Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Kaspersky
Sophisticated hacker bypasses powerful antivirus, how?
Message
<blockquote data-quote="i7ii" data-source="post: 1117611" data-attributes="member: 116614"><p>Already covered that part (in my previous post). But there's also projects like: <a href="https://www.qubes-os.org/" target="_blank">Qubes OS: A reasonably secure operating system</a> - where one could play the cyber security game at a different level. Feasible, but not "comfortable enough" - to be used even by people who are aware of its cyber security potential (even tho, all it takes is practice - after all - humans are creatures of habit: same way they learned to be lazy - "by practice" - they can also learn to be more active - "by practice"). Same can't be said about most "home users (who aim/yearn only for comfort - and highest level of ignorance - where stuff just works with minimum effort and preferably no understanding whatsoever - how it works and what it involves). And that's why it's so "fashionable" to play pretend - in more ways than one (there's more to I.T. ignorance - than cyber security, i mean... "Apple" - this word alone says more than enough).</p><p></p><p></p><p>Darkweeb is a place of taboos and insanity, but c'mon - a lot of that stuff ends-up on the public side of the internet. Maybe 4chan is controversial enough to be deemed "darkWeeb-like" but it's a public domain. Even tho, many Black Hat hatters - were smart enough to find their way around a multitude of systems and their vulnerabilities - they're still human - still acting from a place of pride and rather stupid about it too... since their hacked/breached content - ends up all over the internet and quite easy to be found - even with the most popular public search engine (Google). Such was the case with the infamous iCloud leak known as " The fappening (or Celebgate)". </p><p></p><p>And here's some of the qulity please:</p><p></p><p><em>"In March 2016, 36-year-old Ryan Collins of Lancaster, Pennsylvania, agreed to plead guilty to one count of unauthorized access to a protected computer to obtain information resulting in an 18-month sentence. While no victims were named in the court documents, numerous media outlets connected Collins' case to the breach. During the investigation, it was found that Collins phished by sending e-mails to the victims that looked like they had been sent by Apple or Google, warning the victims that their accounts might be compromised and asking for their account details. The victims would enter their passwords, and Collins gained access to their accounts, downloading e-mails and iCloud backups.[69] In October 2016, Collins was sentenced to 18 months in prison.</em></p><p><em></em></p><p><em>In August 2016, 28-year-old Edward Majerczyk of Chicago, agreed to plead guilty to a similar phishing scheme, although authorities believe he worked independently and he was not accused of selling the images or posting them online. On January 24, 2017, Majerczyk was sentenced to nine months in prison and was ordered to pay $5,700 in restitution to cover the counseling services of one unnamed celebrity victim.</em></p><p><em></em></p><p><em>Emilio Herrera, also from Chicago, had first been named in the press in 2014;he pleaded guilty to one count of unauthorized access to a protected computer to obtain information in October 2017. Herrera had accessed the accounts of unnamed celebrities and others but was not accused of being involved in leaking or sharing the photos and videos he obtained. He was sentenced to 16 months in jail in March 2018.</em></p><p><em></em></p><p><em>In April 2018, 26-year-old George Garofano of North Branford, Connecticut, pleaded guilty to one count of unauthorized access to a protected computer to obtain information. Garofano's attorney said he had been led into the phishing scheme by criminals. On August 29, 2018, a federal court sentenced Garofano to eight months in prison.</em></p><p><em></em></p><p><em>On October 22, 2018, Christopher Brannan, a former Virginia teacher, became the fifth man to be convicted in relation to the hacking. Brannan pled guilty to federal charges of aggravated identity theft and unauthorized access to a protected computer. Through a phishing expedition[further explanation needed], he hacked more than 200 people. In addition to his celebrity victims, Brannan targeted his underage sister-in-law, as well as teachers and students at the school where he used to teach. Brannan was sentenced to 34 months in prison on March 1, 2019."</em></p><p></p><p>But those are just random black hat hackers, which brings me to the next point...</p><p></p><p></p><p></p><p>You couldn't be further from the truth/reality (objective - that is). 