ISE1 Learning Journey :D

Saturday, May 15, 2010

Hands-on Project 1-1

Search for videos on RSS




















Tutorial video on RSS found on Youtube




























Screenshot of Security Incite viewed from Google Reader



























Screenshots of the article found on other website
(because i couldn't find any article which i think is related to today's security attack on the given website)












































Source : http://www.sans.org/top-cyber-security-risks/summary.php

-------------------------------------------------------------------------------------------------
Summary

A user may just download a simple programme that seems harmless to the computer, but in actual fact the programme may contain concealing malware like trojan horses. And when the programme is being installed, the trojan horse will scan the computer for information like password or credit card numbers and transmit it to a third party. Therefore causing the user's private information to be leaked out without having the user's acknowledgment.

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home