SlideShare a Scribd company logo
Hacking a short history


Common thieves, wishing to get rich by putting their hand in the others pocket? No, rarely they are... Are
they the Robin Hoods of the Net? the legendary British outlaw one would think of. Well, it's a little of that
and a lot more complex...


Your data has a value


Hacking has been a growing problem since the beginning of this century, and can have very serious
consequences if confidential information falls into the wrong hands. Intrusions into computer networks,
combined with physical attacks, have caused many people
sleepless nights, significant financial damage or physical harm.


Many people are still unaware of these facts, the attacks affect
"small" as well as "large" companies, government agencies,
NASA,… and even those who implement security standards and
algorithms. Attacks affect everyone, at all levels: individual,
community, organizational and national.


Everyone has assets, sensitive or private data, we all have some
"market value" of exchange on the internet or dark-net, our
private lives can be sold or traded.


Individuals learn about cyber attacks often once the damage is done to them... once our (your) data is
hacked or hijacked, by the theft of credit card data from a merchant site, by a hijacked legal identity, by a
hacker who breaks into your home via emails that seem relevant
and authentic, or through your home automation/IoT network and
takes control of your computers or spies on you without your
knowledge.


For businesses, in a world of increasingly interconnected systems,
theft of industrial data, intellectual property, or production line
takeover is becoming a sad reality. Some, too many, are forced to
close their doors because of a computer attack, others pay heavy
charges...


Some attacks target the security of a country, others influence presidential elections, others affect pipelines
in the US or paralyze French hospitals.


Facts


I'm not going to make an apology for hacking, but if you look for statistics on the web, you can find some
worrying things about it:


⋅Every 39 seconds there is a hacker attack.


⋅More than 300,000 new pieces of malware are created every day.


⋅On the dark-net, you can become a US citizen for $6,000.


⋅The US cybersecurity budget was around $15 billion in 2020, the GDP of a
country like Albania, or various African countries.


Intriguing, isn't it? Let's take a closer look…


Motivation count age doesn’t matter


You see, I would say that hackers are like you, me and the rest of the
world. They like to find out what's going on around them... they're
curious and intelligent. It's true, we all have something we like and that
characterizes us: some like to run, some like to climb, some like to take
pictures...


Well, they like to find ways around the restrictions imposed on them, to
find flows to break into other people's lives or to go to places that other
people don't even think about.


They like to "poke around" ... Hackers exploit vulnerabilities, just like burglars trying to break-in your
home, but now in the digital world!


Don't think you have to be a certain age to gain experience before you become a hacker. This is true for
some, but it is definitely not always the case. The history of the last 30 years has given us many
"personalities" who have made a name for themselves by their exploits at a very young age, I will mention
only 3 that made an impression on me during my readings…


Even if this example is already 20 years old, remember that he was 15 years old,
Jonathan James, when he managed to hack NASA and put its computers out of
service for three weeks. He was prosecuted by the FBI after hacking into the
computers of the Defense Threat Reduction Agency (DTRA), a division of the US
DoD. Jonathan James became the first juvenile incarcerated for cybercrime in the
US (The New York Times).
Also at the age of 15, Michael Calce (MafiaBoy) from Quebec shook the heads of various American
corporations. In February 2000, under the pseudonym Mafiaboy, he made it impossible for users to access
eleven websites, including Dell, E*Trade, Yahoo!, Amazon, eBay and CNN. At the time, the losses to these
companies amounted to about CA$1.7 billion... to carry out the attacks, he used software developed by more
knowledgeable "buddies", carrying out denial of service attacks. In 2008, Michael returned to the forefront
with his autobiography and since 2015 he has been writing cyber articles in the Montreal newspaper
(wikipedia).


It is also a young man, Mr. George Hotz or George Francis Hotz (alias geohot,
million75 or simply mil), born in 1989 who, in 2007, successfully jailbreaks the
iPhone1 and gets another SIM recognized than the AT&T imposed one for his
iPhone. Three years later, he was the author of a new success: hacking the Sony
Playstation 3 in a few weeks, even though it had the reputation of being
impenetrable. This prompted Sony to release an update to counter the flaw. The
company went to court against the young man. They finally came to an agreement
that George Hotz should never hack into Sony products again... Well, in meanwhile George found other
interesting things to do... autonomous cars.


Hacking and economy


By their effects, the hacking allowed indirectly going forward. New safeguards and communication
standards were developed to respond to the attacks allowing
protecting the data, the assets.


The industrials place higher and higher importance in the battle
against hacking. More and more large companies are recruiting
ethical hackers to protect their resources.


Why do they do this? Simple, it's economic... it is better to pay to
protect than to pay to fix.


