g
Printer Friendly Version

editor  
BellaOnline's Virus and Spam Editor
 

Hacker Attacks and Your Computer

Julian Assange, a computer programmer, always felt strongly about censorship in the media and government. His passion for open information sharing became his obsession and soon he was working as an international activist. Determined to find a way to share covert information with the world, he founded the website WikiLeaks. Initially, the website was open to whomever cared to contribute. On the site, Assange released previously sealed confidential documents and explained through anonymous sources the true stories behind current events.

Gradually, the site drew more and more attention – from those who supported the site and those who found it to be a threat to national security. In recent news, Assange was arrested in Britain to face unrelated charges. In protest to his arrest, WikiLeaks’ supporters hacked a variety of websites that detached themselves from WikiLeaks, either vocally or monetarily, following Assange’s arrest.

Sounds complicated and important doesn’t it?

Most of us know that hackers tend to attack celebrities, large businesses, and important companies, but what about the everyday computer user? What if we aren't making headlines or making millions? Do hackers also target us, sitting at home, doing nothing more important online than paying bills?

The short answer is – absolutely.

Hackers fall into a few different categories, including those who hack because they can – as a way to amuse themselves or impress others. These hackers, sometimes called “kiddy hackers,” do pose a danger to you because they don’t care who they hack – they’re testing their skills. For more deliberate hackers, they may target you because you make it easy for them to get into your system. I decided to ask a hacker what makes a computer attractive to break into and here are a few answers...

How to Attract a Hacker to Your PC

Hackers are not often in the media, but when they are, don’t imagine that you could never fall victim. Remember the basics mentioned in this article, and stay safe.

Virus and Spam Site @ BellaOnline
View This Article in Regular Layout

Content copyright © 2013 by Rayna H. Battle. All rights reserved.
This content was written by Rayna H. Battle. If you wish to use this content in any manner, you need written permission. Contact Rayna H. Battle for details.



| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2014 Minerva WebWorks LLC. All rights reserved.


BellaOnline Editor