السبت، 28 ديسمبر 2013

The top 10 important hacks of 2013

The top 10 important hacks of 2013



States during the preceding week , Christmas shoppers got an unwanted shock when exposed to a scam waiting resulted in the theft of up to 40 million debit and credit card numbers , starting from a target customers.
The retailer insisted consumers to keep a close eye on their testimonies , in addition to credit scores , however this is definitely not the opening time consumers , along with Internet users have to double check their financial records fraud, or alter a secret code to the Internet in 2013.
This year , the robbers have besieged to secure personal data , otherwise distribute malware via phishing schemes in order to win over Twitter and social media feeds servers. Government organizations were not protected in the event of default, while the U.S. Besides China had a bout of words over whether they were concealed in the other work.


By mid-year , meanwhile , had also quite a stir over the amount currently use right cover of the National Security Agency U.S. email, call logs, and other data when previous contractor Edward Snowden finding revealed a cache credentials to journalists.
It's been a year full of positive activity for scammers and hackers , as well so we like to think together the high-profile hacks prepared headlines this year. Go through this article for our top ten security breaches of 2013 ...
1. adobe
At around the beginning of October , Adobe revealed that it was the victim of a hack that influenced the region over 3 million users . Cheaters were made with the names of consumers, debit card numbers and encrypted credit card , cessation dates and other information that connects consumers orders .
The software company also claimed that the "source code intended for Adobe products abundant " was stolen in an intrusion division that might be associated with the theft of customer data . Later, on the other hand, Adobe admitted that the rape actually rolled 38 million users. We're sorry.
2- . Syrian Electronic Army
The Syrian electronic army appeared in September 2012 , but was relatively tired of this year with the aim of descriptions of various social media channels of communication that involves DES published editorials considerate of Syrian rebels , telling the Financial Times, the New York Times, the BBC , The Guardian , more, even the Onion . It is also still managed to get the web page of the New York Times online in August. ( Honorable mention: Hacking the Jeep Twitter feeds and Burger King ) .
3-. Chinese hackers
In January , the New York Times discovered that he had been the target of Chinese hackers for not less than four months. The invaders were allegedly looking for details regarding the sources that journalists Times talked to a narrative about October prosperity Wen Jiabao , Premier of China.
The following month, security researchers outlined an inexhaustible Mandiant supercomputer hackers group martialed structure with government support in Shanghai , China. The company claimed Popular Liberation Army of 61398 Unity lies " specifically the similar area " as part of APT1 a persistent danger proceeded grouping ( APT ) has stolen thousands of terabytes of data memory as at least 141 organizations universally .
April . JPMorgan
Before this month, JPMorgan said that 465,000 people using forex prepaid cards issued by the bank possibly have covered her bare individual data breach . JPMorgan notify exaggerated on 2 percent of all 25 million citizens covering UCards holders also uses the website UCard Centre in mid July with September. ( Honourable declare Evernote also contravenes March April 's hack LivingSocial ) .
4- . Zombies!
This trick is added fun than monetarily devastating for users, but a disadvantage is highlighted in the process of urgent alert U.S. situation . In February, someone hacked interested in the Emergency Alert System and KRTV announced the addition of CW in Montana so the zombie catastrophe was on the first class citizens of the U.S. . The note began resembles any other urgent alert situation - dialing up- esque beeps , tones and with a careful tracing the top of the screen. But relatively warning about weather emergency or most likely any position, a voice reached alarming warn people about zombies. Rest assures that there were zombies. Not until now, at least .
6. Hacks U.S. government
Above States , foods were not protected from criminals or hackers this year , with more than some government agencies are victims of rapists Internet , telling the Department of Energy , the Federal Reserve , plus even the social network accounts of former Secretary of State Colin Powell.
7. Wall Zuckerberg
If not boast $ 100 (60 € ) to get the concentration of Mark Zuckerberg , why not scam your timeline Facebook wall ? That is what the Palestinian security researcher Khalil Shreateh after he had discovered a flaw in the substance surrounding Facebook which supposedly allow anyone to place the Facebook walls of several other addict. Subsequent to Facebook ignored their warnings , they decided to take advantage of development data and post message facebook wall the CEO. Facebook later fixed the bug, but refused to provide Shreateh (300 € ) reward $ 500 errors.
8. Developer website of Apple
Apple gets its medial offline developer in late July , while an alleged computer hacker tried to misappropriate personal data records of the corporation. While statistics are encrypted with "can not access, " Apple supposed , there were several concerns that " the names of the developers , shipping address with / or email addresses possibly have been admittances . " Version A renewed website online responsed in middle August .
9. Facebook, over Apple malware
In February, Facebook claimed his security team had revealed that coordination of Facebook was " directed in a complicated attack. " It occurred " when a group of workers of scale a website mobile developers who negotiated " Facebook claimed . Some days later, Apple has completed the rare access he was also prey to hackers , criminals assaulted by similar online who besieged Facebook . No usage records was stolen as any corporation , however.
10. Anonymous v / s North Korea
In April Twitter Flickr certificates besides North Korean explanations were hacked , allegedly as part of " hacktivist " Anonymous establish efforts ' to disrupt web support of the communist state . Attackers beleaguered North Korean leader Kim Jong -un, in a sequence of tweets plus photos that represent a beam less flattering .
Share and Enjoy

ليست هناك تعليقات:

إرسال تعليق