Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in any of the following activities:

* Vandalism—Destruction or digital defacement of a computer or its data for destruction’s sake. Sometimes this is ego-driven. They break in and leave their mark to show they’ve been there.
* Hacktivism—A form of vandalism or electronic civil disobedience with a political agenda. Usually hacktivists have altruistic motives.
* Theft—Gaining access to intellectual or proprietary technology or information, sometimes for resale.
* Hijacking—Many of the financially motivated hackers are interested in using viruses and Trojan horses to hijack your computer so they can remotely control it for their own purposes.
* Identity theft—Electronic theft of personal information that can be used to steal financial resources from an individual or corporation.
* Terrorism—Some experts believe that terrorists will eventually launch an attack using hacking techniques.

Explore More

Hackers launch phishing attack on Facebook users

We have been written many articles about phishing attack on Websites but Now, Hackers launched an attack on Facebook’s 200 million users on Thursday, successfully gathering passwords from some of

Critical Blind SQL Injection and Persistent XSS Vulnerability in Airmandalay http://www.airmandalay.com

PlanetCreator has reported another Critical Blind SQL Injection and Persistent XSS Vulnerability in Myanmar (Burma) Domestic and International Airline, Myanmar Domestic Flight http://www.airmandalay.com Cross-site scripting (XSS) is a type of

Huge internet bill? Are you a zombie? How does your computer act as zombie?

Zombie or zombie computers are becoming the number one source of all malware and spam attacks. A zombie is a computer attached to the Internet that has been compromised by