create account

What You Should Know About Hackers and Hacking by bumbaram

View this thread on: hive.blogpeakd.comecency.com
· @bumbaram ·
What You Should Know About Hackers and Hacking
<html>
<p>Not all hackers are inherently bad. When used in mainstream media, &nbsp;the word “hacker” is usually used in relation to cyber criminals. But, a &nbsp;hacker can actually be anyone, regardless of their intentions, who &nbsp;utilizes their knowledge of computer software and hardware to break down &nbsp;and bypass security measures on a computer, device or network.</p>
<p>&nbsp;Hacking itself is not an illegal activity unless the hacker is &nbsp;compromising a system without the owner’s permission. Many companies and &nbsp;government agencies actually employ hackers to help them secure their &nbsp;systems.</p>
<p><br></p>
<p>&nbsp;Hackers are generally categorized by type of metaphorical “hat” they &nbsp;don: “white hat,” “grey hat,” and “black hat.” The terms come from old &nbsp;spaghetti westerns, where the bad guy wears a black cowboy hat, and the &nbsp;good guy wears a white hat. There are two main factors that determine &nbsp;the type of hacker you’re dealing with: their motivations, and whether &nbsp;or not they are breaking the law. &nbsp;</p>
<p><strong>1) Black Hat Hackers</strong><br>
Like all hackers, black hat hackers usually have extensive knowledge &nbsp;about breaking into computer networks and bypassing security protocols. &nbsp;They’re also responsible for writing malware, which is a method used to &nbsp;gain access to these systems.</p>
<p>&nbsp;Their primary motivation is usually for personal or financial gain, &nbsp;but they can also be involved in cyber espionage, protests or perhaps &nbsp;are just addicted to the thrill of cybercrime. Black hat hackers can &nbsp;range from amateurs getting their feet wet by spreading malware, to &nbsp;experienced hackers that aim to steal data, specifically financial &nbsp;information, personal information and login credentials. Not only do &nbsp;black hat hackers seek to steal data, they also seek to modify or &nbsp;destroy data as well. &nbsp;&nbsp;</p>
<p><strong>2) Grey Hat Hackers</strong><br>
As in life, there are grey areas that are neither black nor white. Grey &nbsp;hat hackers are a blend of both black hat and white hat activities. &nbsp;Often, grey hat hackers will look for vulnerabilities in a system &nbsp;without the owner’s permission or knowledge. If issues are found, &nbsp;they’ll report them to the owner, sometimes requesting a small fee to &nbsp;fix the issue. If the owner does not respond or comply, then sometimes &nbsp;the hackers will post the newly found exploit online for the world to &nbsp;see.&nbsp;</p>
<p>These types of hackers are not inherently malicious with their &nbsp;intentions; they’re just looking to get something out of their &nbsp;discoveries for themselves. Usually, grey hat hackers will not exploit &nbsp;the found vulnerabilities. However, this type of hacking is still &nbsp;considered illegal because the hacker did not receive permission from &nbsp;the owner prior to attempting to attack the system. &nbsp;&nbsp;</p>
<p><strong>3) White Hat Hackers</strong><br>
White hat hackers choose to use their powers for good rather than evil. &nbsp;Also known as “ethical hackers,” white hat hackers can sometimes be paid &nbsp;employees or contractors working for companies as security specialists &nbsp;that attempt to find security holes via hacking.</p>
<p>&nbsp;White hat hackers employ the same methods of hacking as black hats, &nbsp;with one exception – they do it with permission from the owner of the &nbsp;system first, which makes the process completely legal. White hat &nbsp;hackers perform penetration testing, test in-place security systems and &nbsp;perform vulnerability assessments for companies. There are even courses, &nbsp;training, conferences and certifications for ethical hacking. &nbsp;&nbsp;</p>
<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers Live in the World of NETWORKING</strong>&nbsp;</p>
<p>WHAT IS NETWORKING? Simply means the inter-connection of computer or &nbsp;devices to share resources. We have various kinds of networking and &nbsp;their protocols.&nbsp;</p>
<p>BLUETOOTH<br>
Bluetooth is a telecommunications industry specification that describes &nbsp;how mobile phones, computers, and personal digital assistants (PDAs) can &nbsp;be easily interconnected using a short-range wireless connection. It’s &nbsp;one of the most commonly uses networking apps in the world.&nbsp;</p>
