What Is Hacking
What Is Hacking
History of hacking/hackers
In its current usage, the term dates back to the 1970s. In 1980, an
article in Psychology Today used the term “hacker” in its title:
“The Hacker Papers,” which discussed the addictive nature of
computer use.
Types of hacking/hackers
Broadly speaking, you can say that hackers attempt to break into
computers and networks for any of four reasons.
White hat hackers, on the other hand, strive to improve the security
of an organization's security systems by finding vulnerable flaws so
that they can prevent identity theft or other cybercrimes before the
black hats notice. Corporations even employ their own white hat
hackers as part of their support staff, as a recent article from the
New York Times online edition highlights. Or businesses can even
outsource their white hat hacking to services such as HackerOne,
which tests software products for vulnerabilities and bugs for a
bounty.
Finally, there's the gray hat crowd, hackers who use their skills to
break into systems and networks without permission (just like the
black hats). But instead of wreaking criminal havoc, they might
report their discovery to the target owner and offer to repair the
vulnerability for a small fee.
Latest hacking news
Perspectives on Russian hacking
UK law enforcement: an uphill struggle to fight hackers
Biohacking
Hacking prevention
If your computer, tablet, or phone is at the bull's-eye of the hacker's
target, then surround it with concentric rings of precautions.
Know that no bank or online payment system will ever ask you for
your login credentials, social security number, or credit card
numbers by means of email.
All the above is basic hygiene, and always a good idea. But the bad
guys are forever looking for a new way into your system. If a hacker
discovers one of your passwords that you use for multiple
services, they have apps that can breach your other accounts. So
make your passwords long and complicated, avoid using the same
one for different accounts, and instead use a password manager.
Because the value of even a single hacked email account can rain
disaster down on you.
How does hacking affect my
business?
For criminal minded hackers, business is booming. Case in
point, attacks on businesses went up 55 percent in the second half
of 2018 with Trojans and ransomware proving to be the most
popular types of attacks. Specifically, Trojan attacks on businesses
rose 84 percent while ransomware attacks went up 88 percent.
Backup all your data. This goes for all the endpoints on your
network and network shares too. As long as your data is
archived, you can always wipe an infected system and restore
from a backup.