Logo en.artbmxmagazine.com

Hacker-mate: the war hidden by personal data

Anonim

Computer vulnerability reaches worrying levels, affecting both companies and banks and end users. Hacktivism; the ethical branch of hackers that defends personal liberties. The hidden fight for BIGDATA.

In recent years, the number of computer attacks has increased. A type of virus known as ransomware is already popular. The PandaSecurity website defines: “(…) is malicious software that, by infecting our computer, gives the cybercriminal the ability to block the PC from a remote location and encrypt our files, taking away control of all the information and data stored . To unlock it, the virus launches a pop-up window asking us to pay a ransom. "

This software already has several banks, end users and large companies in the country to its credit. In no case should the 'ransom' be paid. It is better to resort to the support of our antivirus, or failing that, to an expert who can help us solve it.

To prevent this (or another) virus from entering our computer, it is necessary to have an antivirus, update the operating system, activate the firewall, avoid opening rare pages, mails in another language, from unknown senders or that seem strange to us. You should NEVER download an.exe file, unless it is a known file or a secure page. In the event that we need to obtain a new program or complement, it is recommended to download it from the official website of the distributor.

But, our antivirus are not able to detect this?How can viruses infiltrate the computer many times without problems? Although antivirus is necessary, there is no incorruptible system. This is well known in the cyber environment for a long time. So much so that Mark Zuckerberg himself (who hides the camera and microphone of his computers with electrical tape) reaches the point of mistrusting security systems. While it is true that a person in his position is at constant risk of being blackmailed or monitored, an immutable question arises. Can we all be spied on? If so, for what reasons? By whom? Questions that surely most people would never consider asking themselves. The truth is that technology has been advancing over time, and many times we do not know the dimension it reaches in the process. From your hand, for example,Advertising techniques evolved. To the point that, many times, the pages detect our history and use it to offer us products in which we may be interested (the famous Cookies of the web pages). It is an improvement in the sales system, it is able to predict what we want to see, and it saves the time it takes to search for it, many say. Others, however, think that these types of techniques violate the user's freedom by obtaining their data without due permission. This last thought belongs to those people who defend or participate in what is known as Hacktivism.It is an improvement in the sales system, it is able to predict what we want to see, and it saves the time it takes to search for it, many say. Others, however, think that these types of techniques violate the user's freedom by obtaining their data without due permission. This last thought belongs to those people who defend or participate in what is known as Hacktivism.It is an improvement in the sales system, it is able to predict what we want to see, and it saves the time it takes to search for it, many say. Others, however, think that these types of techniques violate the user's freedom by obtaining their data without due permission. This last thought belongs to those people who defend or participate in what is known as Hacktivism.It consists of a 'ramification' of hackers who use their potential as violators of systems in favor of freedoms, environmental, social and political problems. The best known example is the group of hackers Anonymous. Those who have hacked from the website of the US Department of Justice to that of Universal Music Group. He got numerous songs from Sony Music, kicking off the so-called " world cyber war". And they may be right, that the next great world war uses deadly computer attacks instead of nuclear bombs or missiles. Technology is the future, and it is unthinkable that such a powerful and increasingly essential tool should not lead to debate or unrest. The huge amount of stored personal data of ALL people (what is known in computing as BigData) that is on large servers, or simply 'hanging around' on the web is unimaginable. Large companies that possess this data from their users refuse to lose the power that knowing everything about them provides. Have your information.

It is public knowledge, for example, that when deleting content from the internet, it is not disappeared but, in any case, simply 'hidden' from the superficial internet. However, there is a little commented option, Google's “right to be forgotten”. It contemplates the total elimination (as far as can be known with 'total'), of the data of a person in the number one search engine on the internet. If you want to know more about this method, you can enter derechoalolvido.eu where they indicate the way to proceed in these cases. An authentic cyber confrontation is brewing between 'traditional' hackers, hacktivism and large corporations, over the personal data of users. And most of the latter ignores it completely.

Hacker-mate: the war hidden by personal data