Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

HACKING 2019 Baltimore ransomware attack

On May 7th 2019, most of Baltimore's government computer systems were infected with a
new and aggressive ransomware variant named RobbinHood. All servers, with the exception
of essential services, were taken offline. In a ransom note, hackers demanded 13 bitcoin
(roughly $76,280) in exchange for keys to restore access. The note also stated that if the
demands were not met within 4 days, the price would increase and within 10 days the city
would permanently lose all of the data.

Virus dissemination
It is a process of a Malicious software that attaches to other software that
destroys the system of the victim. They disrupt the computer operation and
affect the data store by modifying or deleting it. ... A virus and a worm are
similar as a both are the forms of malicious software.

Computer vandalism is a process wherein there is a program that


performs malicious function such as extracting a user's password
or other data or erasing the hard disk

Cyberterrorism is the use of the Internet to conduct violent acts


that result in, or threaten, loss of life or significant bodily harm, in
order to achieve political or ideological gains through threat or
intimidation.

(DoS attack)

is a cyber-attack in which the perpetrator seeks to make a machine or network


resource unavailable to its intended users by temporarily or indefinitely
disrupting services of a host connected to the Internet. Denial of service is typically
accomplished by flooding the targeted machine or resource with superfluous
requests in an attempt to overload systems and prevent some or all legitimate
requests from being fulfilled.

Software piracy
Updated: 02/02/2019 by Computer Hope
A term used to describe the act of illegally
using, copying or distributing software
without ownership or legal rights. The
majority of software today is purchased as
a single-user license, meaning that only
one computer may have that software
installed on it at one time. Copying that
software to multiple computers or sharing
it with your friend without multiple licenses
is considered software piracy, which is
illegal.

Uber concealed massive hack


that exposed data of 57m users
and drivers
This article is more than 1 year old

 Firm paid hackers $100,000 to delete data and keep breach quiet
 Chief security officer Joe Sullivan fired for concealing October 2016
breach

Julia Carrie Wong in San Francisco

@juliacarriew

Email
Wed 22 Nov 2017 11.16 GMTFirst published on Tue 21 Nov 2017 22.53 GMT



Shares
2785

Uber’s CEO, Dara Khosrowshahi, said: ‘None of this should have


happened, and I will not make excuses for it.’ Photograph: Andrew
Caballero-Reynolds/AFP/Getty Images

Uber concealed a massive global breach of the personal information of 57


million customers and drivers in October 2016, failing to notify the individuals
and regulators, the company acknowledged on Tuesday.

Uber also confirmed it had paid the hackers responsible $100,000 to delete
the data and keep the breach quiet, which was first reported by Bloomberg.

“None of this should have happened, and I will not make excuses for it,”
Uber’s chief executive, Dara Khosrowshahi, said in a statementacknowledging
the breach and cover-up. “While I can’t erase the past, I can commit on behalf
of every Uber employee that we will learn from our mistakes.”

Not all people are victims to cyber crimes, they are still at risk. Crimes by
computer vary, and they don’t always occur behind the computer, but they
executed by computer. The hacker’s identity is ranged between 12 years
young to 67years old. The hacker could live three continents away from its
victim, and they wouldn’t even know they were being hacked. Crimes done
behind the computer are the 21st century’s problem. With the technology
increasing, criminals don’t have to rob banks, nor do they have to be outside
in order to commit any crime. They have everything they need on their lap.
Their weapons aren’t guns anymore; they attack with mouse cursors and
passwords.

You might also like