Presented by Ondrej Krehel at the Secure Computing Forum in Dublin, Ireland.
Hacking is no longer performed by extremely skilled hackers in dark rooms with hoodies on. Now, anyone can be a hacker - all you need is a credit card. Yes, that's right! Plans start at 19.99 and can cause a major headache for businesses all over the world. The cybercrime market is learning from its legal counterpart and employs advanced marketing strategies, good customer service and technical support, and more.
Human race created in violent Big Bang as a remanence of stars
The First Book of Bible – Genesis
Where did we take it from here as burned stars material.
Any code is hackable
Humans invited code, 0 and 1 On Z2 algebra
At The Edge Of The Glory - The Bitter End
To brush dangerous …
https://assets.rbl.ms/4714449/980x.jpg
Idea: hacking at the edge of glory, never underestimate attacker.
We all have college education, feel smart
If you had to bet a $100 on someone to protect your private data, who would it be?
After collecting sufficient information to initiate an attack, they narrow down the point of entry of exploitation. Attackers also study about the security solution defenses and known attack signatures that the victim might possess. In most scenarios, attacker’s phish their target company’s employees into opening a malicious attachment or clicking a crafted URL in the hopes of delivering their payload by exploiting a zero-day vulnerability in a common browser or application such as Adobe, Java, or Microsoft Office. As discussed earlier, they can also exploit any zero-day vulnerabilities of the software used by the employees. For instance, attackers used Adobe ColdFusion’s vulnerabilities to break into the networks of LaCie, the computer hardware manufacturer.
When do you know when you are hacked?
http://i.dailymail.co.uk/i/pix/2012/07/25/article-0-03E0077D0000044D-729_634x395.jpg
http://www.dailymail.co.uk/news/article-2178781/Iran-nuclear-facilities-hit-cyber-attack-plays-AC-DCs-Thunderstruck-volume.html
Perhaps, Life is a breach – you cannot recover from a life, you need to live a healthy cyber life
Mingle with unsafe vendors proved to be as similar as unprotected teenage intimate encounters