<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Other Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/category/other/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/category/other/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Fri, 25 Jul 2025 07:38:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Top Security Tips and Tricks to Protect Yourself in Today’s Digital World 2025</title>
		<link>https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/</link>
					<comments>https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 07:37:50 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1360</guid>

					<description><![CDATA[<p>In an era where our lives are increasingly digital, safeguarding personal information and online presence&#8230;</p>
<p>The post <a href="https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/">Top Security Tips and Tricks to Protect Yourself in Today’s Digital World 2025</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In an era where our lives are increasingly digital, safeguarding personal information and online presence has never been more critical. Cyber threats are evolving rapidly, and hackers are becoming more sophisticated. To stay one step ahead, you need to adopt smart security practices that shield you from potential risks. Here are some essential security tips and tricks to help you stay safe in today’s interconnected world.</p>
<h3>1. Use Strong, Unique Passwords</h3>
<p>One of the simplest yet most effective security measures is creating strong, unique passwords for each of your accounts. Avoid common passwords like “password123” or “admin,” as these are easy targets for hackers. Instead, use a combination of uppercase and lowercase letters, numbers, and special characters. Consider using a password manager to generate and store complex passwords securely. This way, you won’t have to remember them all — just one master password.</p>
<h3>2. Enable Two-Factor Authentication (2FA)</h3>
<p>Adding an extra layer of security with two-factor authentication is a game-changer. With 2FA, even if hackers get hold of your password, they’ll need a second form of verification—like a code sent to your phone or fingerprint scan—to gain access. Many popular services like Gmail, Facebook, and banking apps support 2FA, so enable it wherever possible.</p>
<h3>3. Keep Software Up to Date</h3>
<p>Software developers frequently release updates to fix security vulnerabilities. Failing to install these updates leaves your devices open to attacks. Turn on automatic updates on your operating system, browsers, and apps to ensure you’re protected against the latest threats.</p>
<h3>4. Be Wary of Phishing Attacks</h3>
<p>Phishing scams are emails or messages designed to trick you into revealing sensitive information. They often appear legitimate, mimicking trusted brands or contacts. Always scrutinize emails for signs of fraud, such as suspicious sender addresses, grammatical errors, or unusual requests. Never click on suspicious links or share personal data unless you are certain of the sender’s identity.</p>
<h3>5. Secure Your Wi-Fi Network</h3>
<p>Your home Wi-Fi network is a gateway to all your connected devices. Secure it with a strong password and WPA3 encryption. Change the default router credentials and disable remote management features. Consider setting up a separate guest network for visitors to prevent access to your main devices.</p>
<h3>6. Backup Your Data Regularly</h3>
<p>Data loss can occur due to malware attacks, hardware failure, or accidental deletion. Protect yourself by regularly backing up important files to an external drive or cloud storage service. In case of an attack, having recent backups ensures you can restore your data quickly.</p>
<h3>7. Use Antivirus and Anti-Malware Software</h3>
<p>Installing reputable antivirus and anti-malware programs adds a vital layer of defense. These tools can detect and remove malicious software before it causes harm. Keep your security software updated and run regular scans.</p>
<h3>8. Limit Personal Information Sharing</h3>
<p>Be cautious about how much personal information you share online, especially on social media. Details like your address, phone number, or travel plans can be exploited by hackers for identity theft or targeted attacks. Keep your privacy settings tight and share information only with trusted contacts.</p>
<h3>9. Be Vigilant on Public Wi-Fi</h3>
<p>Public Wi-Fi networks are convenient but often insecure. Avoid accessing sensitive accounts or conducting financial transactions on public networks. If necessary, use a Virtual Private Network (VPN) to encrypt your internet connection and protect your data from prying eyes.</p>
<h3>10. Educate Yourself and Stay Informed</h3>
<p>Cyber threats evolve constantly. Stay informed about the latest scams, security tools, and best practices. Regularly educate yourself about online safety and encourage your friends and family to do the same.</p>
<p>The post <a href="https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/">Top Security Tips and Tricks to Protect Yourself in Today’s Digital World 2025</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-security-tips-and-tricks-to-protect-yourself-in-todays-digital-world-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to install Fail2Ban on the Raspberry Pi/Unix server</title>
		<link>https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/</link>
					<comments>https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 14 Jan 2021 22:19:36 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[rasberry pi]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1335</guid>

					<description><![CDATA[<p>By opening ports from the Internet to your raspberry pi (ssh, http, ftp, https etc.), you are automatically becoming a victim of many hacker's attempts. Hackers are seeking exploits and trying to get access to your server. To protect you against such attacks, there is a tool called Fail2Ban. It supports a lot of services (sshd, apache, qmail, proftpd etc.) and can be integrated directly with your IPTables. By this tutorial, we will guide you via the whole process of how to protect against such attacks.   </p>
<p>The post <a href="https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/">How to install Fail2Ban on the Raspberry Pi/Unix server</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>How to install Fail2Ban on the Raspberry Pi/Unix server</h3>