<p>As Hackers we also use Bluetooth to gain unauthorized access to &nbsp;people information. Know that one you done networking with somebody the &nbsp;information in your devise is no longer secure.<br>
</p>
<p>One of the chipest hacking tools we use to hack Bluetooth phones is the &nbsp;Bluetooth share app that we download and install in our phones.&nbsp;</p>
<p>REASONS WHY YOU SHOULD TURN OFF YOUR BLUTOOTH DEVICE AFTER SHAREING RESOURCES:&nbsp;</p>
<p><em>1) Battery Drain</em><br>
Although Bluetooth is an energy-efficient technology, it does slowly &nbsp;drain the battery of your cell phone or other mobile device. When &nbsp;enabled, Bluetooth continually scans for signals, looking for new &nbsp;devices to connect with, but using energy in the process. Check your &nbsp;device’s settings and turn Bluetooth off when you’re not using it.&nbsp;</p>
<p><em>2) Poor Security</em><br>
Virtually every network technology has some security built into it to &nbsp;prevent hackers from accessing your data without your permission. &nbsp;However, Bluetooth security is weak compared to WiFi and other wireless &nbsp;data standards. A determined attacker can, for example, gain access to &nbsp;your wireless device through a Bluetooth connection, although he or she &nbsp;would have to be nearby for the attempt to work.&nbsp;</p>
<p><em>3) Slow Data</em><br>
All wireless technologies have limits on how fast they can transmit &nbsp;data; generally, faster connections mean higher energy consumption. &nbsp;Because Bluetooth is intended to be very energy-efficient, it sends data &nbsp;relatively slowly. The Bluetooth 4.0 Low Energy standard, at 26 &nbsp;megabits per second, is much faster than Bluetooth used to offer and &nbsp;suitable for occasional syncing and small backup operations. However, &nbsp;Bluetooth is not a substitute for faster technologies such as Wi-Fi and &nbsp;USB.&nbsp;</p>
<p><em><strong>Bluetooth Tips</strong></em><br>
Disabling Bluetooth when you aren’t using it improves security, as the &nbsp;connection can’t be hacked if it’s off. Another option to consider &nbsp;disabling is Bluetooth’s discoverability feature; it sends &nbsp;identification signals to all devices within range, essentially inviting &nbsp;a connection. Remove Bluetooth connection settings on devices paired &nbsp;with accessories that may have been stolen to prevent thieves from &nbsp;gaining access to your PC or smartphone. Use firewall and anti-virus &nbsp;programs for PCs and other devices to keep hackers at bay. &nbsp;&nbsp;</p>
<p><strong>HOW TO STOP HACKER FROM HACKING YOU</strong>&nbsp;</p>
<p><em>1 &nbsp;Be suspicious of emails</em><br>
Cale Guthrie WeissmanClick “Show original” to find the source of the &nbsp;email. A lot of cyberattacks are launched through simple malicious email &nbsp;campaigns. Email is a wonderful communication platform because you can &nbsp;sending anything to anyone, but that means it can be a huge security &nbsp;risk. Phishing, for example, sends victims seemingly innocuous emails &nbsp;that will lead victims to fake websites asking to update their personal &nbsp;information.&nbsp;</p>
<p>The best way to avoid being scammed by phony emails is to just make &nbsp;sure the sender is who you think it is. Check their email address to see &nbsp;if they match with the website you think it’s from. To be extra &nbsp;cautious you can check the IP address of the sender.&nbsp;</p>
<p>You can do this by finding the source information from the email and &nbsp;looking for the IP address that follows the line “Received: from.” You &nbsp;can then Google the IP address to learn the email’s source. (Here is a &nbsp;good primer on finding email IP addresses.)&nbsp;</p>
<p><em>2. Check link locations</em><br>
Unknown messages contain links to unknown sites. Surfing to a mysterious &nbsp;website can bring about unintended consequences. For one, it could &nbsp;mimic a site you know and trust and help you fall prey to a phishing &nbsp;scam. Or, it may be unsecure or infected with malware.&nbsp;</p>
<p>If you are tempted to click on one of these links, you better know &nbsp;exactly where it’s taking you. The best way is to copy and paste the &nbsp;link location into a new browser to see what site is on the other side. &nbsp;If it’s a shortened link, you can use tools like URL X-ray that figure &nbsp;out the real destination before you click it.<br>
Also, encrypted sites are the safest ones to visit. You know they are &nbsp;safe when you see HTTPS in the URL and the lock icon on your browser.&nbsp;</p>