10 years ago cyber criminality - was barely laying its foundation (did impact a lot of people even them - but the ones involved were rather messy at it - mostly annoying for a lack of better words). While now it's a highly developed and globally expanded industry. There's quite literally people - who get in the morning at 5, and "work (as an actually job - where they get paid based on performance)" 10 to12 hours a day (if not more) - scamming people. Even more than that, this are not people - who found their passion for computers and have more than a decade of studies and practice in the I.T. field. Not at all, rather average it - they were simply trained to use some tools developed for breaching vulnerable systems (as it's the case with the majority - of home computers).</p><p></p><p>Side note: You are aware, that most OEMs drop support for security updates - on quite a lot of I.T. systems and gadgets - which barely got out of warranty (2 or 3 years since release)? So, you're not even getting a basic level of security - which can bypass so many 3rd party cyber security solutions. Such is the case with Intel's Management Engine. Whom, made public most of the currently known vulnerabilities: <a href="https://www.intel.com/content/www/us/en/download/19392/28632/intel-converged-security-and-management-engine-version-detection-tool-intel-csmevdt.html?" target="_blank">Intel® Converged Security and Management Engine Version Detection Tool (Intel® CSMEVDT)</a> And yet, with OEMs - if their products was not released in last 3 years or so - there's quite a high probability for that given product to lack a patched firmware - covering the current known vulnerabilities. Same goes for most mobile devices.</p><p></p><p>Anyway, 10 years ago - took a bit more skill, and a bit more work to be targeted and hacked. While this days - whit the cyber criminals industry expanding 100 folds (or maybe 1000 fold) - and whit direct hacking became so accessible (to actual amateurs) - hacking home users has never been easier (happens quite often - so hey, you'll get your turn). All it takes this days is a phone call (no annoying malware and its pop-up warnings and such) - all you have to do is answer a phone call and your device is breached. And that, by a freaking amateur - who was trained to use an app similar to an office user trained to use Excel. But hey, believe what you want - tho, i can also agree - that it's not worth worrying - even if it can happen (quite similar to any real life criminal who could hurt you in some way - even tho, it's simpler in the virtual world).</p><p></p><p>Just my 2 cents.</p></blockquote><p></p>
[QUOTE="i7ii, post: 1117611, member: 116614"] Already covered that part (in my previous post). But there's also projects like: [URL="https://www.qubes-os.org/"]Qubes OS: A reasonably secure operating system[/URL] - where one could play the cyber security game at a different level. Feasible, but not "comfortable enough" - to be used even by people who are aware of its cyber security potential (even tho, all it takes is practice - after all - humans are creatures of habit: same way they learned to be lazy - "by practice" - they can also learn to be more active - "by practice"). Same can't be said about most "home users (who aim/yearn only for comfort - and highest level of ignorance - where stuff just works with minimum effort and preferably no understanding whatsoever - how it works and what it involves). And that's why it's so "fashionable" to play pretend - in more ways than one (there's more to I.T. ignorance - than cyber security, i mean... "Apple" - this word alone says more than enough). Darkweeb is a place of taboos and insanity, but c'mon - a lot of that stuff ends-up on the public side of the internet. Maybe 4chan is controversial enough to be deemed "darkWeeb-like" but it's a public domain. Even tho, many Black Hat hatters - were smart enough to find their way around a multitude of systems and their vulnerabilities - they're still human - still acting from a place of pride and rather stupid about it too... since their hacked/breached content - ends up all over the internet and quite easy to be found - even with the most popular public search engine (Google). Such was the case with the infamous iCloud leak known as " The fappening (or Celebgate)". And here's some of the qulity please: [I]"In March 2016, 36-year-old Ryan Collins of Lancaster, Pennsylvania, agreed to plead guilty to one count of unauthorized access to a protected computer to obtain information resulting in an 18-month sentence. While no victims were named in the court documents, numerous media outlets connected Collins' case to the breach. During the investigation, it was found that Collins phished by sending e-mails to the victims that looked like they had been sent by Apple or Google, warning the victims that their accounts might be compromised and asking for their account details. The victims would enter their passwords, and Collins gained access to their accounts, downloading e-mails and iCloud backups.