<p style="text-align: justify;">By <strong>opening ports from the Internet</strong> to your raspberry pi <strong>(ssh, http, ftp, https etc.)</strong>, you are automatically becoming a <strong>victim</strong> of many <strong>hacker&#8217;s attempts</strong>. Hackers are seeking <strong>exploits</strong> and trying <strong>to get access to your server.</strong> To protect you against such attacks, there is a <strong>tool called Fail2Ban</strong>. It supports a lot of services (sshd, apache, qmail, proftpd etc.) and can be integrated directly with your <strong>IPTables</strong>. By this tutorial, we will guide you via the whole process of how to protect against such attacks.   </p>
<h5 style="text-align: justify;">Who is trying to access my raspberry pi?</h5>
<p style="text-align: justify;">If you think that your raspberry pi is safe and you do not need any tool to be installed, please <strong>check the content</strong> of the following <strong>file</strong>:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">cat /var/log/auth.log | grep 'Failed'</pre>
<p><a href="https://itblogsec.com/wp-content/uploads/2021/01/Pictures.png"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1346" src="https://itblogsec.com/wp-content/uploads/2021/01/Pictures.png" alt="" width="843" height="189" srcset="https://itblogsec.com/wp-content/uploads/2021/01/Pictures.png 843w, https://itblogsec.com/wp-content/uploads/2021/01/Pictures-300x67.png 300w, https://itblogsec.com/wp-content/uploads/2021/01/Pictures-768x172.png 768w, https://itblogsec.com/wp-content/uploads/2021/01/Pictures-585x131.png 585w" sizes="(max-width: 843px) 100vw, 843px" /></a></p>
<p style="text-align: justify;">As you can observe above, there are <strong>many password failures</strong>. Usually, the hacker bots are <strong>seeking exploits</strong>.  Each attempt <strong>consumes resources</strong> as your raspberry pi needs to evaluate each request. It is known as DoS attack. </p>
<p style="text-align: justify;">Hackers can try also a <b>brute-force attack. </b> Such an attack consists of an attacker submitting many passwords or passphrases with the hope of eventually <strong>guessing a combination correctly</strong>. The attacker <strong>systematically</strong> <strong>checks</strong> all <strong>possible passwords</strong> and passphrases until the correct one is found. </p>
<h5 style="text-align: justify;">What is Fail2Ban and how does it work?</h5>
<p style="text-align: justify;">Fail2Ban is a <strong>daemon</strong> that <strong>scans access log files</strong> and it bans IP addresses that <strong>show malicious signs</strong>. It <strong>protects</strong> you <strong>against</strong> <strong>too many password failures</strong> as shown above. </p>
<p style="text-align: justify;">It is a <strong>must have tool</strong> to <strong>protect</strong> your <strong>from intruders</strong> to your server or network <strong>especially</strong> if you allow <strong>outside SSH</strong> traffic or any traffics from an outside network to your Raspberry Pi. Fail2Ban tool <strong>supports many different services</strong> <strong>(sshd, apache, qmail, proftpd, sasl, asterisk, etc) </strong>and can be <strong>integrated</strong> with your <strong>IPTables</strong>.</p>
<p style="text-align: justify;"><strong>Installation</strong> of Fail2Ban is very <strong>easy</strong> to install and basic setup <strong>will drastically improve security</strong> on your Raspberry Pi. Fail2Ban works by <strong>checking your access logs for failures</strong> and depending on the settings you setup, <strong>it will ban</strong> or timeout an IP Address for a certain amount of time. Fail2Ban tool can easily protect your raspberry pi against very known brute-force and DoS attacks.</p>
<h5 style="text-align: justify;">How can I protect myself?</h5>
<p style="text-align: justify;">Very easy, by installing of Fail2Ban on your raspberry pi. We will first <strong>install Fail2Ban</strong> by typing the following commands:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo apt-get update
sudo apt-get install fail2ban</pre>
<p style="text-align: justify;">By doing that, you have Fail2Ban already installed. The <strong>configuration file</strong> is located at <strong>&#8216;/etc/fail2ban/jail.local&#8217;</strong>. If you want to change some parameters, you can simply <strong>modify this file</strong> and <strong>restart the service</strong> to take immediate effect.</p>
<p style="text-align: justify;">Let&#8217;s edit our SSH Fail2Ban configurations. Open up the &#8216;/etc/fail2ban/jail.local&#8217; file with the following command:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo nano /etc/fail2ban/jail.local</pre>
<p style="text-align: justify;">Your <strong>jail.local file should already contain</strong> some <strong>pre-defined config.</strong> We will need to tweak it a little bit. Find a section in the file called <strong>[sshd]</strong> and paste/modify accordingly:</p>
<div id="crayon-5fdbb26ace0f1756477449-1" class="crayon-line">
<div id="crayon-5fdbb26ace0f1756477449-1" class="crayon-line">
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">[sshd]

enabled = true
filter = sshd
port = ssh
logpath = /var/log/auth.log
bantime = 86400
banaction = iptables-allports
findtime = 900
maxretry = 3
backend = %(sshd_backend)s</pre>
<p style="text-align: justify;">After pasting the settings hit CTRL+X and then Y to save the configuration file. Below is what each line in the configuration means and what you can edit:</p>
<p style="text-align: justify;"><strong><em>enabled</em></strong>: Determines whether or not the filter is turned on.</p>
<p style="text-align: justify;"><em><strong>filter</strong></em>: The name of the file located in ‘/etc/fail2ban/filter.d’ that contains the failregex information used to parse log files appropriately.</p>
<p style="text-align: justify;"><em><strong>port</strong></em>: The port Fail2Ban should be referencing in regards to the service. If using the default port, then the service name can be placed here. If you changed your SSH port to something else you would need to write the new port number here.</p>
<p style="text-align: justify;"><em><strong>logpath</strong></em>: The path to your log file.</p>
<p style="text-align: justify;"><em><strong>bantime</strong></em>: The length of time in seconds that the IP Address will be banned for. In my example I used ‘86400’ seconds which would be 24 hours. If you want to ban an IP Address permanently then you will set the <em><strong>bantime</strong></em> to ‘-1’.</p>
<p style="text-align: justify;"><em><strong>banaction</strong></em>: The action to take when banning an IP Address.</p>
<p style="text-align: justify;"><em><strong>findtime</strong></em>: The length of time between login attempts before a ban is set. For example, if Fail2Ban is set to ban an IP after three failed log-in attempts, those three attempts must occur within the set <em><strong>findtime</strong></em> limit. The <em><strong>findtime</strong></em> value should be a set number of seconds.</p>
<p style="text-align: justify;"><em><strong>maxretry</strong></em>: How many attempts can be made to access the server from a single IP before a ban is imposed.</p>
<p style="text-align: justify;">After modification of the configuration file, you need to restart the service to take changes affect:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo service fail2ban restart</pre>
<p style="text-align: justify;">After the restart of service, <strong>your raspberry pi is already protected</strong> and all <strong>DoS</strong> or <strong>brute-force attempts</strong> will be <strong>banned</strong>. The list of all <strong>banned IPs</strong> is <strong>cleared</strong> upon<strong> restarting Fail2Ban</strong> or <strong>rebooting</strong> the <strong>server</strong>. If you manage to ban yourself, you can simply reboot the server or use the command below:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo fail2ban-client set sshd unbanip &lt;IP-YOU-WANT-TO-UNBAN&gt;</pre>
<p style="text-align: justify;">You can <strong>check</strong> your <strong>IPTables</strong> <strong>list</strong> with the following command to see <strong>all your banned IP</strong> addresses:</p>
</div>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo iptables -L -n --line</pre>
<p><span style="font-size: 8pt;"><strong>source:</strong> <a href="https://en.wikipedia.org/wiki/Brute-force_attack" target="_blank" rel="noopener">https://en.wikipedia.org/wiki/Brute-force_attack</a>, <a href="https://www.fail2ban.org/wiki/index.php/Main_Page" target="_blank" rel="noopener">https://www.fail2ban.org/wiki/index.php/Main_Page</a></span></p>
</div>
<p>The post <a href="https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/">How to install Fail2Ban on the Raspberry Pi/Unix server</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</title>
		<link>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/</link>
					<comments>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 22 Apr 2019 10:08:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1168</guid>

					<description><![CDATA[<p>Cybersecurity will be a hot topic for as long as we are using computers and the internet. With the massive expansion of IoT devices, mobile, and technology in general, we can only expect to see this industry growing in the years to come to keep us safe from online thefts and data breaches. Let’s review some of the most common types of cyber attacks. You’ll be surprised when you see the stats and learn that this issue is much more serious than you probably thought.</p>
<p>The post <a href="https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</h2>
<p dir="ltr" style="text-align: justify;"><strong>Cybersecurity</strong> will be a hot topic for as long as we are using computers and the internet. With the massive expansion of <strong>IoT devices</strong>, <strong>mobile</strong>, and technology in general, we can only expect to see this industry growing in the years to come to keep us safe from online thefts and <strong><a title="https://techjury.net/stats-about/biggest-data-breaches/" href="https://techjury.net/stats-about/biggest-data-breaches/">data breaches</a>.</strong></p>
<p dir="ltr" style="text-align: justify;">Let’s review some of the most common types of cyber attacks. You’ll be surprised when you see the stats and learn that this issue is much more serious than you probably thought.</p>
<div style="text-align: justify;">
<h5 dir="ltr"><strong>A Glance at the Statistics</strong></h5>
<p dir="ltr"><strong><em>Botnets</em><br />
</strong><a title="https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/" href="https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/">Robot networks or botnets</a> are groups of computers acting much like an army with the <strong>aim of attacking one specific computer or groups</strong> of computers.</p>
<p dir="ltr">Think in terms of the inverse proportion examples you saw in school. If you have one hacker trying to target a network, it may take her a year or more. If you have hundreds of computers sending multiple attacks, it will take much less time. Experts from TechJury contend that botnet use rose to 34% in Q1 of 2018.</p>
<p dir="ltr"><strong><em>Facebook Attacks</em><br />
</strong>If you use social media, then the chances are you use Facebook. By Q4 of 2018 alone, it had<strong> around 2.32 billion users</strong>. The sheer number of users is a huge call for <strong>online hackers</strong>. In September 2018, about <strong>50,000,000 accounts were affected</strong> by an attack.</p>
<p dir="ltr"><strong><em>Financial Statistics</em><br />
</strong>Estimates peg the cost of malware and phishing attacks as well as virus attacks on households at about $4.55. That is more than the GDP of a number of small countries.</p>
<p dir="ltr">Although that is a lot of money, the amount shouldn’t be too surprising because some of that cost comes from charges you only catch after a transaction. In a survey conducted in 2016, three years ago, 48% of participants actually responded that they had seen charges on their bank accounts that they weren’t privy to.</p>
<p dir="ltr">In the first half of 2018 alone, it is estimated that <strong>15% of the attacks were to gain financial access</strong> be it through a virus, malware, ransomware and so on and so forth. Just take a look at the infographic below that reveals some pretty startling statistics.</p>
<p dir="ltr"><strong><em>What’s Next?</em><br />
</strong>An integral part in solving any type of problem is knowing the root cause of the issue because that allows us to set up actions to combat the problem at hand. That is the absolute basic starting point of problem-solving.</p>
<p dir="ltr">What the statistics show are the areas where we are <strong>most vulnerable or have become more vulnerable.</strong> For example, the <strong>33% increase in mobile ransomware</strong> in 2018 tells us that mobile attacks are definitely an area we need to continue to look at.</p>
<p dir="ltr">Overall diligence, an understanding of vulnerability and continuing to search for better security protocols are strategies that look to be necessary for the long haul.</p>
<p><div style="width: 810px" class="wp-caption aligncenter"><img decoding="async" src="https://techjury.net/wp-content/uploads/2019/02/infographic-world-cyber-V2.png" alt="" width="800" height="27502" /><p class="wp-caption-text">cybersecurity 2019</p></div>
</div>
<div style="text-align: justify;"><span style="font-size: 10pt;"><strong>source:</strong> <a title="https://techjury.net/stats-about/cyber-security/" href="https://techjury.net/stats-about/cyber-security/">https://techjury.net/stats-about/cyber-security/</a></span></div>
<p>The post <a href="https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/">The Cyber Security Periscope at a Glance 2019 (INFOGRAPHIC)</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/the-cyber-security-periscope-at-a-glance-2019-infographic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 of the best plugins to keep your wordpress site safe</title>
		<link>https://itblogsec.com/10-of-the-best-plugins-to-keep-your-wordpress-site-safe/</link>
					<comments>https://itblogsec.com/10-of-the-best-plugins-to-keep-your-wordpress-site-safe/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 01 Feb 2017 18:48:19 +0000</pubDate>
				<category><![CDATA[Other]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=534</guid>

					<description><![CDATA[<p>WordPress is the most popular CMS used for million of websites worldwide. Take a look at the top WordPress plugins that are used by bloggers around the world to beef up the security of their site.</p>
<p>The post <a href="https://itblogsec.com/10-of-the-best-plugins-to-keep-your-wordpress-site-safe/">10 of the best plugins to keep your wordpress site safe</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>10 of the best plugins to keep your wordpress site safe</h2>
<p style="text-align: justify;">WordPress is the most popular CMS used for million of websites worldwide. Take a look at the top WordPress plugins that are used by bloggers around the world to beef up the security of their site.</p>
<h3><strong>1. Wordfence Security</strong></h3>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/02/worfdfence-1.jpg"><img decoding="async" class="border-image alignnone wp-image-544 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/worfdfence-1.jpg" width="548" height="245" srcset="https://itblogsec.com/wp-content/uploads/2017/02/worfdfence-1.jpg 548w, https://itblogsec.com/wp-content/uploads/2017/02/worfdfence-1-300x134.jpg 300w" sizes="(max-width: 548px) 100vw, 548px" /></a></p>
<p style="text-align: justify;"><strong>THE MOST DOWNLOADED WORDPRESS SECURITY PLUGIN</strong><br />
WordPress security is all we do. Secure your WordPress website with Wordfence. Powered by the constantly updated Threat Defense Feed, our Web Application Firewall stops you from getting hacked. Wordfence Scan leverages the same proprietary feed, alerting you quickly in the event your site is compromised. Our Live Traffic view gives you real-time visibility into traffic and hack attempts on your WordPress website. A deep set of additional tools round out the most complete WordPress security solution available.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li style="text-align: justify;">WordPress Firewall</li>
<li style="text-align: justify;">Blocking Features</li>
<li style="text-align: justify;">WordPress Login Security</li>
<li style="text-align: justify;">Security Scanning</li>
<li style="text-align: justify;">Monitoring Features</li>
<li style="text-align: justify;">Multi-Site WordPress Security</li>
<li style="text-align: justify;">IPv6 Compatible</li>
<li style="text-align: justify;">Free Learning Center</li>
</ul>
<p>&nbsp;</p>
<h3><strong>2. WP-DBManager</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/WP-DBManager.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-540 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/WP-DBManager.jpg" width="548" height="224" srcset="https://itblogsec.com/wp-content/uploads/2017/02/WP-DBManager.jpg 548w, https://itblogsec.com/wp-content/uploads/2017/02/WP-DBManager-300x123.jpg 300w" sizes="(max-width: 548px) 100vw, 548px" /></a></p>
<p style="text-align: justify;">Allows you to optimize database, repair database, backup database, restore database, delete backup database , drop/empty tables and run selected queries. Supports automatic scheduling of backing up, optimizing and repairing of database.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>3. AntiVirus for WordPress</strong></h3>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/02/antivirus.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-546 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/antivirus.jpg" width="548" height="227" srcset="https://itblogsec.com/wp-content/uploads/2017/02/antivirus.jpg 548w, https://itblogsec.com/wp-content/uploads/2017/02/antivirus-300x124.jpg 300w" sizes="(max-width: 548px) 100vw, 548px" /></a></p>
<p style="text-align: justify;">AntiVirus for WordPress is a easy-to-use, safe tool to harden your WordPress site against exploits, malware and spam injections. You can configure AntiVirus to perform an automated daily scan of your theme files and database tables. If the plugin happens to detect any suspicious code injections, it will send out a notification to a previously configured e-mail address. In case your WordPress site has been hacked, AntiVirus will help you to become aware of the problem very quickly in order for you to take immediate action.</p>
<p><strong>Features:</strong></p>
<ul>
<li>Virus alert in the admin bar</li>
<li>Cleaning up after plugin removal</li>
<li>Translations into many languages​​</li>
<li>Daily scan with email notifications</li>
<li>Database tables and theme templates checks</li>
<li>WordPress 3.x ready: both visually and technically</li>
<li>Whitelist solution: Mark suspected cases as &#8220;no virus&#8221;</li>
<li>Manual check of template files with alerts on suspected cases</li>
<li>Optional: Google Safe Browsing for malware and phishing monitoring.</li>
</ul>
<p>&nbsp;</p>
<h3><strong>4. JetPack</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/jetpack-1.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-552 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/jetpack-1.jpg" width="551" height="226" srcset="https://itblogsec.com/wp-content/uploads/2017/02/jetpack-1.jpg 551w, https://itblogsec.com/wp-content/uploads/2017/02/jetpack-1-300x123.jpg 300w" sizes="(max-width: 551px) 100vw, 551px" /></a></p>