<p><em>3. Never open attachments (unless you’re really sure)</em><br>
A good rule to follow is never open attachments unless you are 120% sure &nbsp;of where they came from. One of the easiest ways for hackers to &nbsp;download malicious code onto victim computers is by sending emails with &nbsp;virus-laden files.&nbsp;</p>
<p>A frequent way companies get hacked is by one unsuspecting employee &nbsp;downloading malicious software that infiltrates the entire network. The &nbsp;most dangerous file types are Word, PDFs, and .EXEs.&nbsp;</p>
<p><em>4. Use two-factor authentication</em><br>
As bigger companies get hacked, the likelihood that your password is &nbsp;leaked increases. Once hackers get passwords, they try to figure out &nbsp;which personal accounts they can access with the data they stole.<br>
Two-factor authentication — which requires users to not only enter a &nbsp;password but to also confirm entry with another item like a code texted &nbsp;to a phone — is a good way to stop attackers who have stolen passwords. &nbsp;More companies are making it standard for logging in.&nbsp;</p>
<p>Slack, for example, instituted two-step authentication once it owned &nbsp;up to a recent data breach. This meant that if hackers did steal Slack &nbsp;user data, the hackers would still most likely not be able to get into a &nbsp;user’s account unless they had another personal item that belonged to &nbsp;the user, like a phone. If two-factor authentication is an option for &nbsp;your accounts, it’s wise to choose it. (Business Insider/Julie Bort)&nbsp;</p>
<p><em>5. Use advanced passwords</em><br>
This may be the most obvious yet overlooked tip. A strong password &nbsp;includes uppercase, lowercase, numbers, punctuation, and gibberish. &nbsp;Don’t make the password a personal reference, and don’t store a list in a &nbsp;saved file.&nbsp;</p>
<p>Most importantly, don’t use the same password for multiple accounts. &nbsp;There are some great tools like LastPass and 1Password that securely &nbsp;store passwords. Also, it’s crucial to change passwords frequently — &nbsp;especially for vulnerable accounts like email and banking. &nbsp;&nbsp;</p>
<p><strong>PASSWORD USAGE</strong> Passwords are simpler and cheaper than other, more secure forms of &nbsp;authentication like special key cards, fingerprint ID machines, and &nbsp;retinal scanners. They provide a simple, direct means of protecting a &nbsp;system or account. For the sake of this article, we’ll define a &nbsp;‘password’ as a word, a phrase, or combination of miscellaneous &nbsp;characters that authenticates the identity of the user. Passwords are &nbsp;generally used in combination with some form of identification, such as a &nbsp;username, account number, or e-mail address. While a username &nbsp;establishes the identity of the user for the computer or system, the &nbsp;password, which is known only to the authorized user, authenticates that &nbsp;the user is who he or she claims to be. This means that their function &nbsp;is to “prove to the system that you are who you say you are” (Russell).&nbsp;</p>
<p><em>Password Cracking</em><br>
While passwords are a vital component of system security, they can be &nbsp;cracked or broken relatively easily. Password cracking is the process of &nbsp;figuring out or breaking passwords in order to gain unauthorized &nbsp;entrance to a system or account. It is much easier than most users would &nbsp;think. (The difference between cracking and hacking is that codes are &nbsp;cracked, machines are hacked.) Passwords can be cracked in a variety of &nbsp;different ways. The most simple is the use of a word list or dictionary &nbsp;program to break the password by brute force. These programs compare &nbsp;lists of words or character combination against password until they find &nbsp;a match. If cracking codes seems like science fiction, search “password &nbsp;cracker” on Packetstorm or Passwordportal.net. There are also numerous &nbsp;password cracking tools available that any average person can use. (For &nbsp;more information on password cracking tools, please see the &nbsp;SecurityFocus article Password Crackers – Ensuring the Security of Your &nbsp;Password.)</p>
<p><br>
