Skip to main content

The difference in data security of modern times and past

The difference in data security of modern times and past

The difference in data security of modern times and past


Modern data networks are extremely fast if we make compares with the data networks in the past and modern times. That is the threat but also an opportunity for the officials and security specialists, who are hunting hackers in the network. And the tools, what is used in that action are also suitable as the hacking tools. This is the thing, what we must remember when we are hiring some penetration testers, who are working for data security companies.

We must understand that those penetration testers can work as full-time hackers, who are trying to penetrate other companies networks. The idea of the penetration tests is that the team would simulate the attacks against the firewall and other tools, what are used to protect the data, what is stored behind the firewalls. But the same tools can be used to penetrate other networks and the contracts of that kind of operations can cover as the penetration test.

But when we are talking about the hacking cases, where the targeted system has been infected with malicious software we must realize that somebody must make that kind of software. The software must be made by some people, who have the right tools and education for that kind of software, which is not very easy to make.

There must be somebody, who makes malicious tools

If we would think the case, that somebody would try to program the malware by using normal computers, the anti-virus can detect that kind of action immediately. And if the hackers or programmers of the malicious software want to make sure, that software is effective, they must test it by using a different kind of anti-viruses and firewalls. And this kind of testing would cause the alarm in the surveillance rooms.

The modern data security bases the offensive technology, where the hacker would attempt to track across the network. That thing works that when the intruder would download some data from the server, the tracking tool would put little cookie or code in the data. This data would answer a similar message, what ping sends to network, and that would allow tracking the hackers. There are people who are judging this thing because this tool can be used to track every person, who is connected to the Internet.

If somebody steals the source code of the computer programs, what officials like NSA are using to create their surveillance tools, that person might create own tools for that kind of developing software. But there are many more things, what people must realize when they are making software. In fact, those developers must have excellent skills in programming because they must remove the tracking codes of that software, and if they cannot do that, the software can send the tracking data to the NSA.

Hackers would need really good laboratories for creating effective hacking tools.

And then those hackers must have a laboratory, where they test the software, what is created by that software. Then those creators must have the knowledge, how those virus-generators are acting. In fact, there could be artificial intelligence based solutions, what mission is to deny the misuse of the governmental software, what is created for making spyware for the intelligence community of the United States.

That means that maybe this kind of special software is code, what would make anti-virus software use the stealth alarms if the malicious software is made by using by the NSA virus generator. In this case that the software, what is used as the generator would make the mark in the things, what made of them, and that will send the mark to the headquarters of the NSA or to the laboratories, what is used for creating the anti-virus.

And maybe the alarm can be caused the situation, that somebody would buy multiple licenses for antivirus tools if that person is not the creator of the antivirus software, or actually stealing the code is a crime. That means that the person must work for some technical magazine. But being the creator of anti-virus would explain, why some person needs to create the malicious code.

The captured source code of computer viruses could be a risk of security because if hackers can get that code, they can modify that to new viruses

That is used for creating the detection of the firewall and antivirus.  In that case, the person needs a laboratory for a testing antivirus program, and also multiple tools for creating that kind of software effectively. But the developer of the antivirus program can also be the cover work for creating the spying and tracking tools.

Sometimes I have thought that if the hackers can penetrate the hard disk of the companies like F-Secure, they would get the codes for many malicious tools, what they could modify if they have enough skills, and that hard disk might be a very interesting target. From there, hackers can get a perfect code for their own solutions, and they can modify that captured malicious software to the new form.

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The cyborg lichen can be one of the most exotic visions of what the high-tech civilization might look like.

.     The cyborg lichen can be one of the most exotic visions of what the high-tech civilization might look like. Above is the image of the nano-submarine. There is introduced an idea, that this kind of system would equip with living neurons, which makes it like some kind of artificial bug or mosquito. The idea is that the robot can take the nutrient by using the robot tube, which acts like a proboscis. The neurons can get nutrients and the rest of the machine can use small fuel cells or the energy to that system can deliver by using the radio waves. Futurologists are thinking about the ideas, what the hybridization of the neurons and machine would look like? Could the hyper-technical civilization look like the group of midget submarines? Those submarines might take nutrients for the neurons, what is living in them. The purpose of the midget submarines, which might be size less than a couple of millimeters would maximize the survivability of the neurons. One of the most intere...