<p style="text-align: justify;">Jetpack simplifies managing WordPress sites by giving you visitor stats, security services, speeding up images, and helping you get more traffic. Jetpack is a free plugin.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li>Traffic Growth &amp; Insights</li>
<li>Security</li>
<li>Image Performance</li>
<li>Centralized Management</li>
<li>A few more things that our users love</li>
<li>Dedicated Support</li>
<li>Contributing to Jetpack</li>
</ul>
<p>&nbsp;</p>
<h3><strong>5. Sucuri Security</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/sucuri_security.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-555 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/sucuri_security.jpg" width="547" height="290" srcset="https://itblogsec.com/wp-content/uploads/2017/02/sucuri_security.jpg 547w, https://itblogsec.com/wp-content/uploads/2017/02/sucuri_security-300x159.jpg 300w" sizes="(max-width: 547px) 100vw, 547px" /></a></p>
<p style="text-align: justify;">Sucuri is a globally recognized authority in all matters related to website security, with specialization in WordPress Security. The Sucuri Security WordPress Security plugin is free to all WordPress users. It is a security suite meant to complement your existing security posture with seven key security features.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li>Security Activity Audit Logging</li>
<li>File Integrity Monitoring</li>
<li>Remote Malware Scanning</li>
<li>Blacklist Monitoring</li>
<li>Effective Security Hardening</li>
<li>Post-Hack Security Actions</li>
<li>Security Notifications</li>
</ul>
<p>&nbsp;</p>
<h3><strong>6. iThemes Security (formerly Better WP Security)</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/iThemes_Security.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-558 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/iThemes_Security.jpg" width="543" height="264" srcset="https://itblogsec.com/wp-content/uploads/2017/02/iThemes_Security.jpg 543w, https://itblogsec.com/wp-content/uploads/2017/02/iThemes_Security-300x146.jpg 300w" sizes="(max-width: 543px) 100vw, 543px" /></a></p>
<p style="text-align: justify;">iThemes Security is the #1 WordPress Security Plugin. iThemes Security (formerly Better WP Security) gives you over 30+ ways to secure and protect your WordPress site. On average, 30,000 new websites are hacked each day. WordPress sites can be an easy target for attacks because of plugin vulnerabilities, weak passwords and obsolete software.</p>
<p style="text-align: justify;">Most WordPress admins don&#8217;t know they&#8217;re vulnerable, but iThemes Security works to lock down Wordpress, fix common holes, stop automated attacks and strengthen user credentials. With advanced features for experienced users, our WordPress security plugin can help harden WordPress.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li style="text-align: justify;">Maintained and Supported by iThemes</li>
<li style="text-align: justify;">Plugin Support and Pro Features</li>
<li style="text-align: justify;">iThemes Sync Integration</li>
<li style="text-align: justify;">iThemes Brute Force Attack Protection Network</li>
<li style="text-align: justify;">Protect</li>
<li style="text-align: justify;">Detect</li>
<li style="text-align: justify;">Obscure</li>
<li style="text-align: justify;">Recover</li>
<li style="text-align: justify;">Compatibility</li>
<li style="text-align: justify;">Translations</li>
</ul>
<p>&nbsp;</p>
<h3><strong>7. WP Security Audit Log</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/WP_security_audit_log.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-559 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/WP_security_audit_log.jpg" width="544" height="240" srcset="https://itblogsec.com/wp-content/uploads/2017/02/WP_security_audit_log.jpg 544w, https://itblogsec.com/wp-content/uploads/2017/02/WP_security_audit_log-300x132.jpg 300w" sizes="(max-width: 544px) 100vw, 544px" /></a></p>
<p style="text-align: justify;">Keep an audit log of everything that is happening on your WordPress and <a href="http://www.wpsecurityauditlog.com/documentation/wordpress-multisite-plugin-features-support/" target="_blank" rel="noopener noreferrer">WordPress multisite</a> with WP Security Audit Log to ensure user productivity and identify WordPress security issues before they become a security problem. <a href="http://www.wpsecurityauditlog.com/" target="_blank" rel="noopener noreferrer">WP Security Audit Log</a>, WordPress&#8217; most comprehensive user monitoring and audit log plugin already helps thousands of WordPress administrators, owners and security professionals ensure the security of their websites and blogs. Ensure the security of your WordPress too by installing WP Security Audit Log. The community&#8217;s favourite WordPress user monitoring and security auditing plugin is developed by WordPress Security Consultants and Professionals <a href="http://www.wpwhitesecurity.com/" target="_blank" rel="noopener noreferrer">WP White Security</a>.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li>WP Security Audit Log for WordPress Multisite</li>
<li>Monitor WordPress Users Activity &amp; Productivity</li>
<li>Keep A WordPress Security Audit Log &amp; Identify WordPress Security Issues</li>
<li>Free and Premium Support</li>
<li>WordPress &amp; PHP Errors Monitoring Tools</li>
</ul>
<p>&nbsp;</p>
<h3><strong>8. Security Ninja</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/security_ninja.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-560 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/security_ninja.jpg" width="548" height="243" srcset="https://itblogsec.com/wp-content/uploads/2017/02/security_ninja.jpg 548w, https://itblogsec.com/wp-content/uploads/2017/02/security_ninja-300x133.jpg 300w" sizes="(max-width: 548px) 100vw, 548px" /></a></p>
<p style="text-align: justify;">A combination of WP security best practices rolled into a single plugin, Security Ninja performs over 31 security tests, like brute-force attacks. Your site is checked thoroughly for holes and security vulnerabilities, and preventative measures help stop attacks.</p>
<p style="text-align: justify;"><strong>Tests included:</strong></p>
<ul>
<li style="text-align: justify;">brute-force attack on user accounts to test password strength</li>
<li style="text-align: justify;">numerous installation parameters tests</li>
<li style="text-align: justify;">file permissions</li>
<li style="text-align: justify;">version hiding</li>
<li style="text-align: justify;">0-day exploits tests</li>
<li style="text-align: justify;">debug and auto-update modes tests</li>
<li style="text-align: justify;">database configuration tests</li>
<li style="text-align: justify;">Apache and PHP related tests</li>
<li style="text-align: justify;">WP options tests</li>
</ul>
<p>&nbsp;</p>
<h3>9. Scan Security</h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/S.A.F.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-561 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/S.A.F.jpg" width="547" height="261" srcset="https://itblogsec.com/wp-content/uploads/2017/02/S.A.F.jpg 547w, https://itblogsec.com/wp-content/uploads/2017/02/S.A.F-300x143.jpg 300w" sizes="(max-width: 547px) 100vw, 547px" /></a></p>
<p style="text-align: justify;">Security plugin of the website it&#8217;s key to your safety and calmness. Protect your website from hackers attacks and spammers. Powerful tools with smart algorithms, simple interface and very effective action protect files on your server from any kind of malwares and vulnerabilities themes and plugin. S.A.F. plugin work in background to protect your entire website and every single part of your website. S.A.F. scan all plugins, themes and core files in background as result you get full reports and detailed logs. S.A.F. notfiy you multiply ways all security threats and attacks attempts. S.A.F. most powerfull security tool for wordpress with multi site functionality support. Scan files system, healing infected files, protect your website from brute force attacks it&#8217;s a main goals of S.A.F.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li style="text-align: justify;">Live System Monitor (System Log)</li>
<li style="text-align: justify;">Antivirus</li>
<li style="text-align: justify;">Cloud Antivirus Monitor</li>
<li style="text-align: justify;">Security Email Report</li>
<li style="text-align: justify;">Firewall (Network Monitor)</li>
<li style="text-align: justify;">Brute Force Monitor</li>
<li style="text-align: justify;">404 Detector</li>
<li style="text-align: justify;">Easy Password</li>
<li style="text-align: justify;">Google Captcha</li>
<li style="text-align: justify;">Auto Update</li>
<li style="text-align: justify;">Cron Scheduler</li>
</ul>
<p>&nbsp;</p>
<h3>10. BulletProof Security</h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/02/bulletProofSecurity.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-562 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/bulletProofSecurity.jpg" width="540" height="223" srcset="https://itblogsec.com/wp-content/uploads/2017/02/bulletProofSecurity.jpg 540w, https://itblogsec.com/wp-content/uploads/2017/02/bulletProofSecurity-300x124.jpg 300w" sizes="(max-width: 540px) 100vw, 540px" /></a></p>
<p style="text-align: justify;">Secure WordPress Website Security Protection: Firewall Security, Login Security, Database Security &amp; Backup&#8230; View Security feature highlights below. View BulletProof Security feature details for specific details about security features. Secure your WordPress website even further by adding additional BulletProof Security Bonus Custom Code (See the BulletProof Security Bonus Custom Code help section). Effective, Reliable &amp; Easy to use WordPress Security Plugin.</p>
<p style="text-align: justify;"><strong>Features:</strong></p>
<ul>
<li style="text-align: justify;">One-Click Setup Wizard</li>
<li style="text-align: justify;">.htaccess Website Security Protection (Firewalls)</li>
<li style="text-align: justify;">Hidden Plugin Folders|Files Cron (HPF)</li>
<li style="text-align: justify;">Login Security &amp; Monitoring</li>
<li style="text-align: justify;">Idle Session Logout (ISL)</li>
<li style="text-align: justify;">Auth Cookie Expiration (ACE)</li>
<li style="text-align: justify;">DB Backup: Full|Partial DB Backups | Manual|Scheduled DB Backups | Email Zip Backups | Cron Delete Old Backups</li>
<li style="text-align: justify;">DB Backup Logging</li>
<li style="text-align: justify;">DB Table Prefix Changer</li>
<li style="text-align: justify;">Security Logging</li>
<li style="text-align: justify;">HTTP Error Logging</li>
<li style="text-align: justify;">FrontEnd|BackEnd Maintenance Mode</li>
<li style="text-align: justify;">UI Theme Skin Changer (3 Theme Skins)</li>
<li style="text-align: justify;">Extensive System Info</li>
</ul>
<p>The post <a href="https://itblogsec.com/10-of-the-best-plugins-to-keep-your-wordpress-site-safe/">10 of the best plugins to keep your wordpress site safe</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/10-of-the-best-plugins-to-keep-your-wordpress-site-safe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 10 of the world&#8217;s most famous hackers</title>
		<link>https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/</link>
					<comments>https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 31 Jan 2017 21:22:06 +0000</pubDate>
				<category><![CDATA[Other]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[top 10]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=471</guid>

					<description><![CDATA[<p>There are many notable hackers around the world. We have put together a list of the 10 most notorious hackers of all time. </p>
<p>The post <a href="https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/">Top 10 of the world&#8217;s most famous hackers</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Top 10 of the world&#8217;s most famous hackers</h2>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>1. John Draper</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/John-Draper.-png.png"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-486 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/John-Draper.-png-150x150.png" width="150" height="150" /></a>John Thomas Draper (born March 11, 1943), also known as Captain Crunch. This phreaker (&#8220;Pirate&#8217;s phone&#8221;) whose real name is John Thomas Draper (born March 11, 1943) became famous because he managed to make free long distance calls with a whistle found in Cap&#8217;n Crunch cereal box. Indeed, the sound from this whistle had a frequency of 2600 Hertz, the same frequency as a long-distance line unoccupied continuously emitted to indicate to a telephone exchange is ready to receive a call. The phreaked called a remote toll opening an unused line that did not record billing.</p>