[69] In October 2016, Collins was sentenced to 18 months in prison. In August 2016, 28-year-old Edward Majerczyk of Chicago, agreed to plead guilty to a similar phishing scheme, although authorities believe he worked independently and he was not accused of selling the images or posting them online. On January 24, 2017, Majerczyk was sentenced to nine months in prison and was ordered to pay $5,700 in restitution to cover the counseling services of one unnamed celebrity victim. Emilio Herrera, also from Chicago, had first been named in the press in 2014;he pleaded guilty to one count of unauthorized access to a protected computer to obtain information in October 2017. Herrera had accessed the accounts of unnamed celebrities and others but was not accused of being involved in leaking or sharing the photos and videos he obtained. He was sentenced to 16 months in jail in March 2018. In April 2018, 26-year-old George Garofano of North Branford, Connecticut, pleaded guilty to one count of unauthorized access to a protected computer to obtain information. Garofano's attorney said he had been led into the phishing scheme by criminals. On August 29, 2018, a federal court sentenced Garofano to eight months in prison. On October 22, 2018, Christopher Brannan, a former Virginia teacher, became the fifth man to be convicted in relation to the hacking. Brannan pled guilty to federal charges of aggravated identity theft and unauthorized access to a protected computer. Through a phishing expedition[further explanation needed], he hacked more than 200 people. In addition to his celebrity victims, Brannan targeted his underage sister-in-law, as well as teachers and students at the school where he used to teach. Brannan was sentenced to 34 months in prison on March 1, 2019."[/I] But those are just random black hat hackers, which brings me to the next point... You couldn't be further from the truth/reality (objective - that is). 10 years ago cyber criminality - was barely laying its foundation (did impact a lot of people even them - but the ones involved were rather messy at it - mostly annoying for a lack of better words). While now it's a highly developed and globally expanded industry. There's quite literally people - who get in the morning at 5, and "work (as an actually job - where they get paid based on performance)" 10 to12 hours a day (if not more) - scamming people. Even more than that, this are not people - who found their passion for computers and have more than a decade of studies and practice in the I.T. field. Not at all, rather average it - they were simply trained to use some tools developed for breaching vulnerable systems (as it's the case with the majority - of home computers). Side note: You are aware, that most OEMs drop support for security updates - on quite a lot of I.T. systems and gadgets - which barely got out of warranty (2 or 3 years since release)? So, you're not even getting a basic level of security - which can bypass so many 3rd party cyber security solutions. Such is the case with Intel's Management Engine. Whom, made public most of the currently known vulnerabilities: [URL="https://www.intel.com/content/www/us/en/download/19392/28632/intel-converged-security-and-management-engine-version-detection-tool-intel-csmevdt.html?"]Intel® Converged Security and Management Engine Version Detection Tool (Intel® CSMEVDT)[/URL] And yet, with OEMs - if their products was not released in last 3 years or so - there's quite a high probability for that given product to lack a patched firmware - covering the current known vulnerabilities. Same goes for most mobile devices. Anyway, 10 years ago - took a bit more skill, and a bit more work to be targeted and hacked. While this days - whit the cyber criminals industry expanding 100 folds (or maybe 1000 fold) - and whit direct hacking became so accessible (to actual amateurs) - hacking home users has never been easier (happens quite often - so hey, you'll get your turn). All it takes this days is a phone call (no annoying malware and its pop-up warnings and such) - all you have to do is answer a phone call and your device is breached. And that, by a freaking amateur - who was trained to use an app similar to an office user trained to use Excel. But hey, believe what you want - tho, i can also agree - that it's not worth worrying - even if it can happen (quite similar to any real life criminal who could hurt you in some way - even tho, it's simpler in the virtual world). Just my 2 cents. [/QUOTE]
Insert quotes…
Verification
Post reply
Top