What is the point to not suffer hacking damage in a series of cyber attacks
ByDon Hankins
Twitter gets cyber attack on February 1stUser data of 250 thousand people was stolen. Besides this, the New York Times, the Wall Street Journal and the Washington Post have also been attacked by hackers from the end of January to February, respectively, and it is reported that the hacking source is China. Journalist'sBrian KrebsAccording to Mr., each newspaper company submitted a server that suffered hacking to the National Security Agency for analysis. We are summarizing how the Washington Post is not hacked from China as a result of such damage.
How to not get hacked by China - The Week
http://theweek.com/article/index/239626/how-to-not-get-hacked-by-china
◆ 01: Make yourself hard to hack
ByEd Yourdon
Specifically, there is the use of VPN service. Since VPN service can only connect to a predefined location, it makes hacking from China difficult and prevents information leakage. Also, although it does not prevent hacking perfectly, use of Google Chrome is also effective. Internet Explorer and Firefox are easy to be targeted because they are used by companies, and on the contrary Google Chrome has a lot of personal use. For the same reason Linux usage is also effective.
◆ 02:JailbreakNot to do
ByPatrick h. Lauke
It is very important not to Jailbreak a smartphone. When you jailbreak an iPhone, there are many situations where information is stolen remotely, the number of which is four times that of the Android platform. Without Jailbreak it is almost impossible to identify individual smartphones and Wi-Fi networks unless you access some service and provide personal information.
◆ 03: Use smartphones whenever possible
ByPhilcampbell
Since many people use daytime PCs, the subjects of hacking are naturally focused on PCs. Also, applications such as IE, Firefox, Chrome and "using a web browser" are limited, so it is one of the reasons why PCs are easily chosen for hacking. If you can do it with smartphones, such as Gmail and surfing, please go with smartphones instead of PC as much as possible. Because smartphones are hardened for security, their functions and resources such as OS and applications are restricted compared with PCs, and it is difficult to hack them. Using smartphones does not eliminate the risk of hacking at all, but it is certain that it will become difficult to be hacked.
◆ 04: To recognize that a computer without security is already in danger
ByKryptyk
Do not leave the default password issued by the ISP as it is, change it to an arbitrary password, and turn off the remote access function. In addition, please do not use DHCP etc by interposing firewall at access point such as airport. Otherwise I can not protect my PC absolutely. Besides this, the use of antivirus software and long passwords is effective for protecting your PC.
In summary, it is natural to use a PC that has made thorough security measures, so that it is not possible for PCs to do work that can be done with smartphones, smartphones that are used at that time are of course not Jailbroken ... ... However, when matching various things such as efficiency of work, it is also a fact that it does not go easily according to this advice. In the first placeSilicon chip has back doorThere is also a story saying, if you are really careful, if you do not pay attention from the stage of making the parts of the PC, what traps are being set up where ... ....
Related Posts:
in Note, Posted by darkhorse_log