Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in any of the following activities:

* Vandalism—Destruction or digital defacement of a computer or its data for destruction’s sake. Sometimes this is ego-driven. They break in and leave their mark to show they’ve been there.
* Hacktivism—A form of vandalism or electronic civil disobedience with a political agenda. Usually hacktivists have altruistic motives.
* Theft—Gaining access to intellectual or proprietary technology or information, sometimes for resale.
* Hijacking—Many of the financially motivated hackers are interested in using viruses and Trojan horses to hijack your computer so they can remotely control it for their own purposes.
* Identity theft—Electronic theft of personal information that can be used to steal financial resources from an individual or corporation.
* Terrorism—Some experts believe that terrorists will eventually launch an attack using hacking techniques.

Explore More

Critical SQL Injection in mail4U is a production of Bagan Cybertech

PlanetCreator has reported another critical SQL Injection (vulnerability) on mail4U is a production of Bagan Cybertech http://www.mail4u.com.mm/ SQL injection is a code injection technique that exploits a security vulnerability occurring

critical XSS Vulnerability on Yatanarpon VOIP http://voip.yatanarpon.com.mm

PlanetCreator has reported another critical XSS Vulnerability on Yatanarpon VOIP http://voip.yatanarpon.com.mm This vulnerability has been informed to :- webmaster Cross-site scripting (XSS) is a type of computer security vulnerability typically

Sony Rootkits your computer

SONY ROOTKITS SYSTEMS when you put a CD in to play it, a prospect that is both disturbing and scary at the same time. If you thought the record companies