How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think?

How do Hackers Look Like and What They Think?

EDUCATIONAL PROFILE: Almost all hackers finished college or reached that level by self-education. Self-educated hacker is  more respected in hackers community because you really need to have passion to become professional hacker. The most common areas in which people can engage in hack, with computers electrical engineering, physics, mathematics, linguistics and philosophy. However, as every developer is not necessarily the hackers, so hackers do not always have the skills of programming (I think they have to know programming)!

DRESS STYLE: Hackers are dressed simply, casually: jeans, T-shirt and shoes. T-shirts are usually with some humorous slogans. By 1990, they were distributed T-shirts with computer imagery, but as the hacker culture eventually developed their own symbols, today there are T-shirts with pictures of Penguin (trademark Linux) or daemon (BSD). A small number of hackers prefer hiking boots. After 1995, hackers are falling under the influence of punk, gothic and rave subculture. This was reflected in the wearing of black clothes. Hackers care more about comfort, functionality and ease of maintenance wardrobe. They don’t like business suits. Even if they wear it, be sure to break the conventionality with a humorous tie.

OTHER INTERESTS: Hobbies that hackers exercise are widespread. These are primarily science fiction, music, medievalism, chess, war games and intellectual games of all types, logical puzzles and other areas that are closely related to hacking or that include linguistics and acting.

THINGS HACKERS AVOID: On this list are all Microsoft products, Smurfs and all forms of striking beauty. THEY HATE bureaucracy and stupid people, do not like to listen to soft music, or to watch television, except for cartoons and science fiction films. THEY HATE dishonesty, incompetence and boredom. From programming languages avoid COBOL and BASIC, as well as programs whose appearance is based on the text (not the icons).

PHYSICAL ACTIVITY AND SPORT: The largest number of hackers are generally not engaged in physical activities. Some of them practice it, but interest in the sport is not that big. Avoid team sports. Hacker sports are always individual, including concentration and motor skills: cycling, auto racing, skating, sailing, hiking, gliding … (I actually like to play football, but hate to watch it and I don’t have any favorite team).

Most hackers consume cigarettes and alcohol. In 1995, there was a trend among Linux hackers to drink exotic beers, influenced by Linus Torvalds who like Guinness. The limited use of cannabis, LSD, nitrus oxide used to be more accepted than in mass culture. On the other hand, the use of opioids is rare because hackers do not want to use a drug that blunts them. Most hackers use a coffee and / or sugar (ENERGY DRINKS, mmm 😉 ) in order to stay up all night during the hacking.

 
2 Kudos
You are
awsome 🙂

Malicious malware detected in GTA V mods

Several Grand Theft Auto V for PC mods found to have viruses and malware

In the world of PC gaming, the Mods play a very important role in it. Mods take an original base of a game, and with some twists, you get carried to a totally different world. However, it looks though at least one person has decided to take advantage of the circumstances and include the malicious code within without the knowledge to those who download it.

The hugely popular No Clip and Angry Planes mods for Grand Theft Auto V are said to come with malicious code. This only emphasizes the importance of performing scans on the files you download with proper and updated anti-virus and anti-malware tools before you install them.

GTA Forum consisting of seven members carried out an investigation after realizing that Angry Planes had began to misbehave. It was found that an odd C# compiler program was running in the system processes, transmitting and receiving data across the web. A Fade.exe executable was found in his PC’s Temporary Files folder that kept a watch on his activity and changed his Windows registry to silently launch at system boot.

The other user who checked out the malware stated that he had used his PC to take part in a DDoS attack against a Twitch game streamer. Other modules that were found to be active inside the malware include a Facebook spam/credential stealing module, a Messenger.com spam/credential stealing module, a Twitch spam/credential stealing module, a Keylogger module, a Steam spamming module, and a UDP flooding module.

Malwarebytes, a Security firm that thorough examined the malicious files that were shared via the fraud has been identified by the security firm as Trojan-Agent-TRK – in a Malwarebytes blog post.

As told to EI Reg, Chris Boyd, a security researcher at Malwarebytes and an enthusiastic gamer stated that the flexible malicious ad-ons towards gamers is a fairly common action.

“Game mods have been a target for many years, with an older version of GTA coming under fire from a notorious GTA: Hoodlife fake mod containing malware back in 2007,” Boyd explained.

“Fans of the series traditionally enjoy extending the lifespan of the title through modding, so it’s a rich area of exploitation for malware authors. Rockstar could potentially increase mod safety by opening up the Steam workshop to mod downloads, but it seems that option isn’t available yet,” he said.

“If there is no push to host mods on Steam, then gamers will have to rely on third-party sites for downloads. It’s a lot easier for bad files to slip through on forums and fan-made websites than a service such as Steam with various checks and security features in place behind the scenes,” he added.

In case, you are using No Clip or Angry Planes with any mod or GTA V, it is advisable to carry out an anti-malware scan with one of the AV programs that identified the malicious file. It is also advisable to change your passwords to be more secure.

 
0 Kudos
You are
awsome 🙂

Password secrets: Your Passwords Aren’t As Secure As You Think

There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords. but is it enough to set password and feel that we are secure? Are you really aware about of how to use passwords?

(more…)

 
3 Kudos
You are
awsome 🙂

Infographic: Biggest CyberSecurity Attacks in History

An interesting, but arguable, infographic coming to us today from the Financial Times. Is Kevin Mitnick really bigger than the guys that hacked Target, Home Depot, Bebe, and virtually every fast food restaurant in the US? I think he’s just grandfathered in because of the audacity of his actions (mostly social engineering) and the fact that he’s been on every Top Hacker list since the dawn of time. But still, luv ya, Kev!

Biggest Cybercrime Security Attacks in History

 
1 Kudos
You are
awsome 🙂