is completely remote. Only a few of my co-workers ever go into an office at all and when they do, it's only for short periods of time. Our "office" is a virtual one. To us, the traditional office workplace is a thing of the past, alongside Tyrannosaurus Rex, the slide rule, and telephones where you stick your finger in a hole and turn a dial.
Unfortunately, none of this prevents me from having tough days. I still have them. But the reasons have nothing to do with the fact that my co-workers and I don't have a brick and mortar edifice that we can use to plan, strategize, hold our meetings, make presentations, discuss sensitive business topics, build relatio…

About Web Offset Printing and Its Advantages

The sheer lion's share of business printing for inventories, magazines or books is on an offset printing press. There are numerous motivations to use web offset printing versus sheet encouraged and here are some for your thought as the advantages are numerous:

Home Buying Tips For Women In Real Estate Business

Although real estate has been a booming sector for some time in our country, still it has largely been a male bastion. Usually it’s the male of the house, whether its father or brothers, who make financial decisions and that includes a decision to buy a house.

7 Simple Ways to minimize Shopping Cart Desertion

This is a guest post by Crystal J. Briscoe about seven simple steps to minimize Shopping Cart Desertion. Shopping cart deserting? If it is, are you taking initiatives to avoid it? Surely you are. But are you sure you’re doing the right thing? Well here are some tips that will avoid your shopping cart desertion.

1. Make Your Store User Friendly

The end of shopping cart desertion is what you want. Along with it, the ease of customer is what you should want. Your store should be user friendly.

2. Technology Is What That Matters

Develop a good website. Sitemap should be clear. Keep a check on what the customers are buying. Ensure that whatever the customer is putting into his basket, he shall be able to view it again. Make icons which will continuously show him what is going in his basket and what is he dropping out.

3. Display Stock Count

To avoid any hassle, you should always continuously show the amount left in your stock so that the customer shall have a clear picture of what he can buy…