Skip to main content

Hacking Comes of Age

This is a guest post by Izzy .The recent sting operation that took down the group of fake companies that used a Conficker worm to steal $72 million US from consumers brought computer hacking back into the spotlight in a big way. Identity theft had been the focus of the majority of computer-related security reporting since the mid-2000s, so it was interesting to hear about a case of relatively “Old School” hacking succeeding to such a large degree. Though the group did steal client information, their way into the client’s accounts was a fairly simple one. In fact, the Conficker used had been around for almost three years, but it was never used to such an incredible degree, or with so much success.

Hacking in a Nutshell

Computer users everywhere understand that having your computer hacked is not a welcome action. Hacking is, in essence, the act of altering computer and software so that it functions differently from the way it was intended. Just as diaries, notebooks, and photo albums once stored our most precious memories or thoughts, computers serve the same purpose now. Add to that the fact that the majority of our financial transactions occur with the assistance of a computer, and there is the potential for real damage to be caused if a network is compromised.

Mind you, everyone does a little hacking all the time. Whether it is jumping levels in a videogame by inputting a particular sequence of numbers, or altering the code on a website, or downloading music illegally, we all modify software or hardware so that it performs to our liking at least a little bit. We just do not call it hacking. It becomes hacking when an entire program or tool is created in order for the alteration to occur on a large scale, like the open x hacking program that began appearing in OpenX banner ads in 2009. Virus software, security systems and packages, and entire safety networks have been designed and implemented in order to combat this problem.


Hacking Developments

In the 90s and even in the early 2000s, erstwhile hackers would dig through the trash of computer users to find mail and other documents that contained account information, passwords, and other personal content. Private individuals and companies invested in industrial-sized shredders and everyone felt safe once again. However, hackers adapted to the times, and suddenly harvesting information became a game of stealing it during transactions that were occurring online, or hacking directly into the directories of large corporations to gain access to client lists. Viruses were created to maximize the amount of data that could be harvested over a short amount of time.

When virus software began to make it difficult to gather information that way, “phishing” appeared. “Phishing” tricked users into giving away their personal information. The programs required that customers input their personal information into websites that were purportedly legitimate, but were actually merely built to harvest information and then use it in whatever way the hackers saw fit. The average person has become increasingly aware of the various ways that their account information, identity, or funds can be stolen online, and their educated diligence has made it more difficult for large scale hacks to be as wildly successful as they might have been just five years ago.

Why The Recent Hack Worked

The success of the “scareware” ring that resulted in $72 million in losses is notable because it was those very fears upon which the scam played. It was the very idea that the tricked consumers were protecting themselves from being hacked, which allowed the hack to collect such a large amount of money in such a short time. The hack tricked people into buying anti-virus protection by bombarding them with fake security alerts. They then stole client banking information and took small amounts of money from multiple people in various countries. It took cyber-security authorities in the United States, the Netherlands, Latvia, Germany, France, Lithuania, Sweden, and the UK, working together, to pinpoint where the hack originated, as the fake company had servers in multiple cities.

Computer design and development is occurring at lightning speed. For proof, just look to the recent rapid-fire releases of the iPad 2, the Samsung Galaxy, and the Kindle Fire. The computer market is incredibly competitive currently. However, hackers seem to be developing as rapidly as the new technologies. The question then becomes not, what will designers think of next, but what will hackers do to alter it?


Technology Blog

Comments

Popular posts from this blog

List Of Common Flowers in Kerala With Pictures

Kerala is one of the famous tourist spot situated on the south of India famous for its numerous wild life and thick vegetation. Like the Himalayan ranges on the north of India,

Why A Course on Editing is a Good Start for Wannabe Writers

If you’ve been thinking about becoming a writer for some time but you don’t know where to begin, taking a course from industry professionals can be a big help to get you started. If you can study another person’s writing that you know is a good writer, then you can learn to become like them. One of the things that every good writer knows is that you need to be able to edit properly in order to succeed. There are many reasons why editing is so important to a writer, but in order to hone your skills as a writer, you also need to hone your skills as an editor too.
Boost your credibility When most people try to edit a piece of writing, the first thing they do is proofread the work to make sure there are no obvious spelling and grammar issues. This is extremely important because the reader needs to be able to trust that you know what you are writing about. If you can’t master basic spelling and grammar, then the reader won’t be able to trust that you know anything about what you’re writi…

Building Blocks for Virtual Businesses : Key technological systems you must have to succeed in the remote business world

This is a guest post by Ripley Daniels about "Key technological systems you must have to succeed in the remote business world.

Whenever I tell friends I had a tough day at the office, they laugh at me. That's because they know I don't really have an office. I work very hard but I work for a company that is completely remote. Only a few of my co-workers ever go into an office at all and when they do, it's only for short periods of time. Our "office" is a virtual one. To us, the traditional office workplace is a thing of the past, alongside Tyrannosaurus Rex, the slide rule, and telephones where you stick your finger in a hole and turn a dial.
Unfortunately, none of this prevents me from having tough days. I still have them. But the reasons have nothing to do with the fact that my co-workers and I don't have a brick and mortar edifice that we can use to plan, strategize, hold our meetings, make presentations, discuss sensitive business topics, build relatio…

Top 5 Online Resources for College Students

Being a successful college student means that you have to manage your time well, meet multiple deadlines, prioritize tasks, and still enjoy the last few years you have before you officially become a grownup. If you're a college student who's having some trouble managing everything, the good news is that there are a number of online resources that will help you work and study more efficiently. Here are five of the most popular online resources that will make your life easier as a college student:

1. Infomine – Created by librarians at University of California, California State University, Wake Forest University, and other U.S. colleges, Infomine is an internet library of online research resources for college students and professors. Infomine provides you with access to scholarly journals, ebooks, databases, and many other online materials that are useful for research projects and papers.

2. Mint.com – Managing your finances as a college student can be tough, especially if you…

10 Useful OS X Tips and Tricks

This is a guest post by Mariana Ashley about some useful OS tips.
For the most part, there are two types of computer users: Mac users and Windows users. Sure, there are other operating systems available, but for the most part we each own either a windows machine or an apple machine. In a previous post, Siju George presented 16 Useful Windows 7 Tips and Tricks. These tips are immensely useful for regular Windows users and for Mac users who are less comfortable handling a Windows machine. Because computer use is so fundamental to our society today, knowing the basics of both the Windows operating system and OS X (the Mac operating system) is essential. The following is a list of 10 basic tips and tricks for using OS X:

1. Right click on an open PDF in Safari (the web browser that comes with Macs) to get a context menu which includes the option to open the PDF in Preview.
2. Pressing Command and Q at the same time will close all applications when command-tabbing. This is the fastest way to…

5 Common Examples Of Website Design Mistakes by Business Owners

This is a guest post by Sachin about five Common Examples Of Website Design Mistakes by Business Owners . When most business owners think about website design, they think about a brochure online. Online shopping sites are making a lot of money with the use of web-based applications to sell products, collect payments an arrange delivery. The only work left to do is pack and send the boxes. Smart applications can even print out the labels, so the only thing left to do it stick them on the box. Unfortunately, in many cases, websites are replacing people. For those of us left with a job, we can be thankful that many business owners make the following mistakes when it comes to websites and web design.


Don’t have one. This is the first and biggest problem of most business owners when it comes to website design. They think they don’t need one. Who can ever really do with less business? The reason why they have not been getting business from online sources in the past is because they have not …