These experts will:


• Provide adequate preventive measures against security breaches, discover vulnerabilities and
explore the risk potential, thus preventing intrusions into the organization's information systems


• Protect customer data available in business transactions,


• Conduct a risk analysis and strengthen the organization cyber’s posture at several levels:
policy, IT hygiene, network infrastructure,


• Increase security knowledge and awareness for all employees.


•
Big companies are also involved in cyber education, and I will just give just the example of Microsoft who,
according to tribuneindia.com, has offered Virender Raika, the son of a labourer in Kurukshetra, India, a
reward of 560,000 euros a year for his extraordinary anti-hacking skills.


Must as you know is a Startup. But for us, right from the inception, cyber has been and still is an important
concern every day. We take this subject very seriously.


Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our
virtual exhibitions, on different high tech thematic and especially on cybersecurity.


----------------------------------------------------------------------------------------
Images credit


Steve Jennings/Getty Images, CC BY 2.0 <https://creativecommons.org/licenses/by/2.0>, via Wikimedia Commons


Naranj8, CC BY-SA 4.0 <https://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons

More Related Content

More from Mext Metaverse

Mext annonce un partenariat avec le Metaverse College,.pdf
Mext annonce un partenariat avec le Metaverse College,.pdfMext annonce un partenariat avec le Metaverse College,.pdf
Mext annonce un partenariat avec le Metaverse College,.pdf
Mext Metaverse
 
Learn how to Customize your Metaverse. Tuto #2
Learn how to Customize your Metaverse. Tuto #2Learn how to Customize your Metaverse. Tuto #2
Learn how to Customize your Metaverse. Tuto #2
Mext Metaverse
 
The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...
The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...
The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...
Mext Metaverse
 
Creating content during an eLearning session.pdf
Creating content during an eLearning session.pdfCreating content during an eLearning session.pdf
Creating content during an eLearning session.pdf
Mext Metaverse
 
Rubik Mext Cube article_20231412.pdf
Rubik Mext Cube article_20231412.pdfRubik Mext Cube article_20231412.pdf
Rubik Mext Cube article_20231412.pdf
Mext Metaverse
 
Unleashing the Power of Connection and Collaboration: The Significance of the...
Unleashing the Power of Connection and Collaboration: The Significance of the...Unleashing the Power of Connection and Collaboration: The Significance of the...
Unleashing the Power of Connection and Collaboration: The Significance of the...
Mext Metaverse
 
Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...
Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...
Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...
Mext Metaverse
 
Institutions_PPT.pptx
Institutions_PPT.pptxInstitutions_PPT.pptx
Institutions_PPT.pptx
Mext Metaverse
 
ExpoOrganizers_PPT.pptx
ExpoOrganizers_PPT.pptxExpoOrganizers_PPT.pptx
ExpoOrganizers_PPT.pptx
Mext Metaverse
 
Corporations_PPT.pptx
Corporations_PPT.pptxCorporations_PPT.pptx
Corporations_PPT.pptx
Mext Metaverse
 
CommunicationAgencies_PPT.pptx
CommunicationAgencies_PPT.pptxCommunicationAgencies_PPT.pptx
CommunicationAgencies_PPT.pptx
Mext Metaverse
 
THE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdf
THE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdfTHE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdf
THE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdf
Mext Metaverse
 
Why B2B Metaverse.pdf
Why B2B Metaverse.pdfWhy B2B Metaverse.pdf
Why B2B Metaverse.pdf
Mext Metaverse
 
Unleash the Power of Connection and Collaboration in the Mext B2B Expo.pdf
Unleash the Power of Connection and Collaboration in the Mext B2B Expo.pdfUnleash the Power of Connection and Collaboration in the Mext B2B Expo.pdf
Unleash the Power of Connection and Collaboration in the Mext B2B Expo.pdf
Mext Metaverse
 
Mext announces the launch of the new generation of its Metaverse platform.
Mext announces the launch of the new generation of its Metaverse platform.Mext announces the launch of the new generation of its Metaverse platform.
Mext announces the launch of the new generation of its Metaverse platform.
Mext Metaverse
 
Mext Metaverse White Paper.pdf
Mext Metaverse White Paper.pdfMext Metaverse White Paper.pdf
Mext Metaverse White Paper.pdf
Mext Metaverse
 
The Metaverse: A Paradigm Shift in Marketing Innovation
The Metaverse: A Paradigm Shift in Marketing InnovationThe Metaverse: A Paradigm Shift in Marketing Innovation
The Metaverse: A Paradigm Shift in Marketing Innovation
Mext Metaverse
 
A look at B2B Metaverse
A look at B2B MetaverseA look at B2B Metaverse
A look at B2B Metaverse
Mext Metaverse
 
Will the metaverse change the humanity values?
Will the metaverse change the humanity values?Will the metaverse change the humanity values?
Will the metaverse change the humanity values?
Mext Metaverse
 
Article Hanene Maupas.pdf
Article Hanene Maupas.pdfArticle Hanene Maupas.pdf
Article Hanene Maupas.pdf
Mext Metaverse
 

More from Mext Metaverse (20)

Mext annonce un partenariat avec le Metaverse College,.pdf
Mext annonce un partenariat avec le Metaverse College,.pdfMext annonce un partenariat avec le Metaverse College,.pdf
Mext annonce un partenariat avec le Metaverse College,.pdf
 
Learn how to Customize your Metaverse. Tuto #2
Learn how to Customize your Metaverse. Tuto #2Learn how to Customize your Metaverse. Tuto #2
Learn how to Customize your Metaverse. Tuto #2
 
The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...
The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...
The Evolution of Metaverse Events Taking Virtual Experiences to the Next Leve...
 
Creating content during an eLearning session.pdf
Creating content during an eLearning session.pdfCreating content during an eLearning session.pdf
Creating content during an eLearning session.pdf
 
Rubik Mext Cube article_20231412.pdf
Rubik Mext Cube article_20231412.pdfRubik Mext Cube article_20231412.pdf
Rubik Mext Cube article_20231412.pdf
 
Unleashing the Power of Connection and Collaboration: The Significance of the...
Unleashing the Power of Connection and Collaboration: The Significance of the...Unleashing the Power of Connection and Collaboration: The Significance of the...
Unleashing the Power of Connection and Collaboration: The Significance of the...
 
Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...
Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...
Mext annonce le lancement de la nouvelle génération de sa plateforme Métav...
 
Institutions_PPT.pptx
Institutions_PPT.pptxInstitutions_PPT.pptx
Institutions_PPT.pptx
 
ExpoOrganizers_PPT.pptx
ExpoOrganizers_PPT.pptxExpoOrganizers_PPT.pptx
ExpoOrganizers_PPT.pptx
 
Corporations_PPT.pptx
Corporations_PPT.pptxCorporations_PPT.pptx
Corporations_PPT.pptx
 
CommunicationAgencies_PPT.pptx
CommunicationAgencies_PPT.pptxCommunicationAgencies_PPT.pptx
CommunicationAgencies_PPT.pptx
 
THE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdf
THE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdfTHE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdf
THE FUTURE OF VIRTUAL EVENTS AND EXHIBITIONS.pdf
 
Why B2B Metaverse.pdf
Why B2B Metaverse.pdfWhy B2B Metaverse.pdf
Why B2B Metaverse.pdf
 
Unleash the Power of Connection and Collaboration in the Mext B2B Expo.pdf
Unleash the Power of Connection and Collaboration in the Mext B2B Expo.pdfUnleash the Power of Connection and Collaboration in the Mext B2B Expo.pdf
Unleash the Power of Connection and Collaboration in the Mext B2B Expo.pdf
 
Mext announces the launch of the new generation of its Metaverse platform.
Mext announces the launch of the new generation of its Metaverse platform.Mext announces the launch of the new generation of its Metaverse platform.
Mext announces the launch of the new generation of its Metaverse platform.
 
Mext Metaverse White Paper.pdf
Mext Metaverse White Paper.pdfMext Metaverse White Paper.pdf
Mext Metaverse White Paper.pdf
 
The Metaverse: A Paradigm Shift in Marketing Innovation
The Metaverse: A Paradigm Shift in Marketing InnovationThe Metaverse: A Paradigm Shift in Marketing Innovation
The Metaverse: A Paradigm Shift in Marketing Innovation
 
A look at B2B Metaverse
A look at B2B MetaverseA look at B2B Metaverse
A look at B2B Metaverse
 
Will the metaverse change the humanity values?
Will the metaverse change the humanity values?Will the metaverse change the humanity values?
Will the metaverse change the humanity values?
 
Article Hanene Maupas.pdf
Article Hanene Maupas.pdfArticle Hanene Maupas.pdf
Article Hanene Maupas.pdf
 

Recently uploaded

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 

Recently uploaded (20)

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 

article cybersecurity must B2B metaverse

  • 1. Hacking a short history Common thieves, wishing to get rich by putting their hand in the others pocket? No, rarely they are... Are they the Robin Hoods of the Net? the legendary British outlaw one would think of. Well, it's a little of that and a lot more complex... Your data has a value Hacking has been a growing problem since the beginning of this century, and can have very serious consequences if confidential information falls into the wrong hands. Intrusions into computer networks, combined with physical attacks, have caused many people sleepless nights, significant financial damage or physical harm. Many people are still unaware of these facts, the attacks affect "small" as well as "large" companies, government agencies, NASA,… and even those who implement security standards and algorithms. Attacks affect everyone, at all levels: individual, community, organizational and national. Everyone has assets, sensitive or private data, we all have some "market value" of exchange on the internet or dark-net, our private lives can be sold or traded. Individuals learn about cyber attacks often once the damage is done to them... once our (your) data is hacked or hijacked, by the theft of credit card data from a merchant site, by a hijacked legal identity, by a hacker who breaks into your home via emails that seem relevant and authentic, or through your home automation/IoT network and takes control of your computers or spies on you without your knowledge. For businesses, in a world of increasingly interconnected systems, theft of industrial data, intellectual property, or production line takeover is becoming a sad reality. Some, too many, are forced to close their doors because of a computer attack, others pay heavy charges... Some attacks target the security of a country, others influence presidential elections, others affect pipelines in the US or paralyze French hospitals. 