<p>[/lgc_column]</p>
<p>&nbsp;</p>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>2. Steve Jobs and Steve Wozniak</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/1007_Wozniak.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-485 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/1007_Wozniak-150x150.jpg" width="150" height="150" /></a>Both have several things in common, the two famous founders of Apple Computer have spent their youth as hackers. Before moving to Apple, they spent their days building called Blue Box devices that allowed for the whistle as John Draper to make long distance calls without paying a dime. They then started selling these devices to their classmates at the University of California.</p>
<p>We could add Mark Zuckerberg (founder of Facebook), Bill Gates (Microsoft founder), Linux Torvalds (Linux kernel founder) who have all some relations with hacking.</p>
<p>[/lgc_column]</p>
<p>&nbsp;</p>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>3. David Smith</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/david_smith.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-484 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/david_smith-150x150.jpg" width="150" height="150" srcset="https://itblogsec.com/wp-content/uploads/2017/01/david_smith-150x150.jpg 150w, https://itblogsec.com/wp-content/uploads/2017/01/david_smith.jpg 275w" sizes="(max-width: 150px) 100vw, 150px" /></a>All the popularity of David Smith came after creation of the worm &#8220;Melissa&#8221; on 26 March 1999. The Worm was saturated messaging systems by spreading user to user via infected emails (there are over 60 000). Damage estimates were $385 million. Smith, who was arrested, sentenced to 2 years in prison and $5000 fine sad the worm was never intended to cause damage.</p>
<p style="text-align: justify;">The first time the Melissa worm was hidden, it was in a file containing pornographic sites passwords. Smith said that the name Melissa has just met a dancer during a trip to Florida.</p>
<p style="text-align: justify;">[/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>4. George Hotz alias GeoHot</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/George_Hotz.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-483 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/George_Hotz-150x150.jpg" width="150" height="150" /></a>George Hotz is an American hacker known for unlocking the iPhone (the famous jailbreak) and its release the Playstation 3. The jailbreak of making jump the protections of devices running the iOS operating system, providing access to all the features of it, and making it possible to download and install applications without paying.</p>
<p style="text-align: justify;">When Sony was attacked, allegedly by the group Anonymous, Hotz said he was not reponsible for the attack.</p>
<p style="text-align: justify;"> [/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>5. Michael Calce alias MafiaBoy</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/michael-calce-hacker.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-482 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/michael-calce-hacker-150x150.jpg" width="150" height="150" /></a>Mafiaboy is a Canadian who has acquired a certain notoriety after launching in February 2000 a series of DDoS attacks against several web sites such business giants as eBay, Amazon, Yahoo!, Dell or CNN.</p>
<p style="text-align: justify;">He was only 15 years old then, and now says he was not professional, far from it, he used the programs that his friends had done. Calce operated websites mainly for fame and to show his dominance in his group. He now works for a computer security company.</p>
<p style="text-align: justify;">  [/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>6. Gary McKinnon</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-481 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon-150x150.jpg" width="150" height="150" srcset="https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon-150x150.jpg 150w, https://itblogsec.com/wp-content/uploads/2017/01/gary_mckinnon.jpg 274w" sizes="(max-width: 150px) 100vw, 150px" /></a>In 2002, a special message appears on the screen of a computer of the US Army: &#8220;Your security is the sh*t, I am Solo and I will continue to disrupt at the highest levels.&#8221;</p>
<p style="text-align: justify;">It was later learned that this is a message from a British systems administrator named Gary McKinnon. McKinnon allegedly accessed 97 computers belonging to the US Army, NASA, the Army, the Air Force, the Navy, the Ministry of Defense and the Pentagon.</p>
<p style="text-align: justify;">Gary explains that he wanted to do all this to find out once and for all if there were UFOs and thought the US had recovered an alien anti-gravity technology. Then he risked 70 years in prison, Gary was diagnosed as suffering from a form of autism and will not be extradited to the United States where he faced a big trouble.   [/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>7. Robert Tappan Morris</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Robert_Tappan_Morris.jpg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-480 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Robert_Tappan_Morris-150x150.jpg" width="150" height="150" /></a>In 1988, the graduate student from Harvard University decided to test the size of the Internet. He created the Morris worm that infect 6000 Unix machines by making it crash. Millions of dollars of damage will then be estimated. It was probably the first worm of this kind. Morris was finally captured, fined, sentenced to three years probation and 400 hours of community service.</p>
<p>The disk used to write the worm is now available in Boston science museum. And Morris is now a professor at the Massachusetts Institute of Technology.</p>
<p>[/lgc_column]</p>
<p>&nbsp;</p>
<p>[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>8. Adrian Limo</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Adrian_Lamo.png"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-479 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Adrian_Lamo-150x150.png" width="150" height="150" /></a>In December 2001, Lamo was praised by Worldcom for helping to fortify their corporate security. In February 2002, he broke into the internal computer network of The New York Times, added his name to the internal database of expert sources, and used the paper&#8217;s LexisNexis account to conduct research on high-profile subjects. The New York Times filed a complaint, and a warrant for Lamo&#8217;s arrest was issued in August 2003 following a 15-month investigation by federal prosecutors in New York. At 10:15 AM on September 9, after spending a few days in hiding, he surrendered to the US Marshals in Sacramento, California. He re-surrendered to the FBI in New York City on September 11, and pleaded guilty to one felony count of computer crimes against Microsoft, LexisNexis, and The New York Times on January 8, 2004.</p>
<p style="text-align: justify;">In February 2009, a partial list of the anonymous donors to the WikiLeaks not-for-profit website was leaked and published on the WikiLeaks website. Some media sources indicated at the time that Lamo was among the donors on the list.<br />
[/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>9. Kevin Poulsen</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Poulsen_2014.png"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-478 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Poulsen_2014-150x150.png" width="150" height="150" /></a>The black hat hacker in the 80s, Kevin Poulsen, became popular when he &#8220;earned&#8221; a Porsche by hacking a radio station. A radio station in Los Angeles (KMS-FM) launched a radio contest in which the 102nd caller wins a Porsche. Kevin, along with two friends entered the radio telephone system to make sure to be the 102nd caller and win the prize.</p>
<p style="text-align: justify;">He plead guilty and was sentenced to 4 years and 3 months in prison, the longest sentence ever imposed at the time. After leaving prison, Kevin is now working as a journalist for Wired News.</p>
<p style="text-align: justify;">[/lgc_column]</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[lgc_column grid=&#8221;100&#8243; tablet_grid=&#8221;100&#8243; mobile_grid=&#8221;100&#8243; last=&#8221;false&#8221;]</p>
<h4 style="text-align: left;"><strong>10. Kevin Mitnick</strong></h4>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008.jpeg"><img loading="lazy" decoding="async" class="border-image alignleft wp-image-476 size-thumbnail" src="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008-150x150.jpeg" width="150" height="150" srcset="https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008-150x150.jpeg 150w, https://itblogsec.com/wp-content/uploads/2017/01/Kevin_Mitnick_2008.jpeg 180w" sizes="(max-width: 150px) 100vw, 150px" /></a>At age 13, Mitnick used social engineering and dumpster diving to bypass the punch card system used in the Los Angeles bus system. After he convinced a bus driver to tell him where he could buy his own ticket punch for &#8220;a school project&#8221;, he was able to ride any bus in the greater LA area using unused transfer slips he found in a dumpster next to the bus company garage. Social engineering later became his primary method of obtaining information, including user-names and passwords and modem phone numbers.</p>
<p style="text-align: justify;">Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC&#8217;s computer network and copied their software, a crime he was charged with and convicted of in 1988. He was sentenced to 12 months in prison followed by three years of supervised release. Near the end of his supervised release, Mitnick hacked into Pacific Bell voice mail computers. After a warrant was issued for his arrest, Mitnick fled, becoming a fugitive for two and a half years.</p>
<p style="text-align: justify;">According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country&#8217;s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mails.</p>
<p style="text-align: justify;">Since 2000, Mitnick has been a paid security consultant, public speaker and author. He does security consulting for Fortune 500 companies and the FBI, performs penetration testing services for the world&#8217;s largest companies and teaches Social Engineering classes to dozens of companies and government agencies.</p>
<p style="text-align: justify;">[/lgc_column]</p>
<p>The post <a href="https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/">Top 10 of the world&#8217;s most famous hackers</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-10-of-the-worlds-most-famous-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>History timeline of Internet Security</title>
		<link>https://itblogsec.com/a-history-of-internet-security/</link>
					<comments>https://itblogsec.com/a-history-of-internet-security/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 03 Jan 2017 13:25:50 +0000</pubDate>
				<category><![CDATA[Other]]></category>
		<category><![CDATA[history]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=69</guid>

					<description><![CDATA[<p>The Internet grew over several decades to become a huge complex network as we know it today. Since the beginning there were attempts to compromise security and to receive a profit from leaked data. Explore some of the milestones in the development of our insecure online world.</p>
<p>The post <a href="https://itblogsec.com/a-history-of-internet-security/">History timeline of Internet Security</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>History timeline of Internet Security</h2>
<p style="text-align: justify;">The Internet grew over several decades to become a huge complex network as we know it today. Since the beginning there were attempts to compromise security and to receive a profit from leaked data. Explore some of the milestones in the development of our insecure online world.</p>
<blockquote>
<p>We are not makers of history. We are made by history.<br />
Martin Luther King, Jr.</p>
</blockquote>
<p><iframe src="https://cdn.knightlab.com/libs/timeline3/latest/embed/index.html?source=1gvyLCakf9S2URiSGFRywRAbYo6IvBdfc4gdZV1hQ7YI&amp;font=Default&amp;lang=en&amp;initial_zoom=0&amp;height=650" width="100%" height="650" frameborder="0"></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://itblogsec.com/a-history-of-internet-security/">History timeline of Internet Security</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/a-history-of-internet-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/297 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-01 17:12:07 by W3 Total Cache
-->