For example, the name of your dog or your favorite movie are things that others might know – especially since, with the advent of social networking, a lot of personal information is available about you.
Your password is something that only you should know and not something that someone else could easily find out. Include numbers, uppercase and lowercase letters in your passwords, so instead of "theanswerismars" try "Th3Answer1sM4rs*" Passwords are limited to 50 characters, but you can use a short sentence to create a password that’s difficult to crack.
It can be difficult to create a strong password and remember it easily. Choose a password you can remember so that you don’t have to write it down.
The attacked seems to have been aimed at James Varga, a legendary professional online gamer. Professional gamer James Varga - a direct victim of hackersĪ really popular online game, League of Legends was also taken offline. They simply posted a number of statements which were quickly taken down. In the past they’ve hacked the New York Times and Twitter. This group has been around a while and supports the Syrian government and Bashar Al Assad. Often the owners of the servers don’t even know their hardware has been compromised or is being used as a means to further some form of nefarious digital activity.Īnother hack which almost crept under the radar was an attack on Skype’s Twitter accounts by the so called Syrian Electronic Army. These servers can be used for all sorts of things, from launching attacks or as means for hackers to cover their digital tracks. A hacker in Korea, for example, might want to hack a US bank and could launch the attack via or five or six compromised servers dotted around the world. This is quite a common trick among the hacking community and has been in use a long time. A Russian hacker broke into the server and tried to sell access to others. One of the most common was the hacking of a server belonging to the BBC. But a raft of smaller attacks which followed Target illustrated just how every day hacking is. Perhaps the Target hack, in which 40 million credit/debit card details were stolen, will go down as one of the largest and most damaging of 2013. As we move into 2014, the tail end of 2013 has certainly been a busy period for hackers.