Skip to main content

One of the dangerous hackers for the world comes from Indonesia

 Salah Satu Hacker Yang Berbahaya Bagi Dunia Berasal Dari Indonesia




Seperti yang telah ditayangkan oleh kanal Youtube Calon Sarjana, Rabu (17/05/2019), berikut top 5 hacker paling berbahaya di dunia:


1.   Jonathan James

Pada usia 15 tahun, James melakukan peretasan untuk modernisasi sekolahnya di Florida. Kemudian, ia sempat menjebol situs Departemen Pertahanan milik AS dan juga membobol perangkat lunak (software) yang dimiliki NASA senilai US$25 miliar. Software tersebut ia gunakan untuk mengontrol satelit di seluruh dunia.

Setelah aksinya tersebut, dia harus rela ditangkap oleh pihak kepolisian setempat dan mendapat hukuman penjara rumah 6 bulan. Usai bebas, ia juga dilarang untuk berinteraksi dengan komputer hingga usianya menginjak 18 tahun. Sayangnya, pada 18 Mei 2008 ia bunuh diri karena merasa selalu diikuti dan diawasi oleh pemerintah AS.

2. Edward Majerczyk

Dunia sempat dihebohkan oleh bocornya foto telanjang artis internasional di Internet. Hal tersebut ternyata adalah ulah Edward. Salah satu foto yang viral saat itu adalah foto milik Jennifer Lawrence. Saat ditanya oleh pihak kepolisian, dia beralasan foto-foto tersebut ia gunakan untuk koleksi pribadi. Tetapi, karena keisengannya tersebut, dia harus rela mendekam di penjara 9 bulan.

3. Gary Mckinnon

Hacker asal Inggris merupakan peretas paling berbahaya. Pasalnya, ia mampu meretas 97 sistem militer dan pertahanan Amerika Serikat dalam waktu yang singkat, yakni 13 bulan. Tak hanya itu, ia juga meretas komputer milik Pentagon dan NASA serta mematikan dua ribu komputer di suatu perusahaan terkenal.

4. Anonymous

Anonymous merupakan kelompok hacker yang dibentuk pada 2003 dan mempunyai ciri khas menggunakan topeng. Anonymous menentang sensor yang dilakukan oleh pemerintah. Selain itu, ia juga menolak perbatasan internet yang diatur pemerintah.  Hebatnya, Majalah Times memasukkan hacker ini sebagai orang paling berpengaruh di dunia karena tindakannya memerangi tindakan kelompok teroris ISIS.

5. Jim Geovedi

Hacker asal Indonesia ini terkenal setelah meretas dan mengubah arah dua buah satelit milik Indonesia dan satu buah satelit milik China. Dia melakukan tersebut karena ingin melihat kekurangan satelit. Bahkan, kepada dunia ia mengaku bisa mengendalikan jaringan internet di Indonesia dan memodifikasi semua transaksi keuangan. Tetapi, dia enggan untuk melakukannya


Berita selengkapnya dapat anda lihat di Lnk berikut ini: 

https://m.solopos.com/5-hacker-paling-berbahaya-di-dunia-salah-satunya-dari-indonesia-1027612


Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

BOT attacks: a growing threat on the Internet

Bot attacks , the malicious and damaging use of automated computer programs known as bots (or BOTS), have become a growing concern and a pervasive reality in the modern digital landscape. BOTS, or software robots, are automated programs originally designed to perform tasks on the Internet without human intervention. Unfortunately, hackers have also managed to turn them into a hacking technique, created with malicious intent, to manipulate, defraud or disrupt a site, application, API or users, potentially causing enormous damage to businesses and users, compromising the security of systems and data. To carry out their BOTS attacks, the majority of hackers use software called botkits, which are freely available online and sold on the Dark Web. Vendors of this type of software also offer paid services to carry out BOT attacks, including software to power DDoS attacks. BOT attacks include, but are not limited to,  Email Spam , which is used to send spam emails containing malicious software