Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
  • Go

IT Expert Demonstrates Hackers’ Techniques

A seminar was held by the Institution of Internal Auditors Qatar Chapter on IT security and computer hacking under the title 'Watch the Hacker in Action'. Gulf-times published this news on April 16, 2007.

A hacker's behavior does not limit to software hacking alone. Some people apply hacker approach to other items like music or electronics. In fact it is there in any area of science or art. Software hackers are able to recognize such malicious attitude elsewhere too and call the involved persons 'hackers'. According to some, hackers' nature is even independent of its medium of work.

Hacking in true sense requires intense work. For such hackers, the distinction between play, work, science and art disappears and they all merge into creative playfulness. A lot of patience is required on part of the hacker to successfully hack websites, usernames, passwords, company reports, financial information and the online search engine.

Balwant Rathore, who is an Internet security professional in a U.K. based company called Open Information Systems Security Group (OISSG), demonstrated how searches through a search engine might disclose passwords and usernames, contact addresses, personal e-mails, details of credit card and secret company records.

Internet search engine is now an important tool for legitimate users as well as unethical hackers, Rathore said. Gulf-times published it on April 16, 2007.

Rathore described the latest tools and techniques that attackers developed over the past 24 months. He explained how hackers attack a server remotely, deface websites, and exploit software and databases. He also demonstrated the way an attacker enters a fully encrypted wireless LAN.

Rathore made a demonstration of an assault on an IT-infrastructure. He gave suggestions on how to assess vulnerability in IT and measures to help combat simple Internet threats. He said if IT professionals learnt the techniques of the bad guys they could keep a control on the misuse of the crown jewels that belong to them. Gulf-times published Balwant's views on April 16, 2007.

Assaad Kanaan, who's the chairman seminars, Robert Abboud, the chairman membership of IIA Qatar Chapter, Rajeswar Sundaresan, the secretary conducted the seminar. RasGas sponsored the event where 100 or more guests and members participated.

Related article: ID Theft Victims Will Double In Next Four Years

» SPAMfighter News - 23-04-2007

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next