Web Hosting Security

  Home arrow Web Hosting Security arrow Page 2 - Online Security Issues: Cracking Down ...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

Online Security Issues: Cracking Down on Hackers
By: Joe Eitel
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2
    2010-01-20

    Table of Contents:
  • Online Security Issues: Cracking Down on Hackers
  • Hackers and Phishers
  • Staying Safe Online
  • Universities Team up with Northrop to Fight Hackers

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Online Security Issues: Cracking Down on Hackers - Hackers and Phishers


    (Page 2 of 4 )

    A hacker is defined as a person who gains access to a computer system by circumventing its security. A “phisher” is someone who participates in the illegal act of trying to or succeeding at acquiring personal online information, like passwords, usernames, and credit card information. This information is usually obtained when the phisher masquerades as a legitimate source using e-mail.

    For example, a phisher may send someone an e-mail that looks exactly like the type of e-mails they receive from their bank or PayPal. Though these e-mails look legitimate, they’re not, and when users click on the links located in the body of the text and sign on to what they believe to be their account, their personal information is actually being stolen. Social networking sites, auction sites such as eBay, online payment processors such as PayPal, and IT administrators are common targets for phishers.

    On December 22nd, quite a few U.S.-based businesses were hit by hackers because of an attack on one of the most popular open-source advertising companies on the Internet: OpenX . According to reports, hackers took advantage of a flaw in the OpenX software by placing damaging and malicious code in advertisements that appeared on several very popular websites. Apparently there is a pair of bugs in OpenX’s advertising software which made it possible for the hackers to log in to advertising servers and place the harmful code on commonly-used ads.

    One of the websites affected by the code belonged to King Features, a very popular comic book distributor. According to a statement released by the company, the malicious code placed in their advertisements used a “new, unpatched Adobe attack.” When these types of attacks happen, they’re not just unfortunate for the business being affected; they can be especially harmful to consumers. Anyone who visits a site that has been tampered with is in danger of having malicious software placed on their computer as well. When hackers attack, the consequences are far-reaching.

    PC World security experts have reported that “web-based attacks are a favorite way for cyber-criminals to install their malicious software,” and this latest round of hacks illustrates just “how ad server networks can become useful conduits for an attack.”

    Even more distressing for consumers are recent phishing scams that are successfully scamming login information from web masters. Just this month, scam e-mail artists launched a huge campaign that involved tricking web masters into giving them the information needed to administer their websites. As a result, site owners at over 90 online hosting providers were attacked, and the phishers were able to build a huge network of websites they could use for no other purpose than to distribute malicious software.

    Consumers cannot live in fear of their personal information being stolen, and they especially can’t worry about having their computer attacked every time they log on to their favorite seemingly-safe websites. If, however, you are genuinely concerned about these things, there are things you can do to protect yourself.

    More Web Hosting Security Articles
    More By Joe Eitel

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap