IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Hacker Gets $50K from Sandwich Treasury

28 November 2008 By Saran

Hackers in the modern day can really be a problem. But if you talk about money being involved (which is usually the case) breaching a supposedly secure IT infrastructure is bound to get a lot of attention.

It is in these cases where you have to wonder, do you credit the intelligence of these people or curse them for being able to breach such confidential systems. The $50,000 dollars that they got was no joke and these days, that money can go a long way. A recourse stemming from the hard times perhaps?

Police said a hacker, possibly with international connections, succeeded in planting a keystroke logger onto the computer of Sandwich, Mass., Treasurer Craig Mayen, and was able to watch while he entered his security password, The Boston Globe reported Wednesday.

You have to hand it to these people. In times where money is hard to come by, hitting a town treasury is certainly an accomplishment for them. However, it also means that you are liable for crime and lawsuits especially if you get caught. At the moment, the only lead to it all is a Florida man who said he was wired money to open the accounts reportedly from Russia. A Russian hacker? It can make sense.

Source

Filed Under: Network Security, News, Real-World Issues Tagged With: hacker, russia, sandwich, treasury

Better Security by Thinking as a Hacker

23 October 2007 By Saran

The best way to find out the security breaches is to think like a hacker on how to penetrate a secure network through various means. Accessibility to servers may have to go through different stages since various encrypted usernames and passwords would stand in the way of a successful hack.

Network Hacker

The approach is quite simple. It is a reverse psychology of sorts since to become a full-proof secure system, ways on how to be able to get over the fences for such walls that have been put off must be severely tested.

Unorthodox as it may seem, the various approaches to be done will certainly be simple at this point because at the rate that hackers are able to go around security fences today, a lot of progress has been made in being able to make the lives of administrators a living hell as far as IT security is concerned.

[tags]hacker, network security, breach, coding, cracks, cryptography[/tags]

Filed Under: Cryptography, IT Security Basics, Network Security, Operating Systems, Privacy & Anonymity, Programming, Real-World Issues, Security Policies, Spyware Tagged With: breach, coding, cracks, Cryptography, hacker, Network Security, security

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security