The 10 weirdest, wildest, most shocking computer security exploits ever

@https://twitter.com/candicelanier

Candice writes for several publications, including The Christian Post, Red State, The Black Sphere and Patriot Update. She is the Science & Tech Editor at the Minority Report Blog and the founder and Editor-in-Chief at Front Lines. She's also the founder of Candice Lanier's Tech News and works as a computer consultant. Additionally, Candice is an antiques dealer.

MRencrypt_primary-100022114-gallery-100024895-orig

This ain’t your momma’s Internet

PCWorld – Update your browser. Ditch Java. Don’t click weird links from even weirder people. Ho-hum. The basic tenets of PC security are burned into the brains of most Web surfers by now. The old malware tricks just don’t work as well anymore.Surprise! Bad guys are getting creative. (Never underestimate the oh-so-powerful combination of greed, boredom, and cleverness.) Rather than targeting Internet Explorer, now they’re gunning for your virtual machine, your video games, and your Web-connected thermostat.

“The more digital our lives become, the greater the number of potential nontraditional entry points for cybercriminals attempting to steal data and wreak havoc,” says McAfee Labs security strategist Toralv Dirro, who referred us to some of the wild exploits highlighted here. Grab your tinfoil hat, and let’s take a walk down wacky-hack lane.

The chamber of chaos

First things first: Many of the more exotic exploits in this collection have been identified by security researchers, but not found in the wild. But before you write off these dangers as tomfoolery confined to labs alone, consider the terrifying case of the U.S. Chamber of Commerce.In 2010, the Chamber was the subject of a deep and complicated intrusion. The penetration was so thorough that once authorities discovered the problem, the Chamber found it easier to destroy some PCs completely rather than scrub them clean.

That’s scary, but what happened after the problem was “eliminated” is even more frightening: One of the Chamber’s thermostats was found to be communicating with Chinese servers, while one executive’s printer began spitting out pages composed entirely in Chinese. And that brings us to the next wild exploit…

More

Get Free Email Updates!

Signup Now to Receive Updates and Alerts!

We will never give away, trade or sell your email address. You can unsubscribe at any time.

More in

lng-port

Saying #Yes2Energy, House Votes to Create Jobs and Aid Allies

Steve FoleyJan 29, 2015
15-0129 Scott Walker

The 2016 Primary Season is Here

Michael BeckerJan 29, 2015
inet

Leader of Soros-Founded INET: Rich are Ready to Flee in Case of Uprising

Steve FoleyJan 29, 2015
steve-forbes

Steve Forbes: Netanyahu, The Churchill of Our Time, Must Speak Before Congress

Steve FoleyJan 29, 2015
1_282015_libya-329143280-78201_c0-269-3626-2382_s561x327

Clinton Undercut by Pentagon, Congress on Libya War, Secret Tapes Reveal

Steve FoleyJan 28, 2015

The Minority Report is a network of websites devoted to Conservative & Libertarian politics in the United States. In 2014 the network had over 20 million page views!

On this site you'll find posts & links to some of the best and most comprehensive center-right news and opinion on the net...

February 2013
M T W T F S S
« Jan   Mar »
 123
45678910
11121314151617
18192021222324
25262728  

Archives

Copyright © 2014 The Minority Report Network