1. Same story, different day...........year ie more of the same fiat floods the world
    Dismiss Notice
  2. There are no markets
    Dismiss Notice
  3. Week of 6/24/2017 Closing prices & Chg Over Last Wk---- Gold $1256.40 Silver $16.64 Oil $43.01 USD $96.94
  4. "Spreading the ideas of freedom loving people on matters regarding high finance, politics, constructionist Constitution, and mental masturbation of all types"
    Dismiss Notice

Three Steps Outlining How Hackers Access Your Personal Information

Discussion in 'Computers' started by searcher, Aug 30, 2016.



  1. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    124,781
    Likes Received:
    36,918
    Trophy Points:
    113
    Notorious former hacker reveals how criminals can steal your details in just THREE easy steps when you connect to public Wi-Fi
    • Video shows how exposed your personal details are to cyber criminals
    • Tools so accessible school students can download systems and hack
    • Jetstar and Suzuki listed as being suspected of a major cyber breach
    • Hackers monitored Australian satellite company Newsat for two years
    • Australian government, defence department and other networks hacked


    Read more: http://www.dailymail.co.uk/news/article-3764353/Notorious-former-hacker-Kevin-Mitnick-reveals-criminals-steal-details-just-THREE-easy-steps-connect-public-Wi-Fi.html#ixzz4IoDITN7d
    Follow us: @MailOnline on Twitter | DailyMail on Facebook
     
  2. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    124,781
    Likes Received:
    36,918
    Trophy Points:
    113
    Pro Hacker Tells Scary Truth CYBER SECURITY & Online Privacy
    John Lovell



    Published on Jun 1, 2017
    John Lovell interviews professional hacker on cyber security, privacy on the internet, cyber terrorism, penetration testing, information / data security, confidentiality, phishing, the dark / deep web, and hacking in Hollywood movies such as James Bond Skyfall, Hackers, Swordfish, the Net, Mr. Robot, and other movies.
     
  3. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    124,781
    Likes Received:
    36,918
    Trophy Points:
    113
    How Navy SEALs create a Bomb Proof Password | Tactical Rifleman
    Tactical Rifleman



    Published on Aug 4, 2017
    Here at Tactical Rifleman we have some great content on weapons and tactics. But today Jason Phalin, a former Navy SEAL and co-founder of Arion Risk LLC, is going to share a critical electronic security measure that the military uses to protect themselves electronically while at home and overseas. In this episode we take a look at password generation, a common weak spot in computer security. He takes us through an efficient method to generate a great password that is as easy to generate on a laptop as it is on a smart phone or tablet and can be easily taught to friends and family. Cyber security is a growing security concern for society and the need to protect ourselves digitally is equally important as our physical security. Happy Hunting!



    For more go to http://www.tacticalrifleman.com/ and Follow us on Facebook: https://www.facebook.com/TacticalRifl... and Twitter-http://bit.ly/TACrman
     
    the_shootist likes this.
  4. searcher

    searcher Mother Lode Found Site Supporter ++ Mother Lode

    Joined:
    Mar 31, 2010
    Messages:
    124,781
    Likes Received:
    36,918
    Trophy Points:
    113
    The man who came up with the safe password rules admits he was WRONG and his guidelines about using numbers, symbols and capital letters have made computers easier to hack!
    • Bill Burr's 'bible' on password security was written in 2003
    • His guidance was use numbers, non-alphabetic symbols and capital letters
    • Long passwords with just letters are stronger than short ones with characters
    • When people change their passwords they do predictable things like add a 1
    • These are called 'transformations' and hackers build them into their scripts


    Read more: http://www.dailymail.co.uk/sciencetech/article-4771194/The-man-responsible-passwords-says-advice-WRONG.html#ixzz4pAvqypFw
    Follow us: @MailOnline on Twitter | DailyMail on Facebook
     

Share This Page