tag:blogger.com,1999:blog-37798047.post173324754003837704..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: Top 10 Most Obvious Hacks of All Time (v0.9)David Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-37798047.post-46180683034914846202017-08-09T12:55:53.712-04:002017-08-09T12:55:53.712-04:00I can't tell is genius humor, or Spam.
#AII can't tell is genius humor, or Spam. <br />#AIIasoIThttps://www.blogger.com/profile/13577844587670162334noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-37478588241430796052017-08-05T08:08:24.926-04:002017-08-05T08:08:24.926-04:00If you are in need of a hacker to catch your cheat...If you are in need of a hacker to catch your cheating spouse or increase data base or school grade and many more contact jeajamhacker@gmail.com he is in the right position to help you in any way you need him he has worked for me and believe me he has never disappointed me he is cheap and affordable tell him i <br />referred you to him am sure he will help you.<br />Scott Madorehttps://www.blogger.com/profile/11222283315090566688noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-5027628626809977502017-08-05T02:11:40.939-04:002017-08-05T02:11:40.939-04:00Do you know that you can hack any ATM machine !!!
...Do you know that you can hack any ATM machine !!!<br /><br />We have specially programmed ATM cards that can be used to hack any ATM machine, this ATM cards can be used to withdraw at the ATM or swipe, stores and outlets. We sell this cards to all our customers and interested buyers worldwide, the cards has a daily withdrawal limit of $5000 in ATM and up to $50,000 spending limit in stores. and also if you in need of any other cyber hacking services, we are here for you at any time any day.<br /><br />Here is our price list for ATM cards:<br /><br />BALANCE PRICE<br /><br />$5,000————————$300<br /><br />$10,000 ——————- $650<br /><br />$20,000 ——————- $1,200<br /><br />$35,000 ———————$1,900<br /><br />$50,000 ——————- $2,700<br /><br />$100,000——————- $5,200<br /><br />The price include shipping fees,order now: via email...braeckmansj@outlook.com.... you can also call or whatsapp us with this mobile number..+2348114499350braeckmansjhttps://www.blogger.com/profile/07112128151522906630noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-18393126378649509222017-08-01T14:09:45.894-04:002017-08-01T14:09:45.894-04:00This comment has been removed by the author.Bobhttps://www.blogger.com/profile/07248873171700383596noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-83170262413115887652017-08-01T08:10:21.157-04:002017-08-01T08:10:21.157-04:00Since it appears you are way past the top 10 hacks...Since it appears you are way past the top 10 hacks ;p<br /><br />#)Hacking developers (to hack their users)<br /><br />Description) The recent MeDoc hack/backdoor is an example of this, though there certainly are more. For example ESTsoft was hacked to push a trojaned copy of their software ALZip to SK Communications which turned into one of the largest publicized hacks in South Korean history. That's just the vulnerabilities caused by pushing auto-update software to endpoints. There are other variations. To kill two birds with one example, there is the case of the two warring Juniper backdoors. The first was put in through the intentional use of Dual_EC, and later Juniper's code repositories were compromised and new settings were put into their Dual_EC implementation to allow another attacker to use the backdoor instead. Oh, and then there was the time that the developer of Leftpad broke a thousands of programs by simply removing his code. What would have happened if he had inserted a backdoor instead? Would anyone have caught it?<br /><br />As a security professional these attacks are scary because not only do they fall into the "obvious" category but I have no advice on how to deal with them vs. accept the risk. I'm not going to go through every line of code I run. I think software updates solve way more problems then the above risk introduces. Verifying software hashes when downloading them is one of those pieces of security advice you hear, but in my experience I've never actually seen the people who say it follow up an actually do it. Even if you are verifying hashes, that's such a small slice of the threat model, (attacker modified the software but not the hash on the website), that it is not going to help much.<br /><br />So that's my suggestion to add to your list :) Matt Weirhttps://www.blogger.com/profile/16111343330590419341noreply@blogger.com