Hacker’s Guide To The Galaxy

 

A Hackers Guide To The Galaxy…. Available Now On Any Device!

According to the Boston Globe, hackers are getting extra confident, and have recently launched their biggest attack in digital history. The targets: a French internet provider named OVH and the other a prominent computer-security journalist.

Before zeroing in on the French internet company and how these hackers pulled off their well-accomplished feat, ask yourself a few questions. How many times do you save sensitive information on your phone? What kind of information, personal and work related, do you store on there? How much can someone learn about you by hacking your phone, tablet or … camera? That is exactly how these hackers got the overwhelming amount of information they needed to overload and crash the network servers of the French Hosting Provider, OVH.

According to the OVH website, “Innovation is Freedom.” Well, that freedom is only appealing if your server is not being overloaded with 600 to 700gb of data per second, which results in a complete website shut down.  According to Forbes.com, this type of network siege is called Distributed Denial of Service (DDoS). Service is denied when all of the website data, regardless of whether it is company data or excess data from hackers, must be backed up on the Security Systems host company servers. This causes the Security provider a huge expense because the data added by the hackers is non-billable to their client. The security provider will then deny service to their client causing sensitive information to be put at risk.

This is not the first that the World Wide Web community has experienced these DDoS attacks. In the winter of 2015, a similar group called “Lizard Squad” crashed the Xbox and PlayStation networks. It’s not the fact it’s happening that is shocking, it is how they are doing it that is nerve racking. Data from devices that are connected to an IP address, such as DVR’s, Game Consoles, digital video cameras, unsecured routers and digital cameras, is being copied or stolen without a trace—at least a trace that your everyday “tech savvy” person can find.  It is safe to say that no technology is safe from being hacked. That is why it is important to make sure you take every step to secure your personal networks. And, more importantly, your business networks.

Some takeaways for those of you that would prefer to live an innovative, free from hacker life, whether it be your business or home services, make sure that your ISP is taking action to prepare for an attack like this. Furthermore, you should verify that wherever and whomever you buy your electronics from allows you to have options for a safe and secure device. If you are running a business that does any dealings with distributing network connection, it is vital that your passwords are not as easy as “01234” or “admin.” You are practically asking to be hacked. Do your part. Secure any and all devices, and give these hackers a few more obstacles to cross before being able to strike again.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s