Monday, 30 October 2017

Social Sites like Facebook, Twitter & Cloud storage will Never be 100% safe, says expert..!

I must tell You that, The Biggest Security Threats We'll live in and will face this year and in the following year is Hacking of social Networking sites, which doesn't one stole our personal data & money but also sometime leave us for public embarrassment. Almost every sites which presented itself as most secure has been hacked now on than, be it Facebook, apple cloud, twitter, Skype, national and international website, personal website.Hackers always find a way to break in and stole our data.
the question is WHETHER THESE ONLINE THINGS WILL BE EVER, EVER BE 100 % SAFE...??

So, this is a good time to know about Hacking,TYPES OF HACKING, How its done, some major incidents in the world, and much more so that you can be totally aware about hacking and the threat it posses to world securities as well as personal securities.

we will start with TYPES OF HACKING 

-Extortion Hacks
-Attacks That Change or Manipulate Data
-Chip-and-PIN Innovations
-Denial of Service (DoS\DDoS)
-Waterhole attacks
-Eavesdropping (Passive Attacks)
-Attack by Virus, Trojan like alien program



SOME INCIDENT OF HACKING WHICH MADE WORLDWIDE NEWS

When Jonathon James hacks NASA



Known by the hacker name comrade, Jonathon James was 16 when, in 1999, he hacked into the Marshall Space Flight Center in Huntsville, Alabama, and downloaded proprietary software for the International Space Station. The software supported the International Space Station's physical environment and was responsible for critical control of humidity and temperature for living in space. NASA officials valued the documents stolen by James at around $1.7 million. The incident forced NASA to shut down its computer systems for three weeks and cost them about $41,000 to fix.

When Gary McKinnon hacks the US military

Scottish hacker Gary McKinnon, who went by the handle Solo, was accused of hacking to several US military computers in 2001 and 2002. McKinnon allegedly wanted to know what the government knew about UFOs.

Military officials said the damage caused by McKinnon included the deletion of critical files from operating systems, prompting a shut down the US Armys Military District of Washington network of 2,000 computers for 24 hours. McKinnon also allegedly deleted weapons logs at the Earle Naval Weapons Station. Officials said the cost of cleanup from McKinnons hack was over $700,000.

Hacking of US Military’s Central Command

A little over 9 days ago the US Military Central Command were hacked by “CyberCaliphate”, a group supporting ISIS. Two videos were uploaded to the official YouTube account entitled “O Soldiers of truth go forth,” and “Flames of War Isis Video.” The Twitter account was suspended following the attack after a message was posted saying “American Soldiers we are coming, watch your back, ISIS”. A comment from the Pentagon stated “we are viewing this purely as a case of cybervandalism”. Documents were released via the Twitter account although none contained “classified information”.

Hacking of SKYPE

Unless you have been living under a rock recently, I am sure you will be well aware of an increasing cyber security risk facing brands, organisations and public figures in today’s hyper connected world. The likes of Sony, for example, have been hounded with a series of attempted and successful hacks on the PlayStation network. But the most notable of late is the Sony Pictures breach which has even been linked to North Korea with political undertones.

But, in a world where hacking vast IT networks is becoming child’s play, how do our branded social media channels fair? And is there sufficient attention paid to our social media policies, guidelines and control measures (passwords, access and more)? Quite possibly not, judging by the volume of downloads of our social media policy workbook during 2014 it was certainly on the agenda though!

When Lulzsec hacks Sony

An offshoot of Anonymous, hacktivist group Lulzsec in June 2011 hacked into Sony Pictures via SQL Injection attack and stole data that included names, passwords, e-mail and home addresses of thousands of customers.

Facebook is working on a facial recognition feature to help users secure the account and verify identity, reports said. "We are testing a new feature for people who want to quickly and easily verify account ownership during the account recovery process. This optional feature is available only on devices you have already used to log in. It is another step that were taking to make sure account owners can confirm their identity," Facebook told Tech Crunch late Friday.

some security precautions you can take while using social networking sites, these are just precaution, as i already told you that no one can guarantee one hundred percent safety that your data will never get hacked.

1. Never use the same passwords that you use at work on a social networking site.
Limit usage of social networking sites to personal use only. Do not write about work issues. Always assume everyone in the world will be able to see what you’re writing even if the site limits your post to your friends exclusively.
Try to avoid mentioning where you work; so that if you mention something you thought innocent (but that might be valuable information for hackers) they will not know who to target.

2. Be wary of what you’re posting, if you use your pet’s name as a password anywhere do not post about it on your social networking sites naming it.

3. Do not log on to your social network page from public computers such as internet cafes where someone might have installed a key logger and would later get access to your credentials.

4. Do not automatically trust that posts are from who they claim they are; if your workmate sends you a private message asking for some confidential information first verify that he/she did really send you that message as their account might have been compromised.

5. Do not send confidential information through a social networking site even if someone who has legitimate access to that information asks you to. See point number 2.

6. Beware of what links you click and what software you download and install. Do not trust links/software sent by your friends implicitly as they themselves might not be aware it includes malware or their account might have been compromised.

7. Always be skeptical and wary. If someone asks to be friends on a social networking site and the profile appears to match a work mate, check personally with that person before accepting him as he could be an imposter. Also be skeptical of any offers or prizes you might have been told you won, they might actually be phishing attacks.

8. Ensure your computer is up to date and has good antivirus protection; social networking sites are frequent targets of malware attacks.

IF WE LEFT ANYTHING, PLZ LET US KNOW IN THE COMMENT SECTION BELOW. ALSO IF YOU LIKE THIS ARTICLE, SHARE IT WITH YOUR FRIENDS OR ON FACEBOOK PAGE.ALSO SUBSCRIBE TO OUR YOUTUBE CHANNEL FOR DETAIL AND AMAZING VIDEOS. THANKS, AND HAVE A NICE DAY..

No comments:

Post a Comment

Popular Posts

YOU MUST READ