Hacking Rhetoric

1 Comment

I read this very interesting article about Adam Penenberg challanging hackers to hack him. Some ethical hackers accepted the challenge and performed a series of hacking. Firstly, they researched Adam to find out Adam’s personal information including his address, family members, emails, ect. Then they use found out Adam’s wireless network and camped around Adam’s house. They created a special device and attached it to Adam’s house to interact with Adam’s wireless network. Finally they drafted an email with an application inside that activate when the email is opened, and sent the emial to Adam’s wife. As a result they took control of her computer.

Fortunately, Adam didn’t lose anything from this experience. At the end the hackers provide some suggestions:

a) be careful about what you post online because

b) be caustious about email attachment and links because they may contain malware.

c) add security controls to mobile phone

 

Check out the original aritcle from the link below

http://pandodaily.com/2013/10/31/a-reporter-asked-us-to-hack-him-and-heres-how-we-did-it/

Advertisements

One thought on “

  1. Hey Shimu, cool blog post! You should definitely check out James Pinkerton’s blog posts, they are marvelous and motivational. When I read his beautiful prose I cry every time. Check his stuff out.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s