Hi folks
Everyone knows that china hackers are playing in big officials documents and now they attacked india's IT dept systems too...Already they attacked google and as a encounter google blocked lots of facilities for china in search engine.....
A data security firm has unveiled the ten most commonly used passwords on the web.
1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123
and also its my kind advice is not to use your name,age,ph no,mobile no
because its very easy to hack for ex: if ur passowrd is name "vinoth" totally 6!=720 so i can find 720 possibilities of my name so that any one hack by writing program for it.......
This blog lists all the latest trends of "Information Technology" "websites to download free softwares" "some of the programming languages documentations" "Linux" "ubuntu" "Windows" "Mozilla firefox addons" and updates of me
Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts
Friday, January 22, 2010
Tuesday, January 5, 2010
Cyber Threats In 2010
"It really speaks to a Web 2.0 world. People communicate differently today, people transact and pay their bills differently today, and that drives today's criminals," ABC Science quoted David Marcus, director of security research and communications for McAfee Labs, which this week released its 2010 Threat Predictions report, as saying.
According to McAfee, Facebook, Twitter and other social networking sites-will become major targets for cyber criminals.
Symantec said in its recent report on 2010 threats, URL shortening services will "become the phisher's best friend."
Some criminals have already learned how to bypass the banks' second layer of protection.
Resource
http://in.yearinreview.yahoo.com/2009/blog/19
According to McAfee, Facebook, Twitter and other social networking sites-will become major targets for cyber criminals.
Symantec said in its recent report on 2010 threats, URL shortening services will "become the phisher's best friend."
Some criminals have already learned how to bypass the banks' second layer of protection.
Resource
http://in.yearinreview.yahoo.com/2009/blog/19
Subscribe to:
Posts (Atom)