Posts

Hackers and Their Methods of Operendi Don't Always Give Them Away

 Often hacker groups methods to pin the crime on someone else. So, let's say you have 160 known hacking groups world-wide, most are loosely affiliated. Plus, you have government and foreign military or cyber-spy commands perhaps adding another 50 or so to the mix, some quite sophisticated. Not long ago, I was reading 150 page research report on cyber security, cyber warfare, hactivists, and criminal hackers. Okay so let's talk for second shall we? One of the chapters in the report suggested that it was easy to tell if a hacking group was part of a state-sponsored cyber command, or just would-be hackers messing around because you could tell by their style and methods. However, I would question this because cyber commands would be wise to cloak as hactivists, or petty hacker teenagers when trying to break into a system of a Corporation, or government agency. Meanwhile the report proposes that the hackers aren't that smart, and that they always use the same methods of operandi...

What Hackers Know About Your Network - That You Don't!

 Automated Tools Are a Wonderful Thing Cyber criminals don't scan each individual network on the Internet one by one. They have automated tools that randomly scan every IP address on the Internet. Hackers aren't lazy people - just very efficient. And very intelligent. The tools they use can be preloaded with a range of Internet addresses to scan. As this tool finds an Internet address with certain openings it produces a list of the address and the opening. This list is then fed into another tool that actively tries to exploit that opening with various programs. If no exploit works, the hacker's program moves on to the next potential victim. When you see the scanning activity in your firewall logs, you'll know where you're being scanned from and what they're trying to target. Armed with that data you should check to see if you're running software that uses that port and if it has any newly discovered openings. If you are using software listening on that scann...

Are Hackers Really Targeting Me?

 Today, hacking is no longer kid's stuff, but a multi-billion dollar industry that spans the globe. Some experts believe that as many as 25% of all computers are infected by hacker's software. Visualize a robot. Mindless, emotionless, silent unless it comes to life. A big part of what hackers do is to turn your computer into a robot. The tech name for this is a BOT-network, actually. Suppose you go on the Internet and download something--perhaps a song, some freeware, a game--you will never know that download is infected. When you click download, you not only get your music, but the download will install hidden software deep inside your computer that will turn your computer into a robot. This software is called a virus, a worm, spy ware, malware, or a Trojan horse. The hackers gather thousands of bot computers into a bot network, and these computers are used to send infected files to thousands of other computers. If the attack is caught and traced, it is traced to you, not to t...

Protection In The Face Of Persistent Hacker Activity

 Hacker and malicious activity has in the past few years been on the rise and this is specifically in the last one year. The attacks and threats have been on the rise and the impact to the online world is far-reaching. Attacks have been a source of concern to ordinary internet users and a problem too to corporate entities. Some of the threats will take the form of the conventional software like the viruses and malware among scripts which are aimed at exploiting flaws and achieving various malicious ends. Hacking has directly impacted on the cost of doing business. Many businesses are spending way higher amounts of money on online security. Hacker activity gets to target even the complex networks as more and more hackers become emboldened in their malicious schemes and as new skills are developed and perpetrated on internet users. Their big intentions have always been the compromising business and institutional networks as well as compromising security applications such that they ar...