background preloader

Internet Hacking

Facebook Twitter

How Do I Protect Myself Against Malware? The best way to deal with a malware attack is to avoid getting infected in the first place.

How Do I Protect Myself Against Malware?

This can be a difficult feat if your adversary has access to zero day attacks—attacks that exploit a previously-unknown vulnerability in a computer application. Think of your computer as a fortress; a zero day would be a hidden secret entrance that you do not know about, but which an attacker has discovered. There are many ways in which an attacker might try to trick you into installing malware on your computer. For example, in Syria, pro-Assad hackers targeted members of the opposition with malware hidden in fake revolutionary documents and a fake anti-hacking tool. The best way to avoid being infected with this kind of targeted malware is to avoid opening the documents and installing the malware in the first place. Why Everyone's to Blame for Identity Theft. The other day a reporter asked me who’s to blame for the growing epidemic of identity-related tax fraud.

Why Everyone's to Blame for Identity Theft

I almost replied, “the government and the bad guys,” but I caught myself before committing to that inaccuracy. “We’re all to blame,” I said. I believe that breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. While it may seem like hyperbole, more than 1 billion consumer records containing some form of personally identifying information (PII) have been exposed to hackers, identity thieves and spies (forget, for the moment, the NSA) over the past 10 years.

Anthem, the second largest healthcare insurer in the nation, recently joined the burgeoning list of mega corporations that have suffered massive data breaches. Unlocking Your Identity Often what’s lacking in the aftermath is perspective. More From Credit.com: How to Use Credit Monitoring to Protect Your Child’s Identity. Smartphone Monitoring. Privacy Awareness of Students and Its Impact on Online Learning Participation – A Case Study. Malware Free Download and software reviews. The Five Biggest Threats to Your Kids’ Privacy, and What You Can Do About Them. Remember back in school, when your teachers warned that everything you did would go on your permanent record?

The Five Biggest Threats to Your Kids’ Privacy, and What You Can Do About Them

It turns out your teachers have become right. That permanent record is the Internet. It’s hard to be a fully functioning adult in 2014 and not leave behind a digital trail. Now imagine how hard it is for your kids, who have never known a world where the net did not exist. From the moment they emerge from the womb, they’re generating data, which is then eagerly absorbed and stored by Internet companies, government agencies and some evil no-goodniks. Despite federal laws prohibiting the collection of data from children under the age of 13, dossiers are constantly being created about your kids, whether it’s Google capturing their search histories, advertisers creating profiles of their interests, or their grandparents tagging photos of them on Facebook.

Canadian Singles Find New Ways To Meet UrthBox Healthy Snack Boxes. Math Practice - Ages 5-15 Questions, complaints, kudos? How to Protect Your Computer from Hackers, Spyware and Viruses. This article has been inspired by a situation I ran into while visiting a cousin in India.

How to Protect Your Computer from Hackers, Spyware and Viruses

Since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” part was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet. The first thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install an anti-virus program and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus! Most of the viruses on the computer were hidden in files that had been downloaded off the Internet: songs, videos, and movies. This is by no means a comprehensive list, so if you have any suggestions, please feel free to comment and I’ll add them on! Lizard Squad Hackers Hit Xbox Live. Despite promises to leave Microsoft's Xbox Live platform and Sony's PlayStation Network alone, hacker group "The Lizard Squad" is back.

Lizard Squad Hackers Hit Xbox Live

Late on Sunday, the hacker group tweeted a warning that Xbox Live would be next on their list of targets. Not one hour later, the hackers posted a series of tweets: "Xbox (360) Live #offline", "One more thing: Tell KimDotcom to take his vouchers and shove them up his fat a**", "XBL attack was done with the help of our associates from LNO: @LNOuNiTy @LNOVenom @Guidelines @we_are_lno", and "Haha "Xbox" is trending Worldwide.

We're back :)" Reports of the outage were logged by users in the UK around 5 AM GMT on Monday, in line with the Lizard Squad's tweets. Microsoft has not commented on the disruption of service, but Xbox Live's status is still listed as "Limited" for the Xbox 360 in the US. Xbox Live is reportedly fully restored in Europe according to internet security group Finest Squad. Photo: © Creative Commons - Flickr: ehavir.