Skip to main content

Hacking Comes of Age

This is a guest post by Izzy .The recent sting operation that took down the group of fake companies that used a Conficker worm to steal $72 million US from consumers brought computer hacking back into the spotlight in a big way. Identity theft had been the focus of the majority of computer-related security reporting since the mid-2000s, so it was interesting to hear about a case of relatively “Old School” hacking succeeding to such a large degree. Though the group did steal client information, their way into the client’s accounts was a fairly simple one. In fact, the Conficker used had been around for almost three years, but it was never used to such an incredible degree, or with so much success.

Hacking in a Nutshell

Computer users everywhere understand that having your computer hacked is not a welcome action. Hacking is, in essence, the act of altering computer and software so that it functions differently from the way it was intended. Just as diaries, notebooks, and photo albums once stored our most precious memories or thoughts, computers serve the same purpose now. Add to that the fact that the majority of our financial transactions occur with the assistance of a computer, and there is the potential for real damage to be caused if a network is compromised.

Mind you, everyone does a little hacking all the time. Whether it is jumping levels in a videogame by inputting a particular sequence of numbers, or altering the code on a website, or downloading music illegally, we all modify software or hardware so that it performs to our liking at least a little bit. We just do not call it hacking. It becomes hacking when an entire program or tool is created in order for the alteration to occur on a large scale, like the open x hacking program that began appearing in OpenX banner ads in 2009. Virus software, security systems and packages, and entire safety networks have been designed and implemented in order to combat this problem.


Hacking Developments

In the 90s and even in the early 2000s, erstwhile hackers would dig through the trash of computer users to find mail and other documents that contained account information, passwords, and other personal content. Private individuals and companies invested in industrial-sized shredders and everyone felt safe once again. However, hackers adapted to the times, and suddenly harvesting information became a game of stealing it during transactions that were occurring online, or hacking directly into the directories of large corporations to gain access to client lists. Viruses were created to maximize the amount of data that could be harvested over a short amount of time.

When virus software began to make it difficult to gather information that way, “phishing” appeared. “Phishing” tricked users into giving away their personal information. The programs required that customers input their personal information into websites that were purportedly legitimate, but were actually merely built to harvest information and then use it in whatever way the hackers saw fit. The average person has become increasingly aware of the various ways that their account information, identity, or funds can be stolen online, and their educated diligence has made it more difficult for large scale hacks to be as wildly successful as they might have been just five years ago.

Why The Recent Hack Worked

The success of the “scareware” ring that resulted in $72 million in losses is notable because it was those very fears upon which the scam played. It was the very idea that the tricked consumers were protecting themselves from being hacked, which allowed the hack to collect such a large amount of money in such a short time. The hack tricked people into buying anti-virus protection by bombarding them with fake security alerts. They then stole client banking information and took small amounts of money from multiple people in various countries. It took cyber-security authorities in the United States, the Netherlands, Latvia, Germany, France, Lithuania, Sweden, and the UK, working together, to pinpoint where the hack originated, as the fake company had servers in multiple cities.

Computer design and development is occurring at lightning speed. For proof, just look to the recent rapid-fire releases of the iPad 2, the Samsung Galaxy, and the Kindle Fire. The computer market is incredibly competitive currently. However, hackers seem to be developing as rapidly as the new technologies. The question then becomes not, what will designers think of next, but what will hackers do to alter it?


Technology Blog

Comments

Popular posts from this blog

iPhone sales help fuel worldwide smartphone numbers

There are nearly 150 million smartphones out there in the world, according to new figures. Thanks to record breaking sales figures by Apple for the iPhone 4S by the end of 2011 there was almost a 50% increase in the number of devices up on the previous year. The research by Gartner Inc. claims the figures rose during the final quarter of 2011 thanks to the 30 million plus iPhone 4S' sold by Apple. The results led to Apple becoming the third largest vendor of mobile phones in the world. They also became the top smartphone vendor, with nearly a quarter of global sales in the fourth quarter. Over the rest of 2011, Apple took a fifth of the share of the smartphone market. The UK and wider Western Europe along with North America were the driving forces for the figures, says Gartner. Up until the launch of the iPhone 4S sales were a little slow. Suddenly the spiked as we all ran out to buy the new device. Worldwide, mobile device sales figures reached 476.5 million in the fourth q...

3 Things to Avoid as a Motivational Speaker

Motivational speakers deliver at least hour-long speeches about positive thinking and how to better yourself and the people around you. These messages often apply to a wide variety of settings, whether at home, at work, or even at a personal level. If you're ever planning on becoming a motivational speaker, there are a lot of things that you should avoid. Here are the three of the most common ones.

Yahoo invisible detector – insights on a new online service

This is a guest article by Iulian about leading Yahoo Invisible detector service http://www.detectinvisible.com/ . There are several online businesses which are basically ruling the online industry, and one of them is Yahoo. Founded in 1994 by Jerry Yang and David Filo in Santa Clara, California, Yahoo! started to grow significantly over the years, now having millions of users all over the world. One of the most widespread products of Yahoo is Yahoo Mail and Messenger. Over time yahoo messenger had become a habit for millions and soon they’ve introduced the possibility to become invisible for other users. It was obvious that a whole new kind of service appeared online, that of yahoo invisible detector. The yahoo invisible detector as an online service first appeared when yahoo was at protocol 13, now being at protocol 17, and at first there were several websites offering their services in order for you to find out which buddy of yours is hiding. Unfortunately, as soon as yahoo star...

The Concepts of Social Networking in Today's World

In today’s high tech world, networking occurs as much on computers as in “real life” social situations. Social media has opened up a vast new frontier for people to connect with others. Before the advent of social media, people generally networked at social gatherings like mixers, fundraising galas and similar events. Of course, such “face-to-face” networking is still important and common, but social media allows possibilities that did not exist before. One of the problems with older networking models is that often the same people showed up at all the events. The percentage of the population that is active in community events tends to be rather low. On the other hand, almost everyone these days uses social media. Vast reach of social networking According to the latest stats, Facebook alone has more than 900 million active users worldwide with the number continuing to grow. Twitter and Google+ also have large numbers of active users that cross all demographic categories. ...