Cyber Terrosrism

Cyber-terrorism, it is illegal activities that use computer as a tool to steal individuals or organizations secret such as theft of confidential information of companies, money laundering, distortion of information, racketeering, decoding software, including sorties to the computer system as computer viruses, destruction and so on.

Cyber Bullying

The positive aspects of technological progress have brought prosperity and comfort to our lives. Obviously  there is other side of technology called Cyber-bullying or  violence in cyberspace has returned to a bitter and wound in  heart to people who have been suffered with it.
Violence is the beginning of the wound. Bullying between children, we have know since a long time ago, and it's still exist in today's society. Bullying is physical harm to a person like a bigger brother bullies his little sister. The physical fight between the children is visible for us to judge who is the first move of bullying and who is the victim?
Today's technology is getting spread and scatter to even a small child. It has become a part of our lives, and a misuse that called Cyber-Bullying (Being bullied through cyberspace) is initially. Anyone can initiate this kind of violence even little children.
Cyber-bullying is bullying through cyberspace between children by different forms including slur, wording that malign others, slander, forward to others any confidential information via the Internet, or even a mobile phone. It causes the victim feeling pain and affect their psychological mind.
This kind of violence, it is impossible to know who is the culprit. This can be devastating to anyone anywhere at anytime. The offender is able continued to emphasize the violence. The victim, who has been bullied, some day may come back as an act of violence to avenge against the initiator. This wicked cycle has no end with the realization that anyone is committing it




Make your flash player updated

Updating flash player is important because it prevents from hacking. Manufacturers of security software alert to computer users quickly update the new version of Adobe Flash Player to protect from the damage caused  by identities theft or another vulnerabilities. After Adobe issued emergency patch 4 times since earlier year 2013, has found the vulnerabilities of the Flash Player that the theft uses to attack computer system by convincing the user to click a link that links to a website that includes malicious contents to computers.

Cyber Terrorism



Julian Assange answers a student's question about what he thinks of the term 'Cyber Terrorism'and the work of  sites such as 'Anonymous'.About Julian Assange: known worldwide as the founder and public face of WikiLeaks. Julian Assange has made headlines across the world by exposing government misconduct. He has championed the principle of freedom of information, yet some have criticized his activities as reckless and dangerous. Under Assange's leadership, WikiLeaks has published innumerable classified diplomatic cables and played a crucial role in shaping the international political landscape. He has currently as a fugitive in the Education Embassy i London.

The world's Most Famous Hackers

Famous Hackers in the world

1) Vladimir Levin
2) Johan Helsinguis
3) Kevin Mtinick
4) Dennis Ritchie Ken Thompson



Who are cyber criminals ?

~ Cyber Criminals ~
1. Kids: age around 9-16 etc. Most amateur hackers and cyber criminals are teenagers. They attribute into a pride to have hacked into a computer system or a website. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.
2. Organized hacktivists: they are hackers with a particular motive.
3. Disgruntled employees: we cannot reach to people's mind or what they are thinking inside. Similarly, it's hardly believe how spiteful displeased employees can become. In the old fashion way they can go for strike against their organization. Now, since the increase independence on computers, it is easier for disgruntled employees to do more harm to their bosses by doing some unpleasant activities against their employer that lead its system error.
4. Professional hackers: they are mostly employed by organizations to monitor or hack information of rival industry that could be beneficial to them. 

Why computers vulnerable ?

Computers are extremely vulnerable. It's not very tough for hackers to steal national secrets from military computers. Here are examine the reasons for the vulnerability of computers.
1. Computers store large amount of data in tiny space: Let see a CD ROM, it can store an emormouse information.
2. Computer is accessible:  as we have heard nowadays the strongest of firewall authentication systems still  have been cracked.
3. Computer is complex: the complexity of computers allow hackers exploiting and gain what they want. There are always weaknesses or flaws for the criminal to breach the system. Even the weaknesses have been patched up, but the hackers will then find another flaw to exploit and the cycle goes on and on. So designing a great security operating system is very crucial.
4. Human error: people leave careless specifying their password for a system, their use a guessable password.
reference: http://www.bezaspeaks.com/cybercrime/whyit.htm




History of Cyber Crime

The era of modern computer  was begun with the analytical engine of Charles Babbage. In 1820, a textile manufacturer in France,  Joseph-Marie Jacquard  produced loom which is the same that cyber crime was first recorded. The engine allowed the repetition of a series of steps in the weaving of specials fabrics. Jaquard's employee found it in a fear because with the machine they are likely not to be hire, the device will do all the task. So they committed acts of sabotage to stop the using of the device. This is the first recorded cyber crime. 
referenc: http://www.bezaspeaks.com/cybercrime/history.htm