  • 2. Facts I'm not going to make an apology for hacking, but if you look for statistics on the web, you can find some worrying things about it: ⋅Every 39 seconds there is a hacker attack. ⋅More than 300,000 new pieces of malware are created every day. ⋅On the dark-net, you can become a US citizen for $6,000. ⋅The US cybersecurity budget was around $15 billion in 2020, the GDP of a country like Albania, or various African countries. Intriguing, isn't it? Let's take a closer look… Motivation count age doesn’t matter You see, I would say that hackers are like you, me and the rest of the world. They like to find out what's going on around them... they're curious and intelligent. It's true, we all have something we like and that characterizes us: some like to run, some like to climb, some like to take pictures... Well, they like to find ways around the restrictions imposed on them, to find flows to break into other people's lives or to go to places that other people don't even think about. They like to "poke around" ... Hackers exploit vulnerabilities, just like burglars trying to break-in your home, but now in the digital world! Don't think you have to be a certain age to gain experience before you become a hacker. This is true for some, but it is definitely not always the case. The history of the last 30 years has given us many "personalities" who have made a name for themselves by their exploits at a very young age, I will mention only 3 that made an impression on me during my readings… Even if this example is already 20 years old, remember that he was 15 years old, Jonathan James, when he managed to hack NASA and put its computers out of service for three weeks. He was prosecuted by the FBI after hacking into the computers of the Defense Threat Reduction Agency (DTRA), a division of the US DoD. Jonathan James became the first juvenile incarcerated for cybercrime in the US (The New York Times).
  • 3. Also at the age of 15, Michael Calce (MafiaBoy) from Quebec shook the heads of various American corporations. In February 2000, under the pseudonym Mafiaboy, he made it impossible for users to access eleven websites, including Dell, E*Trade, Yahoo!, Amazon, eBay and CNN. At the time, the losses to these companies amounted to about CA$1.7 billion... to carry out the attacks, he used software developed by more knowledgeable "buddies", carrying out denial of service attacks. In 2008, Michael returned to the forefront with his autobiography and since 2015 he has been writing cyber articles in the Montreal newspaper (wikipedia). It is also a young man, Mr. George Hotz or George Francis Hotz (alias geohot, million75 or simply mil), born in 1989 who, in 2007, successfully jailbreaks the iPhone1 and gets another SIM recognized than the AT&T imposed one for his iPhone. Three years later, he was the author of a new success: hacking the Sony Playstation 3 in a few weeks, even though it had the reputation of being impenetrable. This prompted Sony to release an update to counter the flaw. The company went to court against the young man. They finally came to an agreement that George Hotz should never hack into Sony products again... Well, in meanwhile George found other interesting things to do... autonomous cars. Hacking and economy By their effects, the hacking allowed indirectly going forward. New safeguards and communication standards were developed to respond to the attacks allowing protecting the data, the assets. The industrials place higher and higher importance in the battle against hacking. More and more large companies are recruiting ethical hackers to protect their resources. Why do they do this? Simple, it's economic... it is better to pay to protect than to pay to fix. These experts will: • Provide adequate preventive measures against security breaches, discover vulnerabilities and explore the risk potential, thus preventing intrusions into the organization's information systems • Protect customer data available in business transactions, • Conduct a risk analysis and strengthen the organization cyber’s posture at several levels: policy, IT hygiene, network infrastructure, • Increase security knowledge and awareness for all employees. •
  • 4. Big companies are also involved in cyber education, and I will just give just the example of Microsoft who, according to tribuneindia.com, has offered Virender Raika, the son of a labourer in Kurukshetra, India, a reward of 560,000 euros a year for his extraordinary anti-hacking skills. Must as you know is a Startup. But for us, right from the inception, cyber has been and still is an important concern every day. We take this subject very seriously. Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our virtual exhibitions, on different high tech thematic and especially on cybersecurity. ----------------------------------------------------------------------------------------
  • 5. Images credit 
 Steve Jennings/Getty Images, CC BY 2.0 <https://creativecommons.org/licenses/by/2.0>, via Wikimedia Commons 
 Naranj8, CC BY-SA 4.0 <https://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons