Skip to main content

Posts

Showing posts with the label Computer

Is it best to charge your mobile battery from empty or half-full?

Is it best to charge your mobile battery from empty or half-full? nickel-based batteries were blighted by the ‘memory effect’, and would lose capacity unless regularly discharged completely. Most phones nowadays have lithium batteries, and these do not suffer from the memory effect. in fact, it is good for them if you top the batteries up rather than deplete them completely. therefore, it’s best to charge your phone from half-full. 

THE TOP 5 BIGGEST HACKS IN RECENT MEMORY

THE TOP 5 BIGGEST HACKS IN RECENT MEMORY MACRON EMAIL LEAK Just 48 hours before the run-off poll between Emmanuel Macron and Marine Le Pen, a 9GB cache of emails from Macron’s En Marche! party was posted on PasteBin, a filesharing platform. They were spread to WikiLeaks. “The attacks were so simple and generic that it could have been practically anyone,” France’s cybersecurity chief said. BANGLADESH BANK HEIST In February 2016, hackers got the login credentials used by Bangladesh Central Bank for the international banking transfer system SWIFT. They tried to transfer $951m to accounts in Sri Lanka and the Philippines. Most transactions were flagged, but $101m was removed. A Trojan known as Dridex was used, which hides in MS Word or Excel attachments. WANNACRY ATTACK On May 12, 2017, a global ransomware attack affected more than 2,30,000 computers, including PCs in the NHS, FedEx and Deutsche Bahn. The malware was leaked from the NSA, and targeted machines running Wi...

TYPES OF HACK

TYPES OF HACK VIRUSES AND WORMS Most malware tends to be either a virus or a worm. The difference comes down to the software’s ability to propagate. Like their biological namesakes, computer viruses require a host body, whereas worms can spread from one machine to the next unaided. DDOS Short for distributed denial of service, a DDOS attack is basic yet effective. It works on the principle that, if a website’s DNS server can be overwhelmed by traffic requests, the site will crash. Hackers run botnets – networks of zombie computers or devices – to besiege a server from multiple fronts simultaneously. TROJANS As its name suggests, a Trojan is a form of malware that sneaks into your computer under an innocuous guise (like an email attachment). Its cargo can be any form of malware. A Trojan’s specific ability is getting in, then leaving a backdoor open for others to follow undetected. RANSOMWARE This subset of malware made the headlines for the WannaCry atta...