1. Same story, different day...........year ie more of the same fiat floods the world
    Dismiss Notice
  2. There are no markets
    Dismiss Notice
  3. Week of 6/24/2017 Closing prices & Chg Over Last Wk---- Gold $1256.40 Silver $16.64 Oil $43.01 USD $96.94
  4. "Spreading the ideas of freedom loving people on matters regarding high finance, politics, constructionist Constitution, and mental masturbation of all types"
    Dismiss Notice

Three Steps Outlining How Hackers Access Your Personal Information

Discussion in 'Computers' started by searcher, Aug 30, 2016.



  1. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    132,146
    Likes Received:
    38,248
    Trophy Points:
    113
    Notorious former hacker reveals how criminals can steal your details in just THREE easy steps when you connect to public Wi-Fi
    • Video shows how exposed your personal details are to cyber criminals
    • Tools so accessible school students can download systems and hack
    • Jetstar and Suzuki listed as being suspected of a major cyber breach
    • Hackers monitored Australian satellite company Newsat for two years
    • Australian government, defence department and other networks hacked


    Read more: http://www.dailymail.co.uk/news/article-3764353/Notorious-former-hacker-Kevin-Mitnick-reveals-criminals-steal-details-just-THREE-easy-steps-connect-public-Wi-Fi.html#ixzz4IoDITN7d
    Follow us: @MailOnline on Twitter | DailyMail on Facebook
     
  2. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    132,146
    Likes Received:
    38,248
    Trophy Points:
    113
    Pro Hacker Tells Scary Truth CYBER SECURITY & Online Privacy
    John Lovell



    Published on Jun 1, 2017
    John Lovell interviews professional hacker on cyber security, privacy on the internet, cyber terrorism, penetration testing, information / data security, confidentiality, phishing, the dark / deep web, and hacking in Hollywood movies such as James Bond Skyfall, Hackers, Swordfish, the Net, Mr. Robot, and other movies.
     
  3. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    132,146
    Likes Received:
    38,248
    Trophy Points:
    113
    How Navy SEALs create a Bomb Proof Password | Tactical Rifleman
    Tactical Rifleman



    Published on Aug 4, 2017
    Here at Tactical Rifleman we have some great content on weapons and tactics. But today Jason Phalin, a former Navy SEAL and co-founder of Arion Risk LLC, is going to share a critical electronic security measure that the military uses to protect themselves electronically while at home and overseas. In this episode we take a look at password generation, a common weak spot in computer security. He takes us through an efficient method to generate a great password that is as easy to generate on a laptop as it is on a smart phone or tablet and can be easily taught to friends and family. Cyber security is a growing security concern for society and the need to protect ourselves digitally is equally important as our physical security. Happy Hunting!



    For more go to http://www.tacticalrifleman.com/ and Follow us on Facebook: https://www.facebook.com/TacticalRifl... and Twitter-http://bit.ly/TACrman
     
    the_shootist likes this.
  4. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    132,146
    Likes Received:
    38,248
    Trophy Points:
    113
    The man who came up with the safe password rules admits he was WRONG and his guidelines about using numbers, symbols and capital letters have made computers easier to hack!
    • Bill Burr's 'bible' on password security was written in 2003
    • His guidance was use numbers, non-alphabetic symbols and capital letters
    • Long passwords with just letters are stronger than short ones with characters
    • When people change their passwords they do predictable things like add a 1
    • These are called 'transformations' and hackers build them into their scripts


    Read more: http://www.dailymail.co.uk/sciencetech/article-4771194/The-man-responsible-passwords-says-advice-WRONG.html#ixzz4pAvqypFw
    Follow us: @MailOnline on Twitter | DailyMail on Facebook
     
  5. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    132,146
    Likes Received:
    38,248
    Trophy Points:
    113
    Cyber Security Pt.2 - Critical Tips
    John Lovell



    Published on Oct 14, 2017

    McAfee Antivirus - http://amzn.to/2y8gxds
    Norton Antivirus - http://amzn.to/2z5FlBj

    Interviewing a professional computer hacker on online security tips. Topics covered include browsing anonymously (VPNs, TOR, duckduckgo, etc.), avoiding suspiscious websites and programs, best antivirus programs, general cybersecurity, and more.
     
  6. dacrunch

    dacrunch Platinum Bling Platinum Bling

    Joined:
    Apr 9, 2010
    Messages:
    4,067
    Likes Received:
    2,762
    Trophy Points:
    113
    One of my son's friends from high-school, now in his late 30's, spent a few days with us.


    All of our computers were bogged down & slow... Since the 90's, I've been running ZoneAlarm (firewall) and AVG (viruses).

    He helped me just rely on Windows Firewall & Windows Defender. Sure sped up the computers.

    But when I went to the PirateBay (a proxy), I started getting pop-ups that I couldn't shut down, except shutting off the computer.

    I re-installed "Peerblock 1.1" (the 1st version, free, with definition updates... Oh, and don't "upgrade to a newer version", then you lose the free definition updates!) - and that problem went away.

    I haven't installed "ghostery" or "adblock" on Mozilla Firefox yet... Seeing how my "light" set-up works. He says that the "trick" is checking OFTEN for Windows (7) updates and installing them. Then running CCleaner.

    So far, so good...

    As for "hacker/phishing/tracking" protection, and "anonymity", no clue.
     
    searcher likes this.
  7. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    132,146
    Likes Received:
    38,248
    Trophy Points:
    113
    Threats of cyber warfare
    CaspianReport



    Published on Oct 28, 2017
    Support CaspianReport on Patreon:
    https://www.patreon.com/CaspianReport

    Follow Nathan on Twitter:
    https://twitter.com/NathanAB_

    WASHINGTON - Over the last decade, high profile cyber attacks have steadily increased among national governments such as the United States, China, Russia, Israel and even North Korea. As cyber warfare becomes the battlefield of choice for developed nations, governments are able to launch direct attacks against each other in secrecy and without the risk of causing physical harm. This trend has resulted in new global threats as digital technology becomes increasingly integrated into all aspects of life. In this report, we will examine the effectiveness, allure, and dangers of cyber warfare.

    Soundtrack:
    All This - Scoring Action by Kevin MacLeod is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/...)
    Source: http://incompetech.com/music/royalty-...
    Artist: http://incompetech.com/

    Follow CaspianReport on social media.
    Facebook: https://www.facebook.com/caspianreport
    Twitter: https://twitter.com/caspianreport
     

Share This Page