Electronic hacking: a silent perpetrator breaching our defenses unnoticed. These silent criminals are much more dangerous than they seem. It is one of the simplest, but at the same time most insidious types of crimes. This can be done via the Internet, electronic devices, and even personal home accounts can be hacked. There are numerous threats that hacking brings to our world today. Despite this scary fact, there are measures we can take to prevent it. Electronic hacking can be deadly in many ways, but there are ways to avoid being affected by it. For starters, one of the most common forms of hacking is done on a network that connects us all: the Internet. Across the Internet, social networks such as Facebook and Twitter have been hacked. In fact, the Syrian Electronic Army was able to hack the Facebook and Twitter accounts of the Cable News Network (CNN). (“Syrian Electronic Army Targets CNN”). Social networks, however, are not the only objectives related to the Internet. You and your privacy could be at risk too. Some random websites that seem harmless may actually be a hacker-infected website. You might think that a site that has a secure Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) connection is safe, but it could still be a dangerous site, since HTTPS at the start of a URL (Uniform Resource Locator) only reports that the owner paid for a security certificate ("Chrome bug allows sites to listen in."). This means it can still be hacked or hack you. Additionally, some sites that serve a legitimate purpose are sometimes actually designed to hack your computer. These websites work by exploiting privileges and errors in web browsers. One such incident is shown via Google Chrome. Google......middle of paper......anie. “Mass Hacker Attack Hits Nearly 2 Million Internet Accounts.” United States today. Gannett, December 5, 2014. Web. February 4, 2014. Goodin, Dan. “Speech Recognition Hacking Turns Google Chrome Into an Advanced Eavesdropping Device.” Ars Tecnica. Condé Nast, 2014. Web. 04 February 2014.Hacking tip: Cracking passwords with Cain and Abel. YouTube. YouTube, March 2, 2013. Web. February 11, 2014."iPhones can be hacked while charging." United States today. Gannett, November 12, 2013. Web. January 31, 2014. Perlroth, Nicole. "The year of hacking, by the numbers." Bit The Year of Hacking by the Numbers Comments. The New York Times Company, 2014. Web. 05 February 2014."Syria's Electronic Army of Hackers Targets CNN." The times of Israel. THE TIMES OF ISRAEL, January 24, 2014. Web. January 31, 2014. “Threat Matrix: Malware, Hacking Pose Dangers for Medical Devices.” Health IT News. Healthcare IT News, May 24, 2013. Web. Feb. 5. 2014.
tags