Blog on Hacking
Ethical Hacking
Ethical Hacking is one of the high demanded jobs in INFORMATION TECHNOLOGY.
Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach. They penetrate the system and find sensitive data and bugs for these organizations and fix them to the requirements Depending on the data sensitivity, ethical hackers may have to agree to a non-disclosure agreement, in addition to other terms and conditions required by the assessed organization. Ethical hacking is completely legal and the highest paid job in the IT field. an ethical hacker would work as an employee in an organization, a security firm, or as an independent security consultant.
Ethical hacking is not new, though it has transformed rapidly as new technologies and the Internet of things evolve. Today’s ethical hackers have meticulously built a reputation for their skills and ethical behavior in the industry.
How to safe your data
This is the most asked question on the Internet. According to a recent HSB Cyber Study, 90% of businesses experienced hacking incidents over the last year. The study found that risk managers are worried about the safety and security of ‘internet of things’ devices, and the Data exposed with the rise of hyper-connectivity. Only 28%Of Businesses said IoT devices are actually safe for business use, yet 56% of businesses already use them or plan to use it in the future.
Using a firewall and regularly updating passwords are just the first steps to secure your Sensitive Data, but this won’t keep hackers from penetrating business systems and Networks. Unfortunately, even complicated passwords like adding lowercase and uppercase letters or some kind of characters, can be cracked and are often poor security practices, like storing them on a company server or computer that is also susceptible to being hacked. Using evolving technologies hackers are become more sophisticated. With the emerging technology hacker stored data for ransom and causing small business and corporations and Even big Organizations.
Hackers are defined into three types
a. Black Hat Hacker
b. White Hat Hacker
c. Gray Hat Hacker
A. BLACK Hat Hacker
Black hat hacker is also known as UNETHICAL HACKER,
These type of hacker hacks systems and networks illegally, they search for banks and other companies with weak security to steal money, customers debit card details, personal information and to archive their own goals.
In recent days the Domino’s Pizza got hacked by a group of hackers, they stole the customer's details like card details, mobile numbers, and sensitive data for their requirements. In the same way, many other shops and small businesses have got hacked by a group of black hat hackers.
B. White Hat Hacker
White hat hackers are also known as ETHICAL HACKER, an ethical hacker who hacks systems legally and they are the good guys of the hacking world. they can hack only those systems that they have permission to hack. In this hacking process, the same technique is used by the unethical hacker.
C. Gray Hat Hacker
The Gray Hat Hackers are individuals who utilize aspects from black and white hat hackers both, but they usually look for vulnerabilities in a system without an owner’s permission. When they find some issues, they ask for some sort of compensation or incentives from the owner before showing the reports. Should the owner not respond or reject their proposition, a grey hat hacker might exploit the reports that will harm company’s future. Grey hat hackers are not malicious by nature but do seek to have their efforts rewarded. Since grey hat hackers don’t have permission to access the system by its owner, their actions are ultimately considered illegal, despite any alarming findings they might reveal.
Hackers who you should know about
1. Kevin Mitnick
A seminal figure in American hacking, Kevin Mitnick started his career as a teen. In 1981, he was charged with stealing computer manuals from Pacific Bell. In 1982, he managed to hacked the North American Defense Command (NORAD), an achievement that inspired the 1983 film War Games. In 1989, he hacked Digital Equipment Corporation's (DEC) network and made copies of their software. Because DEC was a leading computer manufacturer at the time, this act put Mitnick on the map. He was later arrested and sent to prison. During his conditional release, he hacked Pacific Bell's voicemail systems.
Throughout his hacking career, Mitnick stole so many data but he never exploits it. It's widely believed that he once obtained full control of Pacific Bell's network just to prove it could be hacked. A warrant was issued for his arrest for the Pacific Bell incident, but Mitnick survived and managed to live in hiding for more than two years. When he got caught, he served time in prison for multiple counts of wire fraud and computer fraud.
2. Anonymous
Anonymous career started in 2003 on 4chan message boards in an unnamed forum. The group exhibits little organization and focused on the concept of social justice. For example, in 2008 the group took issue with the Church of Scientology and begin to disabling their websites. Thus
negatively affecting their search rankings in Google and completely blacking out their fax machines.
3. Albert Gonzalez
According to the New York Daily News, Gonzalez, dubbed "soupnazi," got his start as the "troubled pack leader of computer nerds" at his Miami high school. He eventually became active on criminal commerce site Shadowcrew.com and was considered one of its best hackers and moderators. At 22, Gonzalez was arrested in New York for debit card fraud related to stealing data from millions of card accounts. To avoid jail time, he became an informant for the Secret Service, ultimately helping indict dozens of Shadowcrew members.