{"id":10473,"date":"2017-11-14T09:45:53","date_gmt":"2017-11-14T17:45:53","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4246\/"},"modified":"2017-11-14T09:45:53","modified_gmt":"2017-11-14T17:45:53","slug":"news-4246","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4246\/","title":{"rendered":"How Hacking Works"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/5a0afc5afc6bb001f993703f\/lede\/1510674138938-HACKING_WEEK.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Lorenzo Franceshi-Bicchierai| Date: Tue, 14 Nov 2017 16:47:44 +0000<\/strong><\/p>\n<p>In popular culture, hacking is often depicted as something almost magical: Hugh Jackman <a href=\"https:\/\/www.youtube.com\/watch?v=u1Ds9CeG-VY\" target=\"_blank\">frantically typing in front of a colorful screen<\/a> of gibberish, or Chris Hemsworth <a href=\"https:\/\/www.youtube.com\/watch?v=h76C1ORQF7Q\" target=\"_blank\">staring into a computer<\/a> with a fancy graphic user interface keylogger, waiting for someone to send over phished credentials. <\/p>\n<p>But reality looks so much different. And it\u2019s fictional accounts such as those that have helped carry on the myth that \u201chacking\u201d is done by shady characters rifling through scrolling screens of ones and zeroes and shouting catchphrases into their screens. <\/p>\n<p>This year, for our second <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/59y4qk\/how-hacking-works\" target=\"_blank\">Hacking Week<\/a>, we want to show you how hacking really works, and what it really looks like\u2014sorry, but there won\u2019t be any visualizations of us flying through the computer\u2019s motherboard, flashing binary code, or countdown clocks. <\/p>\n<p>For the next three days, we\u2019re in Baltimore, Maryland, at the office of the cybersecurity firm Independent Security Evaluators. We\u2019re going to sit down with three of their best security researchers to show you\u2014live\u2014how they hacked into two different routers and what it looks like to hack massively multiplayer online videogames. <\/p>\n<p>By knowing what hacking looks like, we\u2019re hoping to show you how to keep yourself safe online. Perfect security does not exist, and everyone has different needs and this different solutions. But we believe there are basic, easy precautions you and anyone can take to make it harder for the bad guys to get in. That\u2019s why we have updated and expanded the Motherboard Guide To Not Getting Hacked, and have laid it out into Motherboard\u2019s first-ever easily printable PDF.<\/p>\n<p>New to the guide this year is a comprehensive look at how to keep yourself safe from government and state surveillance, as well as updated tips to keep your smartphone secure. Besides that master guide, we\u2019ll also be publishing more specific guides and videos that will change how you think about connecting to random wifi hotspots, as well as a guide to sexting more securely. Just like last year, <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/mg79v4\/hacking-glossary\" target=\"_blank\">we have a glossary<\/a> that can help you understand the hacking jargon. <\/p>\n<p>Welcome to <b> <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/59y4qk\/how-hacking-works\" target=\"_blank\">Hacking Week 2017: How Hacking Works<\/a><\/b>. Be safe out there.<\/p>\n<p><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/59y4qk\/how-hacking-works\" target=\"bwo\" >https:\/\/motherboard.vice.com\/en_us\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/articles\/5a0afc5afc6bb001f993703f\/lede\/1510674138938-HACKING_WEEK.jpeg\"\/><\/p>\n<p><strong>Credit to Author: Lorenzo Franceshi-Bicchierai| Date: Tue, 14 Nov 2017 16:47:44 +0000<\/strong><\/p>\n<p>Motherboard&#8217;s 2017 Hacking Week aims to demystify how the security industry really works.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,13328,10378],"tags":[16621,16622,16620],"class_list":["post-10473","post","type-post","status-publish","format-standard","hentry","category-independent","category-motherboard","category-security","tag-hacking-week","tag-hacking-week-2017","tag-public-service-announcements"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10473"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}