Another easy way for potential intruders to nab passwords is through &nbsp;social engineering: physically nabbing the password off a Post-It from &nbsp;under someone’s keyboard or through imitating an IT engineer and asking &nbsp;over the phone. Many users create passwords that can be guessed by &nbsp;learning a minimal amount of information about the person whose password &nbsp;is being sought. (For more information on social engineering please see &nbsp;the SecurityFocus series Social Engineering Fundamentals) A more &nbsp;technical way of learning passwords is through sniffers, which look at &nbsp;the raw data transmitted across the net and decipher its contents. “A &nbsp;sniffer can read every keystroke sent out from your machine, including &nbsp;passwords” (University of Michigan). It’s possible that someone out &nbsp;there has at least one of your passwords right now.&nbsp;</p>
<p><em>How To Choose Good Passwords</em><br>
Now that we have established the importance of passwords and some of the &nbsp;ways in which they may be vulnerable to cracking, we can discuss ways &nbsp;of creating good, strong passwords. In creating strong, effective &nbsp;passwords it is often helpful to keep in mind some of the methods by &nbsp;which they may be cracked, so let’s begin with what NOT to do when &nbsp;choosing passwords.&nbsp;</p>
<p><em>No Dictionary Words, Proper Nouns, or Foreign Words</em></p>
<p><br>
As has already been mentioned, password cracking tools are very &nbsp;effective at processing large quantities of letter and number &nbsp;combinations until a match for the password is found, as such users &nbsp;should avoid using conventional words as passwords. By the same token, &nbsp;they should also avoid regular words with numbers tacked onto the end &nbsp;and conventional words that are simply written backwards, such as &nbsp;‘nimda’. While these may prove to be difficult for people to figure out, &nbsp;they are no match for the brute force attacks of password cracking &nbsp;tools.&nbsp;</p>
<p><em>No Personal Information</em></p>
<p><br>
One of the frustrating things about passwords is that they need to be &nbsp;easy for users to remember. Naturally, this leads many users to &nbsp;incorporate personal information into their passwords. However, as is &nbsp;discussed in the Social Engineering Fundamentals, it is alarmingly easy &nbsp;for hackers to obtain personal information about prospective targets. As &nbsp;such, it is strongly recommended that users not include such &nbsp;information in their passwords. This means that the password should not &nbsp;include anything remotely related to the user’s name, nickname, or the &nbsp;name of a family member or pet. Also, the password should not contain &nbsp;any easily recognizable numbers like phone numbers or addresses or other &nbsp;information that someone could guess by picking up your mail.&nbsp;</p>
<p><em>Length, Width and Depth</em></p>
<p><br>
A strong, effective password requires a necessary degree of complexity. &nbsp;Three factors can help users to develop this complexity: length, width &nbsp;&amp; depth. Length means that the longer a password, the more difficult &nbsp;it is to crack. Simply put, longer is better. Probability dictates that &nbsp;the longer a password the more difficult it will be to crack. It is &nbsp;generally recommended that passwords be between six and nine characters. &nbsp;Greater length is acceptable, as long as the operating system allows &nbsp;for it and the user can remember the password. However, shorter &nbsp;passwords should be avoided. Width is a way of describing the different types of characters that &nbsp;are used. Don’t just consider the alphabet. There are also numbers and &nbsp;special characters like ‘%’, and in most operating systems, upper and &nbsp;lower case letters are also known as different characters. Windows, for &nbsp;example, is not always case sensitive. (This means it doesn’t know the &nbsp;difference between ‘A’ and ‘a’.) Some operating systems allow control &nbsp;characters, alt characters, and spaces to be used in passwords. As a &nbsp;general rule the following character sets should all be included in &nbsp;every password: &nbsp;</p>
<ul>
  <li>uppercase letters such as A, B, C;</li>
  <li>lowercase letters such as a, b,c;</li>
  <li>numerals such as 1, 2, 3;</li>
  <li>special characters such as $, ?, &amp;; and</li>
  <li>alt characters such as µ, £, Æ. (Cliff)</li>
</ul>
<p>Depth refers to choosing a password with a challenging meaning – &nbsp;something not easily guessable. Stop thinking in terms of passwords and &nbsp;start thinking in terms of phrases. “A good password is easy to &nbsp;remember, but hard to guess.” (Armstrong) The purpose of a mnemonic &nbsp;phrase is to allow the creation of a complex password that will not need &nbsp;to be written down. Examples of a mnemonic phrase may include a phrase &nbsp;spelled phonetically, such as ‘ImuKat!’ (instead of ‘I’m a cat!’) or the &nbsp;first letters of a memorable phrase such as ‘qbfjold*’ = “quick brown &nbsp;fox jumped over lazy dog.”&nbsp;</p>
<p>What may be most effective is for users to choose a phrase that is &nbsp;has personal meaning (for easy recollection), to take the initials of &nbsp;each of the words in that phrase, and to convert some of those letters &nbsp;into other characters (substituting the number ‘3’ for the letter ‘e’ is &nbsp;a common example). For more examples, see the University of Michigan’s &nbsp;Password Security Guide. <em>Extra Protection</em><br>
All of the good password cracking programs include foreign words, &nbsp;backwards words, etc. And the easiest way to steal a password is by &nbsp;asking for it, so it’s simpler to never give it away. &nbsp;</p>
<p><br></p>
<p><strong>OUR RECOMMENDATION TO ORGANIZATIONS</strong>&nbsp;</p>
<p><em>Tips for Organizations and Network Administrators</em></p>
<p><br>
Managers and administrators can enhance the security of their networks &nbsp;by setting strong password policies. Password requirements should be &nbsp;built into organizational security policies. Network administrators &nbsp;should institute by regular changes/updates of passwords. They should &nbsp;also regularly remind users of how easy it is for hackers to get their &nbsp;passwords through social engineering and online attacks. New users &nbsp;should be taught about good password practices. Providing intranet &nbsp;resources on network security and password security can also be helpful. &nbsp;Finally, the organization’s password policy should be integrated into &nbsp;the security policy, and all readers should be made to read the policy &nbsp;and sign-off on it.&nbsp;</p>
<p>Systems administrators should implement safeguards to ensure that &nbsp;people on their systems are using adequately strong passwords. They &nbsp;should set password expiration dates on all programs being run on the &nbsp;organization’s systems. Keep a password history to prevent reuse, and &nbsp;lock of accounts after 3-5 password attempts. Keep the number of people &nbsp;in the organization who have these passwords as small as possible. The &nbsp;organization should also use newer versions of OSs that have more secure &nbsp;password files and authentication protocols. Keep your individual &nbsp;account passwords updated as well. Finally, when installing new systems, &nbsp;make sure default passwords are changed immediately. &nbsp;&nbsp;</p>
<p><strong>HTTPS VS HTTP</strong></p>
<p>&nbsp;Use HTTPS instead of HTTP whenever possible. Websites that have an &nbsp;https:// before the website name, add an extra security layer called SSL &nbsp;by encrypting your browser. It is recommended to use https:// whenever &nbsp;possible especially when performing banking or financial transactions &nbsp;online. In other words, communications sent over regular HTTP &nbsp;connections are in plain text and can be read by intruders that break &nbsp;into the connection between your browser and the website.&nbsp;</p>
<p>With HTTPS, &nbsp;all communication is securely encrypted. Due to SSL (Secure Socket &nbsp;Layer), an intruder cannot decrypt data that passes between you and a &nbsp;website. Don’t use security questions when you forget your password. Most &nbsp;companies ask customers to answer “security questions” when registering &nbsp;for an online account. When a user forgets their password, they are &nbsp;asked to answer a few security questions. The problem with this is &nbsp;approach is that many users answer easy questions like favourite food, &nbsp;mother’s maiden name, city of birth or favourite sport. Hackers have a &nbsp;reasonably good chance of guessing the right answer by monitoring your &nbsp;social activity. Google recommends having an alternative email address &nbsp;or an SMS option, instead of providing answers to security questions. &nbsp;Verifying a password by answering security questions should be a last &nbsp;resort.</p>
<p><br></p>
</html>
👍  , , , ,
properties (23)
authorbumbaram
permlinkwhat-you-should-know-about-hackers-and-hacking
categoryhack
json_metadata{"tags":["hack"]}
created2016-07-22 15:17:33
last_update2016-07-22 15:17:33
depth0
children0
last_payout2016-08-22 15:28:30
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length22,191
author_reputation-14,862,431
root_title"What You Should Know About Hackers and Hacking"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id275,447
net_rshares335,335,991
author_curate_reward""
vote details (5)