istanbul ankara evden eve nakliyat
sariyer evden eve nakliyat

Post a Comment Print Share on Facebook

reads.

Morten can hack most of the danes: Use cheap spare part as scary weapons

A gritty skræmbillede pops up on Morten Brok computer.

On a heavily pixelated image one can feel the mandsperson dressed in blue shirt and gray cap. He's looking into the computer, and it does not seem to affect him, that he is being filmed. Probably he knows it not at all.

Morten has just hacked his victim.


On a daily basis, he works at IT-the company is Progressive in Aarhus. For more than 15 years, he has worked with it security and recent years, the threat from hackers has exploded in connection with the fact that cybercrime has become a billion business.

According to a statement made by the international provider of antivirusløsninger, Bitdefender, earned cyber criminals alone in 2017 more than five billion dollars to infect computers with ransomewhere.

Here it takes the hackers a company or individuals ' computers hostage and encrypts the files on the system, so they are locked for the user. Only when a ransom is paid, they get the code to unlock the computer again.

In the past year was a victim in a minute attacked by hackers with ransomware, according to Bitdefenders data.

the Article continues under the picture...
In may 2017 was more than 57,000 computers in an instant hit of Wannacry-attack, where a hackergruppe locked the computers and demanded a ransom of more tusindekroner paid in Bitcoins to unlock the computers up again. Screenshot
Hacked in few seconds
Morten keys a command on his keyboard. With one being the picture on his computer screen razor sharp, and it becomes clear that it is Extra the Magazine's journalist, who stands in front of the computer at the other end.

In the few seconds our computer has been hacked, and Morten can now see everything we do on the computer. Not only in front of the webcam, but also what I write on the keyboard, and the files that are stored on the hard disk.

He can aflure our passwords, look for upcoming articles or pictures from the just ended christmas.

The only tools Morten Brok used is a droneantenne to about 250 crowns, a free computer program - called a python script - a computer with the operating system Linux, as well as a server somewhere out in cyberspace.

I just hacked your computer through your wireless keyboard. I have shot a back door into your computer and disabled your antivirus software from. I have used a modified droneantenne, so that it can communicate with wireless devices like your keyboard, explains Morten Brok.

- The here most can learn if they have a bit of technical skill, and bother to familiarize themselves with the software. Everything is accessible through simple searches on for example Youtube and Google.

Since the appointment of Morten Brok shows how easily he forced himself access to the Ekstra computer, it is clear that the vast majority would be vulnerable to just this type of hacker attacks.

On morten's computer screen pops button a hundred wireless keyboards, mouse, alarm systems and much more. They are all located within a few hundred metre radius of the droneantennen.

In principle, I could attack all the computers that are hooked up to these devices. It is computers that are located all around the businesses housed in the building we are in now, he says.


According to Morten Brok is the vast majority of wireless keyboards sensitive to the type of attack he just performed at Ekstra equipment.

Among other popular models from Logitech, Microsoft and HP, there are thousands of Danish homes and businesses.

Since the hacker attack called 'mousejack' the first time was publicly known in 2016, promised the producers that they would update their equipment, so they were no longer vulnerable to hackertypen.

But the Logitech keyboard Extra Leaf use, is still vulnerable and hundreds of other devices in the office building in the outskirts of Aarhus, where we meet Morten Brok.

- I could put myself outside the Christiansborg palace, in front of Danske Bank's headquarters or an ex-girlfriend apartment with a directional antenna, and see if they were in vulnerable wireless devices, I could hack. This is very serious.

- The only way you can effectively protect yourself against this type of attack is to buy an 'old-fashioned' mouse and keyboard with wire.

How to you ensure yourself against the attacker

Hackers and malicious programs exploit security vulnerabilities in the apps, programs and operating systems. Vulnerabilities be closed on a continuous basis by the providers in connection with updates. Therefore, it is important to update them as soon as possible. In particular, web browsers such as. Chrome, Internet Explorer and Fire Fox is sensitive.

You can't be sure that an email comes from that sender. Links in emails may direct you to other locations, than it immediately shows. Therefore, please be cautious about clicking on links or follow the instructions in the e-mails you get sent unsolicited. You also should not open attachments in emails you are sent unsolicited.

Use long, complex and unpredictable passwords with both uppercase and lowercase letters as well as numbers. Use different passwords on different devices and services. The places where you have the option of two-step access control, you should use this. A password should be at least eight characters long.

Scammers may copy the look from the well-known web sites to try to, in general, you your information. Double check therefore the url before you enter sensitive personal information on svindelsiden ‘skat-dk.com’ that to perfection resembles its its official website tax.dk.

Look for ‘https’ before you fill in the forms with credit card information or sensitive personal information. The small ‘s’ in the browser ensures that no one outside can see the information you enter.

only Use secured WIFI-network. Do not Log on to the network without the code, since they can easily be misused to monitor you, collect your information about you or infect your devices with viruses.

Take backups of the things, you will not lose. Take advantage of offline resources as external hard drives or digital solutions from credible suppliers such as ‘Dropbox’ or ‘Google’. Thus, you ensure yourself from your stuff from becoming the victims of ‘ransomeware’ that takes your files hostage until you paid a ransom to the attackers.

Sources: the Council For Digital Security

read more Close
the Danes are ashamed
despite the fact that the cyber-criminals in 2017-earned billions to kidnap the computers and servers around the world, most crimes reported to the police at home.

In 2016, the police received 298 reviews of 'unauthorised access to computer information', while the figure for the first three quarters of 2017 is located at 232. It informs the national Police to Ekstra Bladet.

The low number of reviews may, according to the police commissioner at the National Cyber Crime Centre(NC3), Sonny Olesen, due to the fact that many do not report that they have been hacked.

- There are a number of different reasons that our numbers do not reflect the number of persons who are exposed to hacking out in reality. There is probably a large mørketal from people who do not know they have been hacked, while others are embarrassed or believe it is too small a thing to go to the police with, " explains Sonny Olesen and adds to the NC3 are seeing an increase in cyberkriminaliteten.

- If you are not a technical expert, it is difficult for the general it user to detect that his or her electronic devices has been abused to hunt down and extort a company or that video from your security cameras are directly sent out on obscure websites.

Avatar
Your Name
Post a Comment
Characters Left:
Your comment has been forwarded to the administrator for approval.×
Warning! Will constitute a criminal offense, illegal, threatening, offensive, insulting and swearing, derogatory, defamatory, vulgar, pornographic, indecent, personality rights, damaging or similar nature in the nature of all kinds of financial content, legal, criminal and administrative responsibility for the content of the sender member / members are belong.