Remesh R

Real-Time Cyber-Attack Map Shows Scope of Global Cyber War

Norse is an Internet security company that helps companies prevent and deflect malicious attacks. And to give you a better idea of how many attacks it could help prevent, it has created its Norse Attack Map.

The image above — which looks like Missile Command on steroids — shows just a snippet of hacking attempts around the world, the countries from which they originate, and the countries that they are attacking.

In reality, the attackers are hitting what Norse calls honey pots — special traps designed to detect unwanted network intrusions by hackers. It’s important to note that the location an attack comes from isn’t necessarily its true origin, as hackers can make an attack look like it’s coming from one place when it’s really coming from another.

Secure your Gmail Account with Yubikey

When it comes to password alternatives, the USB dongle YubiKey Neo is a popular option for providing two-factor authentication; it has been certified as providing the “highest level of security.” The device has been lauded by third parties “for its tight security and ease of use.”google

People who use Gmail and other Google services now have an extra layer of security available when logging into Google accounts. The company today incorporated into these services the open Universal 2nd Factor (U2F) standard, a physical USB-based second factor sign-in component that only works after verifying the login site is truly a Google site.

2-Step Verification offers a strong extra layer of protection for Google Accounts. Once enabled, you’re asked for a verification code from your phone in addition to your password, to prove that it’s really you signing in from an unfamiliar device. Hackers usually work from afar, so this second factor makes it much harder for a hacker who has your password to access your account, since they don’t have your phone.

Security Key works with Google Accounts at no charge, but you’ll need to buy a compatible USB device directly from a U2F participating vendor. If you think Security Key may be right for you, Read more from Google

Remesh Ramachandran

How to Become an Ethical Hacker

Security on the internet is very important and to improve the security, there’s been an increasing demand for ethical hackers (also known as white hat hackers) as they protect the computer systems from dangerous intrusions. There’s been need of technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.

To be a professional ethical hacker you require motivation, dedication, initiative, self-education and formal training in ethical hacking.

  1. Know about the pros and cons ! of different types of hackers, such as White Hat, Grey Hat and Black Hat hackers.
  2. Seek out job opportunities for ethical hackers. There are lucrative jobs available in government organizations, banks, financial institutions, military establishments and private companies.
  3. Analyze the basic requirements to become an ethical hacker. Try to find out the areas where will you need to work really hard.
  4. Decide the area where you would prefer to work primarily with hardware or software. Do not think of specializing in both the areas. Though knowledge of both is required but the decision will help you to know where to begin. You must be aware of every function, every component of computer on which you will have to work on.
  5. Evaluate your strengths and interests and gain some programming knowledge such as C, or Java. These programming languages can be learned by taking formal programming courses and reading books. It will help you to read and write code.
  6. Learn the UNIX operating system as it is regarded as the original operating system built by hackers. Also learn about Windows and Mac OS.
  7. Take a professional course. There are a wide variety of courses available for IT security professionals in “Ethical Hacking” or “Internet Security” which would help you to expand your knowledge in ethical hacking. (Security+, CISSP, or EC-Council certified ethical hacker)
  8. Do the experiments on your own to know the actual happening of a situation
  9. Start experimenting with hardware and software to learn how to take control of the situations and how to prevent a computer from getting hacked.
  10. Read on your own to know what are the areas where you need to improve and what need to be learned to refine your focus. Technology changes rapidly, and a good ethical hacker must be willing and eager to keep up with the new technological developments.
  11. Get certified as it would help you to succeed in the vanguard of your profession.
  12. Stay connected to the hacker community by sharing technical information and ideas.

Remesh Ramachandran

Credits  : ECcouncil, WikiHow