Surveillance · Anti-Virus Password Breaches This is where


 This is a
major problem with computer security in today’s world. It is the ability to
turn on your phone’ microphone, laptop’s camera, smart TV’s microphone, etc.

One recent example was when the N.S.A. in
America was leaked to have the ability to do these things and do carry out
these things in the name of counter terrorism.

Another example of a government body obtaining
private information is when the F.B.I. asked apple for a back door to a phone.
This would have allowed the F.B.I. or any other organisation (including
scammers and hackers) to easily get into any iPhone. When Apple declined, the
F.B.I. said they hacked into it on their own. This calls into question if we
should trust these organisations.

This can be found in Ireland when the Gardaí
tapped phones of innocent members of the public they confused with criminals or
it was put on the wrong people.

To prevent some threats

strong passwords, the best password are long passwords.

passwords periodically

different passwords for different sites

extra security: use multi-factor authentication methods


The recent Ransomware




This is
where a password sever is breached and a hacker has the passwords. For these
hackers it is a race against time before the company goes public, adjust security.
Most password severs had protection methods.

are stored hashed. This is where the password is turned into a random string of
letters, with an algorithm, but they can’t be turned back into their original
form. This method is still easy to break. Hackers can try many commonly used
passwords, like qwerty and password123, until one matches the hash they have.
Computers can do this very fast by using rainbow tables, which are a load of
hashes and their matching passwords. The longer the password is the longer it
takes to break.

also salt their hashes. This means adding a random bunch of letters to the hash
at a certain point of it. This increases the time it takes to hack the

Quantum Computer’s will be able to hack into
encryptions with ease.


An example
would be the recent American breach with Equifax. This is a massive breach.
talking about a good portion of U.S. adults,” Hiep Dang, director of Product
Management at Cylance and former leader of McAfee’s threat team, told FOX Business.
“Conservatively, maybe 75% aggressively, probably all of us.”

They are a credit reporting agency, they keep tract of
everyone’ financial history. They keep tract of every loan, bill Americans pay,
Social Security and driver’s license numbers, credit card information, etc. All
of this info has been leaked. This allows the hackers nearly to be you, to open
bank accounts or even buy a house in your name. Equifax waited
six weeks before they announced this, which gave the hackers time to begin using
this data, without people knowing they have been hacked and checking their
accounts. The only good news is that there is so many people with their data
taken that the hackers can only use so much of the information.

Social Engineering

This is where a hacker/spammer trys to tricks you. This can
come in multiple forms.

One form is ads on pages to try to get you to
click onto their site. These can add cookies to your computer. Which can track
what you type, see what websites you visit, etc. Another is downloading malware
into your computer, which have even more access to your computer.

emails are another form of tricking you. They can be non-legitimate business
offers, which make you enter some bank details. Some are Trojans horses which you download a photo and
with it is malware.

Phishing is some action by the user to trigger a
malicious behaviour

Another way to trick someone is to set up a fake
WAP (wireless access point). They advertise a public Wi-Fi and data sniff
unprotected data from the data streams sent between the unwitting victims and
their intended remote hosts. Also they make you sign into the Wi-Fi to make you
give a password you usually use for other sites.