2020-02-18 21:52:52 | 511990The 7 Biggest Lies You've Been Told About HackingThis story was originally published at the Daily Dot. Online security is increasingly an issue rich for headlines as everyone from movie studios and celebrities to major retailers and CENTCOM find themselves the victims of digital infiltrators. However, hacking is also a very technical issue and, like many technical issues, one the media often gets wrong. So as a citizen of th
e 21st century, its increasingly important to arm yourself with some basic facts about hacking,
cybersecurity, and the real threats they pose, as well as those they dont. With that in mind, here are seven common misconceptions you might have about hacking. 1) Taking down a site is akin to hacking that site One of the most common headline-grabbing moves by s
o-called hackers is to take down their site through a DDoS attack. A group calling itself Lizard Squad has been using this method to take down the networks of Playstation and Xbox Live. Its a common method of protest by the hacker collective Anonymous, which has used it against such varied entities as the Westboro Baptist Church and, most recently, French jihadists. Related Stories
Tech Should You Reconsider Using WhatsApp After the Jeff Bezos Hack? Probably Not
Tech The NSA Could've Used This Major Windows Security Flaw for Intel Work. Instead, It Told Microsoft About it
These are not hacks, however, in the traditional sense of the term. A hacker is defined by the National Initiative for Cybersecurity as an unauthorized user who attempts to or gains access to an information system. Taking down a website or even a server does not take so much effort and
certainly doesnt demand infiltrating the host of the target. All you need is a simple distributed denial of service, or DDoS. A DDoS is a network of computers all sending data packets towards one server with the goal of overloading said server. Far from many individuals sending data from their computers, however, the most common form of DDoS consists of networks of computerstypically hacked for this purpose without their owners knowingall being used to flood a particular target. Read the rest of the s
tory at the Daily Dot.
Contact us at firstname.lastname@example.org.