ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
View Torrent Info: Arrival 2016 HDCAM x264 AC3-TuttyFruity
View Torrent Info: Hacksaw Ridge 2016 HDCAM x264 AC3-TuttyFruity
Hot torrents
XVID DIVX
View Torrent Info: Always.Shine.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Blood.Brothers.2015.HDRip.XViD-ETRG
View Torrent Info: Blue..Jay.2016.HDRip.XviD.AC3-EVO
View Torrent Info: Run.the.Tide.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Zootopia.2016.BluRay.1080p.AVC.DTS-HD.MA 7.1 x264-ETRG
View Torrent Info: Gods.of.Egypt.2016.BluRay.1080p.AVC.DTS-X 7.1 x264-ETRG
View Torrent Info: Teenage.Mutant.Ninja.Turtles.Out.of.the.Shadows.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Pet.2016.1080p.WEB-DL.H264.AC3-ETRG
Hot torrents
Television
View Torrent Info: The.Vampire.Diaries.S08E06.HDTV.x264-LOL[ettv]
View Torrent Info: The.Grand.Tour.S01E03.WEBRip.X264-DEFLATE[ettv]
View Torrent Info: DCs.Legends.of.Tomorrow.S02E07.HDTV.x264-LOL[ettv]
View Torrent Info: Crazy.Ex-Girlfriend.S02E06.HDTV.x264-LOL[ettv]
View Torrent Info: Ardaas (2016) DVDRIP 1CDRIP x264 AAC ESub [DDR]
View Torrent Info: Train.To.Busan.2016.720p.HDRip.Hindi.AC3-ETRG
View Torrent Info: Ben Hur (2016) 720p BDRip DUAL DD 5.1 x264 ~ PyZ
View Torrent Info: The.Lord.of.the.Rings.The.Motion.Picture.Trilogy.Extended.HQ.BluRay.1080p.x264.AC3.Hindi.Eng-ETRG
30s
Chat
To add new messages please Login or Register for FREE
Warning! Use a VPN When Downloading Torrents!
Your IP Address is 54.161.208.7.   Location is United States
Your Internet Provider and Government can track your torrent activity!  Hide your IP ADDRESS with a VPN!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > DDoS and SQL Attacks Lead the Chart

DDoS and SQL Attacks Lead the Chart

DDoS and SQL Attacks Lead the Chart

Added: Monday, November 5th, 2012
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extratorrent.com
A recent report into hacker antics revealed that SQL injection remains a hot topic among the security experts. The result of the research, conducted by the insecurity experts,claimed that the issues discussed on hacker forums mostly focus on training and tutorials for information theft techniques like SQL injection.

Nevertheless, the report titled “Monitoring Hacker Forums” points out that no more than 5% of IT budgets include products aimed at mitigating attacks in the data center. Security experts claim that by examining what information the attackers share in the forums, they can understand where they focus their efforts. The main problem is that companies ignore SQL injection security at their peril while the hackers are focusing on their attacks. Today DDoS and SQL injection remain the most popular intrusion methods. One of them is used 19% of the time.

In the meanwhile, the survey on the security infrastructure worldwide shows that companies spent $25 billion on security software and network equipment last year, which is less than 5% of security budgets intended to products which mitigate SQL injection attacks. Today hackers also make attempts to push into social networking services: the report revealed that Facebook (at 39%) and Twitter (at 37%), were the most frequently discussed networking sites.

Security experts, when reviewing social network related online discussions, observed a black market for purchasing and selling illegal social network likes, followers, and endorsements. They paid particular attention to the origin of those likes and followers. It also turned out that most of the hacker forums were training newbies, with over 28% of the publications being related to hacker training, and 5% linking to hacking tutorials.


By:
SaM
November 5th,2012

Posted by: 
SaM

Date:  Monday, November 5th, 2012



Comments (12) (please add your comment »)

1
posted by (2012-11-05 14:58:48)
KurdishWarrior avatarThere are lots of hacker forums that even a red-neck guy can learn effective hacking techniques just by following a few instructions . Dark times, dude, dark times... (Thanks SaM)

2
posted by Site FriendET loverSuperman (2012-11-05 18:00:05)
Embolism avataralso plenty of information by non hacking forums,sites such as Foundstone and most engineers and developers know a few workarounds since the advent of DDOS on Steve Gibson by a 14yr old java backend servers have become more popular and security to prevent such attacks on sites like betfair.com have been abated,SQL injection is more promising for the determined hackers and that frightens the Cyber crew @fort meade and elsewhere since attacks are more likely to produce information leaks rather than just stopping server traffic.There is also Ethical hacking which most engineers do in workarounds which is why ppl like torvald linus are named as white hats although sometimes it is not so much white as grey when workarounds are done within systems to get programs to do what is required of them.

