• 2) Equifax cyber attack
  • 3) Ransomware attack
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet191/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   187   188   189   190   191   192   193   194   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    1) Yahoo hacking target 
    Yahoo is a good pioneer technological company that deals with search
    engines and services like mail and news. However, whatever the reason
    maybe it has been a victim to one of the largest cyberattacks that have ever
    been. 
    In three years, yahoo user accounts have been compromised for more than
    three times and millions of accounts were just available in the dark market
    for sale. 
    This is the single reason why the company has put on sale and was bought
    for less than what it deserves. Seems like hackers have taken advantage of a
    broken hash file structure that is present is the yahoo databases.
    2) Equifax cyber attack
    Equifax is a credit card issuing company and has suffered a major breach
    where hundreds of thousands of credit card numbers have been stolen. The
    hacker has tried to sell these credit cards in dark web markets and the
    company didn't state unless the vulnerability that is responsible for the
    breach has been fixed.
    3) Ransomware attack
    Just a couple of years back ransomware virus has infected a lot of
    businesses in the European Union. This virus has used an existing
    vulnerability that has been patched by the windows way before the attack.
    But for varied reasons, many businesses didn't update their systems and got
    locked out to the ransomware system virus which threats that the data will
    be deleted unless money is paid within a set of timeframes. This is the
    reason why system administrators should keep updated with the system and
    should get ready to follow journals for pointing out existing vulnerabilities. 


    Apart from these China, Russia, and America usually has a lot of
    cyberattacks going on every second for various reasons. Cybersecurity
    space has become crowded and a lot of individuals, businesses, corporates,
    and governments are trying to get control over them. It is obvious one
    should be aware of the misjudging or threats of hacking and should try to
    learn and follow cybersecurity ethics. That is all about this chapter. In the
    next chapter, we will discuss hiding the attacker's location and information
    using TOR and VPN. Let us go!

    Download 6,34 Mb.
    1   ...   187   188   189   190   191   192   193   194   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish