1. HACKING.....
EVER WONDER ABOUT THE ORIGINS OF THE HACKING MOVEMENT? HOW WERE HACKERS BORN? IF YOU’RE OLD ENOUGH, DO YOU
EVEN REMEMBER WHEN THE WORD “HACKER” WAS FIRST COINED?
Hacking came from “phreaking” (hacking phone systems), out of the late 1990s and
early 2000s. Breaking into networks was called “cracking.” The prototype hackers were
interested in getting into phone systems.
S.ARAVINDHAN... REGISTER NO :123002007....ROLL NUMBER:02....
2. HACKING AND
BANKING...
Hackers use hardware and software to test how easily a computer network can be
penetrated. Areas of weakness are called vulnerabilities. Vulnerabilities can be found
at any one of a number of points, such as the Internet connection itself, the browser
or the operating system of the user’s computer.
A decade ago, hackers crashed computers—making the user instantly know they were
hacked. These days, hackers have figured out ways to commit crimes without the user
knowing it. How could they get your banking information if your computer is crashed?
Instead, they infect your computer with a Trojan that waits quietly, undetected, then
spring into action when you begin online banking sending information to the hacker.
S.ARAVINDHAN... REGISTER NO :123002007....ROLL NUMBER:02....
3. GLOBAL-LEVEL
REAL INCIDENT
June: The city of Riviera Beach, Florida ,USA paid roughly $600,000 ransom in Bitcoin
to hackers who seized their computers using ransomeware.[Hackers stole 18 hours of
unreleased music from the band radiohead demanding $150,000 ransom. Radiohead
released the music to the public anyway and did not pay the ransom.
November: The first U.S. indictment of individual people for ransomeware attacks
occurs. The US Justice department indicted two men Faramarz Shahi Savandi and
Mohammad Mehdi Shah Mansouri who allegedly used the SamSam ransomware for
extortion, netting them more than $6 million in ransom payments.Instead, they infect
your computer with a Trojan that waits quietly, undetected, then spring into action
when you begin online banking sending information to the hacker.
S.ARAVINDHAN... REGISTER NO :123002007....ROLL NUMBER:02....
5. HOW TO
DEFEND
YOURSELF
FROM
HACKERS????
• Never perform any sensitive activities on a public
or unsecured network.
• Err on the side of caution and use something more
secure, such as your home Wi-Fi.
• When you log into a sensitive site, always check for
HTTPS in the address bar. If it’s not there, there’s a
good chance you’re looking at a fake site!
• Internet banking is very convenient for both
customer and hacker alike. Thankfully, you can do
your part to ensure you’re not a target of these
attacks. By keeping your details safe, you’ll give
hackers very little to work with when they take aim
at your savings.
S.ARAVINDHAN... REGISTER NO :123002007....ROLL NUMBER:02....
6. Man is to technology what the
bee is to the flower. It’s man’s
intervention that allows
technology to expand and
evolve itself and in return,
technology offers man
convenience, wealth and the
lessening burden of physical
labor via its automated systems.
S.ARAVINDHAN... REGISTER NO :123002007....ROLL NUMBER:02....