Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Tuesday, April 21, 2015

Hack Attack: Learn How Hackers Think, What They Do, What You Should Do

The issue of computer security goes well beyond protecting your Facebook account. There are hackers out there who want your data for a variety of reasons. Many of them will use it to pilfer your checking and savings accounts. Others will sell your data to other unscrupulous parties who, in turn use it for similar purposes.

Recently we've read a variety of news articles, many of them shared here on ESC's website. The Sony hack was probably one of the most memorable of recent years, but there are plenty of others. Now, as you may have already seen, experts are telling us that the Internet connection aboard a jet airliner may be utilized to hack the autopilot in the aircraft. What's next?

One piece of news recently shared by ESC's Director of Social Media and Web Assets over his own social channel involved the placement of a portable WiFi device on sheep and other cattle to provide a mess-type WiFi connectivity for rural locales. It's the issue of widespread access to the Internet that increases the likelihood that hackers will one day attack critical targets, some big and others relatively small.

By contrast, before the Internet became so popular as a means of access to critical infrastructure, governments, corporations, and others used dedicated phone lines, fiber connections, and radio links. If a hacker was not local to the pipe (cable) or radio transmissions, he couldn't access it. The Internet has changed all of that and the outcome is a world of hurt.

The following three videos offer a variety of ideas and educational material on the issue of hacking. ESC would like you to be informed on the risks so you can maintain adequate security on the computer systems you use in your business and personal home. Many times a computer in a business serves double duty, offering a means of programming and monitoring access control and/or video surveillance while being used for daily needs. Although we do not suggest this dual use, we know it is out there. So without further ado, please enjoy the following videos on hacking.

Confessions of a Cyber Spy Hunter: Eric Winsborrow at TEDxVancouver

Hack, Hacking & Hackers - In the Realm of the Hackers [The Full Documentary Movie]

Hacking 101: Frank Heidt at TEDxMidwest

Copyright©2015
TpromoCom

Friday, November 21, 2014

Cover Those Webcams

The practice of hacking web cameras is nothing new, but I fear that the general population remains largely unaware of the practice. Acquaint yourself with this trend by reading the story highlighted below. It's about a Russian website that specializes in video voyeurism. Recently they featured 53 webcams in Ireland where it was plain to see that many of the victims were at home lounging, some possibly in their own bedrooms.

"A Russian site which contained a link to 53 Irish cameras was taken down last night. The streams accessed a number of different types of camera screens in homes and businesses. People could be seen relaxing on screen in some footage, making it clear that many of the streams are live from private homes." (click here)

In the distant past, video voyeurism was not as easily executed by a third party as it is today. Video surveillance cameras are so small that it's difficult for professionals to spot them on occasion. Combine this with wireless technologies, as well as the proliferation of the Internet, there's a serious potential for privacy violations.

The bottom line solution for video voyeurism is two-fold:

  1. If you leave your computer on all the time, down your wireless or hardline Internet connection
  2. Cover your webcam when it's not in use, or at least while you're not using it yourself.

For more information on voyeurism, go to http://www.ehow.com/info_8723077_video-voyeurism.html.

Copyright©2014