3
posted by Site FriendET loverSuperman (2012-11-05 18:03:06)
Embolism avatarThere has been a black market for facebook accounts in Australia by a Russian guy for several years now so nothing new and by using Backtrack a semi proficient user can download the user accounts and passwords of 100,000 people or more in 20 minutes from facebook.

4
posted by Blocked (2012-11-05 18:41:46)
o2david avatarIntrusions are very real I gather. From imitation hostings seeming to be the real deal to fighting for street posts for a wireless broadcasting.
That is the real attack, privately taking you in, mimicking friendship as deception even. No one is dumb enough to go against the world in the open, execute some genius, libreate freedom and behave.

5
posted by Site FriendET loverSuperman (2012-11-06 18:38:14)
Embolism avatarFrom a strictly engineering field standpoint it must be said that if it was`nt for those that circumvent security potential security innovations cannot be promrted as well as making companies like Alta vista develop better firewalls and AIDS.AIDS is your friend,lol,ANTI Intrusion Detection SYSTEMS

6
posted by Site FriendET loverSuperman (2012-11-06 18:43:42)
Embolism avatarDelphi Oracale java back ends for servers which in light of betfair.com`s loss of millions in revenue over a couple of days through a DDOS attack seems very prudent and I recommended it on sourceforge .net at the time of their attack as jd666 or jeff666 whichever pseudonym I might have been using at the time

7
posted by Site FriendET loverSuperman (2012-11-06 19:02:43)
Embolism avatarIf a safer,faster,more innovative Internet is to progress there is always going to be people trying exploits as there were in phone phreaking and other early electronic exploits and it is only by these exploits and understanding them that they can be stopped,until then expect them to continue and to drive innovation otherwise antivirus ,firewall,games companies,etc,etc would be laying off 1000`s as there would be no need to update,patch or improve in applications leading to apathy and insecurity to the point that any one will be able to hack you,virus you,trojan or even access all your credit cards,bank account etc and leave you sitting with just the clothes on your back.The fact that policing the internet is pretty much impossible is a given the restriction of transports and outlawing filesharing seems to be the driving imperative especially since decentralised torrenting and DHT make it a secure transport.When the big brother Orwellian mentality is lost and systems are made secure maybe the world can move on and Innovation in other things outside of security to the benefit of mankind will be developed

8
posted by (2012-11-06 20:27:27)
hairpin100 avatarEmbolism, i`d be a happy man if i had 50% of the knowledge you`ve got mate, plus you seem a descent geezer. (hope that don`t sound too a#selicky)

9
posted by Site FriendET loverSuperman (2012-11-08 02:49:48)
Embolism avataraww shucks thanks,but only one small fish in a great big sea and many,many people with much more knowledge than me
Most can be found @ sourceforge.net and all work for the common good

10
posted by Site FriendET loverSuperman (2012-11-08 03:00:14)
Embolism avataro2david makes a good case for example if you are a facebook user there is one exploit whereby you receive a link saying you have won 100 million in chips and it prompts you to log in to claim said chips,the link is a spoofer and you actually are sending your data and giving away the keys to your kingdom,literally.
People soon after find themselves locked out of their facebook account and email shortly thereafter,so simply by using others greed/avarice against them the hacker gets the desired result.

11
posted by Site FriendET loverSuperman (2012-11-08 03:09:39)
Embolism avatarwifi can be a boon or a bane depending on who is in your vicinity,I do remember one time watching a film on someone elses laptop which I thought at the time was rather cool and with applications like aircrack and airsnort along with distros like Backtrack there is`nt much that is impossible to those who would care to capture and decrypt what is sent by that method.

12
posted by (2012-11-10 04:46:19)
Kinkajou avatarI have a facebook account but never use it. Never clicked on any links or email from anyone I do not know yet my facebook account was hacked and from there they hacked into my email and spammed everyone of my contacts. From then on I was locked out of my windows live and facebook account. I think we are about to face some Major Security issues in the very near future. There will always be someone trying to rune a good thing. Love the articles, most informative thank you.



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc2