Skip to main content

Hacking Comes of Age

This is a guest post by Izzy .The recent sting operation that took down the group of fake companies that used a Conficker worm to steal $72 million US from consumers brought computer hacking back into the spotlight in a big way. Identity theft had been the focus of the majority of computer-related security reporting since the mid-2000s, so it was interesting to hear about a case of relatively “Old School” hacking succeeding to such a large degree. Though the group did steal client information, their way into the client’s accounts was a fairly simple one. In fact, the Conficker used had been around for almost three years, but it was never used to such an incredible degree, or with so much success.

Hacking in a Nutshell

Computer users everywhere understand that having your computer hacked is not a welcome action. Hacking is, in essence, the act of altering computer and software so that it functions differently from the way it was intended. Just as diaries, notebooks, and photo albums once stored our most precious memories or thoughts, computers serve the same purpose now. Add to that the fact that the majority of our financial transactions occur with the assistance of a computer, and there is the potential for real damage to be caused if a network is compromised.

Mind you, everyone does a little hacking all the time. Whether it is jumping levels in a videogame by inputting a particular sequence of numbers, or altering the code on a website, or downloading music illegally, we all modify software or hardware so that it performs to our liking at least a little bit. We just do not call it hacking. It becomes hacking when an entire program or tool is created in order for the alteration to occur on a large scale, like the open x hacking program that began appearing in OpenX banner ads in 2009. Virus software, security systems and packages, and entire safety networks have been designed and implemented in order to combat this problem.

Hacking Developments

In the 90s and even in the early 2000s, erstwhile hackers would dig through the trash of computer users to find mail and other documents that contained account information, passwords, and other personal content. Private individuals and companies invested in industrial-sized shredders and everyone felt safe once again. However, hackers adapted to the times, and suddenly harvesting information became a game of stealing it during transactions that were occurring online, or hacking directly into the directories of large corporations to gain access to client lists. Viruses were created to maximize the amount of data that could be harvested over a short amount of time.

When virus software began to make it difficult to gather information that way, “phishing” appeared. “Phishing” tricked users into giving away their personal information. The programs required that customers input their personal information into websites that were purportedly legitimate, but were actually merely built to harvest information and then use it in whatever way the hackers saw fit. The average person has become increasingly aware of the various ways that their account information, identity, or funds can be stolen online, and their educated diligence has made it more difficult for large scale hacks to be as wildly successful as they might have been just five years ago.

Why The Recent Hack Worked

The success of the “scareware” ring that resulted in $72 million in losses is notable because it was those very fears upon which the scam played. It was the very idea that the tricked consumers were protecting themselves from being hacked, which allowed the hack to collect such a large amount of money in such a short time. The hack tricked people into buying anti-virus protection by bombarding them with fake security alerts. They then stole client banking information and took small amounts of money from multiple people in various countries. It took cyber-security authorities in the United States, the Netherlands, Latvia, Germany, France, Lithuania, Sweden, and the UK, working together, to pinpoint where the hack originated, as the fake company had servers in multiple cities.

Computer design and development is occurring at lightning speed. For proof, just look to the recent rapid-fire releases of the iPad 2, the Samsung Galaxy, and the Kindle Fire. The computer market is incredibly competitive currently. However, hackers seem to be developing as rapidly as the new technologies. The question then becomes not, what will designers think of next, but what will hackers do to alter it?

Technology Blog


Popular posts from this blog

List Of Common Flowers in Kerala With Pictures

Kerala is one of the famous tourist spot situated on the south of India famous for its numerous wild life and thick vegetation. Like the Himalayan ranges on the north of India,

5 Common Examples Of Website Design Mistakes by Business Owners

This is a guest post by Sachin about five Common Examples Of Website Design Mistakes by Business Owners . When most business owners think about website design, they think about a brochure online. Online shopping sites are making a lot of money with the use of web-based applications to sell products, collect payments an arrange delivery. The only work left to do is pack and send the boxes. Smart applications can even print out the labels, so the only thing left to do it stick them on the box. Unfortunately, in many cases, websites are replacing people. For those of us left with a job, we can be thankful that many business owners make the following mistakes when it comes to websites and web design.

Don’t have one. This is the first and biggest problem of most business owners when it comes to website design. They think they don’t need one. Who can ever really do with less business? The reason why they have not been getting business from online sources in the past is because they have not …

How to Embed Chatwing An Easy Free Chat Application On Blog

If you’re a chatroom enthusiast, then you might have heard about Chatwing chat app. If you didn’t well, let me describe it in a nutshell – it’s one of the best chatting tools you can find.

Home Buying Tips For Women In Real Estate Business

Although real estate has been a booming sector for some time in our country, still it has largely been a male bastion. Usually it’s the male of the house, whether its father or brothers, who make financial decisions and that includes a decision to buy a house.

Building Blocks for Virtual Businesses : Key technological systems you must have to succeed in the remote business world

This is a guest post by Ripley Daniels about "Key technological systems you must have to succeed in the remote business world.

Whenever I tell friends I had a tough day at the office, they laugh at me. That's because they know I don't really have an office. I work very hard but I work for a company that is completely remote. Only a few of my co-workers ever go into an office at all and when they do, it's only for short periods of time. Our "office" is a virtual one. To us, the traditional office workplace is a thing of the past, alongside Tyrannosaurus Rex, the slide rule, and telephones where you stick your finger in a hole and turn a dial.
Unfortunately, none of this prevents me from having tough days. I still have them. But the reasons have nothing to do with the fact that my co-workers and I don't have a brick and mortar edifice that we can use to plan, strategize, hold our meetings, make presentations, discuss sensitive business topics, build relatio…

jQuery – A Simpler and Better JavaScript Solution

An Introduction to jQuery

jQuery is a form of JavaScript which makes it simpler for designers to modify HTML events, animations and other interactions that may be present on a web page. These can be done by the addition or subtraction of style sheet handlers.

Top 5 Online Resources for College Students

Being a successful college student means that you have to manage your time well, meet multiple deadlines, prioritize tasks, and still enjoy the last few years you have before you officially become a grownup. If you're a college student who's having some trouble managing everything, the good news is that there are a number of online resources that will help you work and study more efficiently. Here are five of the most popular online resources that will make your life easier as a college student:

1. Infomine – Created by librarians at University of California, California State University, Wake Forest University, and other U.S. colleges, Infomine is an internet library of online research resources for college students and professors. Infomine provides you with access to scholarly journals, ebooks, databases, and many other online materials that are useful for research projects and papers.

2. – Managing your finances as a college student can be tough, especially if you…