Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Networking

    Things Not to Do When Job Hunting

    By
    Fahmida Y. Rashid
    -
    October 19, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Things Not to Do When Job Hunting

      1

      Wrote a Word macro virus that printed out his resume and demanded a job or he would write another malware to delete hard drives.Michael Buen, the author of the WM97/Michael-B Word macro virus, printed out his resume on Fridays towards the end of the month in infected documents. “Warning: If I don’t get a stable job by the end of the month I will release a third virus that will remove all folders in the Primary Hard Disk,” Buen warned. There was no applicable law to prosecute Buen at the time, according to the Philippines Supreme court.

      2The Importance of Not Reusing Emails

      2

      Government authorities took years to track down a hacker who attacked Department of Defense computers. He was arrested after an email address used during the attack showed up in a resume posted on online job boards.Eduard Lucian Mandru’s 2006 hack of the U.S. Department of Defense computer system went unsolved for years. Authorities knew the attacker’s email address and came across it three years ago on a r??«sum??« that he’d posted on numerous job boards online.

      3Hospital Audits Catch Snoopy Insiders

      3

      It seems that medical professionals cant resist looking up the case files of celebrity patients even if they dont have any need to access the information. Its easy to understand why star-struck hospital personnel cant resist looking up celebrity medical files. But these days even peeking can cost health workers their jobs. In recent years there have been egregious cases where celebrity patient data, perhaps most intimate of all personal information, have been lifted from hospital files and leaked to the tabloid media, presumably with money changing hands. Today, there are laws and regulations banning this kind of snooping. Modern computer systems generate audit trails so hospitals can comply with privacy laws. So hospital administrators along with law enforcement agencies and celebrity lawyers can find out who has been peeking at and even stealing patient information.

      4Kelly Osbornes -Celebrity Hacker’

      4

      A hacker broke into Kelly Osbornes email account and forwarded new messages to personal account.An individual hacked into Kelly Osborne’s email account to read all her saved messages. The account was modified to forward new messages to another account, which turned out to be the hacker’s personal account. “This seemed like a pretty easy trail to follow,” said Alan Wlasuk, CEO of 403 Web Security.

      5License Plates Can Be Traced

      5

      A hacker infected MySpace accounts, bragged about the exploit online and posted pictures of himself with his car’s license plate in the background.Samy Kamkar was responsible for the Samy Worm that infected more than 1 million MySpace accounts in 2006. He boasted what he did on a blog, which contained a picture of him with a license plate in the background, which was then used to find Samy.

      6Dont Use Your Name

      6

      A hacktivist defaced a government site and signed his real name.A group of hacktivists that included one Shahee Mirza defaced a Bangladesh government military Website, mocking the government for weak security practices. “HACKERS R NOT CRIMINAL,” Mirza wrote, adding, “WE ARE GINIOUS.” He also left a banner HACKED BY SHAHEE_MIRZA.” “One can only imagine what the prisons are like in one of the poorest countries in the world,” said Alan Wlasuk, CEO of 403 Web Security.

      7Benevolent Worms Can Still Have Teeth

      7

      A hacker released a worm that would download and patch vulnerable BIND DNS servers. The worm also contained a stealthy backdoor to give remote control and access of the infected system.Max Butler wrote and released a Linux ADM worm variant that attacked BIND DNS servers, downloaded and applied a patch to fix BIND vulnerabilities. The worm also maintained a stealthy backdoor that gave Butler or any other hacker in the know remote access and control of the systems. Butler claimed he never intended to use the backdoor.

      8Na???ve Hackers Will Get Caught

      8

      Newbies and enthusiastic activists didn’t realize the Low Orbit Ion Cannon tool used by Anonymous to launch distributed denial of services attacks didn’t mask user IP addresses, making them easier to find.The Low Orbit Ion Cannon allowed users to form a voluntary botnet to launch distributed denial of service attacks against companies severing times with WikiLeaks. The tool did not conceal the user IP address. “Hackers broke the No. 1 rule of attack: Wear a mask,” said Imperva’s Noa Bar Yosef.

      9Smile, You Are on Camera!

      9

      A man steals an iPhone, takes a photo of himself and sends it to his personal email account allowing the police to find and arrest the suspect.After Sayaka Fukuda had her iPhone stolen, she checked her iPhone email account online. The suspect, Daquan Mathis, had taken a picture of himself and sent it to his personal address, leaving the information behind in the sent-mail folder. Police used his email address and photo to track Mathis down and arrest him.

      10Dumb or Clever?

      10

      Hacker uses a speed trap camera image to trick computers into wiping out database table.Some speed traps use cameras that automatically register the car’s speed and take a picture of the license plate. The camera’s character recognition technology translates the license plate image into a string that can be looked up in the department of motor vehicles database. The hacker changed his license plate number to ZU 0666, which was translated to a drop database table command. While the license plate number itself may have made it easy to track down the hacker, “this has got to be 10 out of 10 on the creativity scale,” said Alan Wlasuk, CEO of 403 Web Security.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.