The technology advancements alone have led to several cold cases freeing the wrongfully convicted. What are some of the contributing factors wrongful convictions? There is no way to make a right for the justice system can do for those wrongfully convicted. The loss of time however, there have been some initiatives about compensation for the errors that have happen. The public opinion is so strong when it comes to catching these criminals.
vInternet security is the biggest threat that we face when surfing the internet. Many of us have lost alot of money because of this problem. This is because our internet security protocol is extremely siloed and AntiViruses can't keep up with the different decentralized attacks from all these different hackers around the world who break through these siloed, anti-virus software systems. What I have for you today is a company that's trying to solve that problem by decentralizing the antivirus system. Polyswarm is aiming to do that decentralizing and making the internet safe for you to surf again.
But its all fake tricks to cheat user and make money, in real GPAA Ransomware is a nasty file encrypting virus. It uses “[16_random_charecters].cerber6” pattern for encryption. Note that GPAA Ransomware is related to another nasty virus named Cerber. How GPAA Ransomware perform?
Leading some political people to either be cautious of every step they took or to just retire from the current position they had. Now the government is a very important position that not everyone is in but even so we as regular people have it tough too. In online website because the NSA is trained to hack into our devices how do we know that our identity is being stolen while we’re putting our information into the computer? Due to technology advancing identity theft has become more common. If we continue the use of the NSA’s device we lose our privacy.
Scareware. It is a form of malicious software that uses social engineering to cause shock, anxiety or the perception of a threat in order to manipulate users into buying unwanted software. It is a part of a class of malicious software that includes rogue security software. Some forms of Spyware and Adware also use Scareware tactics.
Until someone from National Security Agency (NSA) asked his help to steal a black box which was invented to crack any encryption code. Martin acknowledged the job considering the possible threat that black box can do if it goes to wrong hands, but sooner he realizes that the NSA officer he spoke with is a rogue one.
In Chuck Klosterman’s book “I Wear the Black Hat”, the chapter “Electric Funeral” he focuses on a special type of villain, the technocrat. A technocrat is technically skilled in computer websites. Klosterman tells us about three “villains” who are technocrats that have made such websites and social media applications. Creating websites or social media applications such as where you can get music illegally, find out information about your favorite celebrity that no one else knows and getting leaked information about what’s happening around the world that’s property of the US government, these websites can cause harm whether emotionally or physically. Klosterman believes we really are powerless to control our future because of the ongoing technocracy that’s coming out within the years.
DNA evidence is vital in helping the search for truth in many criminal cases such as a murder case, rape case or up any serious case. The offenders of these cases often committed because they do not want people to see their crime event’s doing. Some case against life, the offenders are a highly skilled and cover their actions by destroying evidence. In rape case, the rape scene or event which not only affects the body and mind of a rape victim, but also affect the confidence of the society toward with law enforcement.
They steal sensitive personal, business, and government information. They steal money, crash websites, destroy files, and disrupt businesses. (pg. 230)” I agree with that quote, hackers are doing the harmful act of entering into someone’s privacy and gathering personal information with the intent to steal. Others may argue that the people are getting
The operation was code name Buckshot Yankee. Operation Buckshot Yankee was the United States response to the terrorist attacks of 2008. Unlike the terrorists’ attack on 9/11, the attack on 2008 was a cyber-attack that affected the U.S Government’s unclassified and classified computer networks. The Deputy Secretary of Defense William J. Lynn III (2010) stated “It was a network administrator 's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary”. The program that infected the Government’s networks was a computer worm, a type of malicious software (Malware) that duplicates itself without human interaction, called Agent.btz.
While researching on Windows and UNIX, I found that UNIX has better built-in security and permissions features than Windows (Haas, n.d). While upgrading software from Microsoft, it often requires the user to purchase new or more hardware or prerequisite software, but UNIX on the other hand does not require purchasing (Haas, n.d). UNIX operating system is more stable, faster and more secure compare to windows because most software is written to create damage to windows (Noyes, 2010). In windows if you leave a port open it can be easily used by hacker to introduce a virus in your computer whereas UNIX has to go through various executable permissions that why UNIX is considered more secure than Windows (Noyes, 2010). While windows users are more than UNIX users worldwide, the potential of windows facing security challenge is higher as hacker’s attempts to break the security and viruses built to break in.
Employees hacking other employees big companies getting hacked. How on earth can we trust employees and workers if bad things are going on with them and the company. If they want to know what we are doing they should just ask us the next time we pay or buy anything instead of hacking us. Its more money out of our own pockets having to pay for the damages. This is why most people switch to other phone companies.