Showing posts with label Chinese hackers. Show all posts
Showing posts with label Chinese hackers. Show all posts

Tuesday, April 21, 2015

Hack Attack: Learn How Hackers Think, What They Do, What You Should Do

The issue of computer security goes well beyond protecting your Facebook account. There are hackers out there who want your data for a variety of reasons. Many of them will use it to pilfer your checking and savings accounts. Others will sell your data to other unscrupulous parties who, in turn use it for similar purposes.

Recently we've read a variety of news articles, many of them shared here on ESC's website. The Sony hack was probably one of the most memorable of recent years, but there are plenty of others. Now, as you may have already seen, experts are telling us that the Internet connection aboard a jet airliner may be utilized to hack the autopilot in the aircraft. What's next?

One piece of news recently shared by ESC's Director of Social Media and Web Assets over his own social channel involved the placement of a portable WiFi device on sheep and other cattle to provide a mess-type WiFi connectivity for rural locales. It's the issue of widespread access to the Internet that increases the likelihood that hackers will one day attack critical targets, some big and others relatively small.

By contrast, before the Internet became so popular as a means of access to critical infrastructure, governments, corporations, and others used dedicated phone lines, fiber connections, and radio links. If a hacker was not local to the pipe (cable) or radio transmissions, he couldn't access it. The Internet has changed all of that and the outcome is a world of hurt.

The following three videos offer a variety of ideas and educational material on the issue of hacking. ESC would like you to be informed on the risks so you can maintain adequate security on the computer systems you use in your business and personal home. Many times a computer in a business serves double duty, offering a means of programming and monitoring access control and/or video surveillance while being used for daily needs. Although we do not suggest this dual use, we know it is out there. So without further ado, please enjoy the following videos on hacking.

Confessions of a Cyber Spy Hunter: Eric Winsborrow at TEDxVancouver

Hack, Hacking & Hackers - In the Realm of the Hackers [The Full Documentary Movie]

Hacking 101: Frank Heidt at TEDxMidwest