Personal tools

Hacking

Harvard (Charles River) IMG 7698
(Harvard University - Harvard Taiwan Student Association)

 

- Overview

Hacking is the act of breaking into a computer system, device, or network to access information or data. It can involve identifying and exploiting weaknesses in a system or network to gain unauthorized access to data. Hackers can use their technical knowledge and clever tactics to access information without the user's consent.  

Hacking is not always a malicious act, but it has a strong association with cybercrime and illegal activity. Hackers can steal, change, or destroy information, and often install dangerous malware without the user's knowledge. Hackers can also access money and personal information, which can lead to identity theft or identity fraud. 

Hackers can get into a computer by using malware and other viruses. Scammers may send fake texts or emails with links that contain malware. If the user clicks on the link, their device will be infected with a virus.
 
In the US, hacking a protected computer is a federal crime. The federal government can bring charges against hackers, which may result in a felony or misdemeanor.

More than 80% of confirmed breaches involve hacking, through brute force or the use of lost or stolen credentials. The major attack vector is through web applications, which is on the rise in part due to the increasing popularity of cloud applications. Vulnerability exploitation, backdoors, and command and control functionality are also major hacking techniques.

Amid COVID-19, hackers are presented opportunity on multiple fronts. They play on people’s concerns about the virus by presenting phishing schemes or malware disguised in fake Centers for Disease Control and Prevention (CDC) alerts that talk about the latest vaccine or treatment developments. 

Hackers quickly used the pandemic and related anxiety to lure people into phishing schemes and malware attacks. There is also pressure on healthcare companies and researchers to safeguard their vaccine and treatment data. 

Meanwhile, millions of workers have turned their homes into their new, remote office, including state government employees, which brought a host of risks through use of unsecured Wi-Fi and poor access controls. This shift toward home as well as the underlying panic brought on by COVID-19 altered hackers’ focus and targets aimed at the remote worker.

 

[More to come ...]

 

 

Document Actions