What does it mean to be "hacked?" | Arkansas Blog

Friday, April 7, 2017

What does it mean to be "hacked?"

Posted By on Fri, Apr 7, 2017 at 3:16 PM

click to enlarge hacker-1944688_1280.jpg

An Arkansas Representative recently falsely accused the Arkansas Times of "hacking" (some people merely made comments critical of her on her public Facebook page) so we thought we'd take this opportunity to educate and inform. The term gets thrown around a lot, but what exactly is it?

click to enlarge screen_shot_2017-04-07_at_3.04.28_pm.png

Hacking is the breaking-and-entering of the digital world. Your digital “home” may be your bank, your social profile, or your email account. The techniques hackers use are sometimes basic and sometimes astoundingly complex, but understanding either side of it requires some basic knowledge of the internet in general.

Digital vocabulary

One of the most fundamental aspects of the internet is the humble IP address. They typically look something like “192.145.422.12” and act just like your home address. This number is the physical address of your computer. Search Google for, “what’s my IP?” and you’ll immediately be able to see yours.

IP addresses often change, though, and aren’t always a reliable way of accessing another server or computer. We needed a system which would allow us to remember friendly names like “Facebook.com” instead of a long series of numbers. These friendly names are called domain names.

Domain names are what we typically type into the address bar. Google.com, Facebook.com, Youtube.com – all domain names. The end result, however, needs to be an IP address because that’s the actual, physical address of the computer or server you’re trying to access.

The Domain Name System (DNS) provides the solution. When you type and submit a domain name, it gets sent to your local DNS server where it’s used to look up the correct and corresponding IP address. “ArkTimes.com” is much easier to remember than “”

Your browser is the piece of software you’re using at the moment to read this article. Internet Explorer, Firefox, Chrome, and Safari are all browsers made by different companies, but they all do the same thing: connect to an IP address, download files, and display them.

Types of hacking

Brute Force
This one’s simple. Think of brute force hacking like someone going shoulder-first into your front door over and over until it gives. Using computers, hackers are able to automate the guessing of passwords and simple ones can be solved in minutes. The longer your password, the harder it is for a computer to “crack” it. A good password will read more like a sentence, which is why the term "passphrase" is becoming more common. An example: Several100%FloatingBoats – it would take a computer trying 1000 times per second over 500 years to crack that passphrase.

Avoid brute force attacks by changing your password often and keeping your passphrase long and complicated. Using passwords that read more like sentences will help you remember them.

Distributed Denial of Service
Also known as DDOS, these attacks are typically run against large-scale organizations or platforms. Imagine two people having a pleasant conversation…now imagine hundreds of very loud and obnoxious strangers running up and yelling in their faces. There’s no way a conversation could take place. This is what happens during a DDOS attack. A hacker (or group of hackers) targets a service like Xbox Live or Netflix and sends an immense flood of web traffic to their servers, which slows down and often cripples the platform. The Rio Olympics site sustained months of DDOS attacks last year.

The term botnet refers to a network of hacked computers that are able to be called into action by their hacker masters. If you’re on Windows XP and don’t run anti-virus software, your computer is probably part of a botnet. Hackers use these botnets in DDOS attacks so be sure and keep your computer free from malware and viruses.

As the name implies, hackers are baiting hooks and casting wide nets in hopes of getting bank account info or even social accounts. The scam typically starts with the hackers creating a fake login page for a popular service. They’ll make this login page look identical to the original. Since the hacker doesn’t have access to put their fake login page on the actual domain name, they must get creative. In 2010, hackers targeted MySpace by using the domain name rnyspace.com – note that in lowercase it looks correct, but in all caps it is RNYspace.com. They are counting on people not being able to tell the difference.

Phishing emails will typically ask for info that no real company would ask for via email. You’ll see attempts at urgency (“your account will close in 24 hours if you don’t do this!”) and confusion (“$5,000 was just withdrawn from your bank account”). These are attempts to shake your rationality and wits so you give the hackers your username and password voluntarily.

It’s always advised to use a separate password per account. This way, if you do get phished, the hackers will only have access to that one service and can’t simply use your one password across other accounts.

Social Engineering
If you know enough about someone and have some charisma, it’s a frustratingly simple process to navigate their various accounts. Hackers using social engineering will learn as much as possible about you via your public information and then simply call your bank claiming to be you. By guessing some security questions and being nice to the customer service rep, they’re able to gain access to your accounts without even touching a computer.

Due diligence on the web

Here are some tips to help keep your digital life secure:
  1. Use longer passphrases.
  2. Modify your passphrase for each service you use (never have the same password).
  3. Consider a password keeper like DashLane or 1Password.
  4. Keep your PC free from viruses and malware.
  5. Never click a link from an email unless you’re 100 percent clear on where it will take you.
  6. Look at your address bar and make sure the domain matches what you’re viewing.
  7. Don’t give your personal info to customer service reps making in-bound calls.
  8. If it’s too good to be true, it’s probably not real.
  9. Ignore offers of money via email.
  10. Use two-factor authentication.
Online security starts with knowledge and education. We’ve all heard someone say, “well I’m not good with computers,” but these days that’s like saying you can’t read and write.

Computers and the internet are now an integral part of our society and protecting your identity online is more important than ever. Change your passwords, stay vigilant and sprinkle a healthy dose of distrust on anyone wanting access to your accounts.

Tags: , , , ,


Comments (14)

Showing 1-14 of 14


Comments are closed.

More by Jordan Little

  • Rock the Culture podcast is back for its second season with 'Almost Viral'

    Antwan and Charles provide perspective and conversation on the Murphy Arts District Music Festival, Rogerick Talley’s allegations that he was framed by LRPD, and the lawsuit to suspend the expansion of Interstate 630. They also discuss the impact of the death penalty with Furonda Brasfield, the Executive Director of the Arkansas Coalition to Abolish the Death Penalty.
    • Jul 24, 2018
  • 'The Conversation' with Baker Kurrus

    In this week's episode of "The Conversation," host Matt Price interviews Little Rock Mayoral candidate Baker Kurrus. Kurrus talks about his views on the I-30 expansion and why projects like Woodland's Edge are what Little Rock needs more of.
    • Jul 13, 2018
  • 'The Conversation' with Senator Joyce Elliott

    In this latest episode of "The Conversation," host Matt Price interviews State Senator Joyce Elliott. Price and Elliott discuss how the Little Rock School District has become what it currently is. Elliott talks about how she got into teaching. Learn why separating our children is a mistake.
    • Jun 25, 2018
  • More »

Readers also liked…

  • Your daily dose of Jason Rapert

    Sen. Jason Rapert really, really didn't like it when a KATV reporter asked him about the hypocrisy of his political arguments.
    • Feb 4, 2017
  • LR Police Chief Buckner in running for Charleston, S.C. job

    KATV reports that Little Rock Police Chief Kenton Buckner is one of five finalists for the job of police chief in Charleston, S.C., and will be visit Charleston next week as part of the process.
    • Feb 2, 2018
  • Tom Cotton's influence on Trump's new security chief

    U.S. Sen. Tom Cotton is getting credit for pushing President Donald Trump to select Lt. Gen. H.R. McMaster as his national security adviser, Politico reports.
    • Feb 21, 2017


Most Viewed

  • Bryant High School band withdraws from French Hill campaign rally

    The Bryant High School Band has withdrawn from a planned appearance at a campaign rally Friday for Republican U.S. Rep. French Hill after learning it was a political event.
  • State recommends denial of new permit for C and H Hog Farm

    The Arkansas Department of Environmental Quality has recommended denial of a new permit for discharge of waste by the C and H Hog Farm in Newton County.
  • Unsealed court documents include kickback accusation against former state Rep. Tim Summers; Summers says "Jon Woods is a proven liar"

    The more than 500 pages of court filings recently unsealed by Federal Judge Timothy Brooks in the federal corruption case against former state Sen. Jon Woods include notes from a 2017 meeting between former state Rep. Micah Neal and federal investigators. According to these notes, Neal described what appears to be an accusation by Woods that state. Rep. Tim Summers, then a lobbyist, took kickbacks in exchange for helping to get GIF money for an affiliate of Preferred Family Healthcare where Summers worked on staff.
  • The New Yorker profiles Sarah Huckabee Sanders

    Paige Williams, profiling Sarah Huckabee Sanders in the current New Yorker, describes the pugilistic Sanders as "Trump's battering ram." Bottom line: As defensive as ever.
  • Jared Henderson outlines health goals

    Jared Henderson, the Democratic candidate for governor, has released a list of ideas to improve access to health care and reduce costs, leading with an end to the computer work reporting requirement for participation in the expanded Medicaid program. "Our focus needs to be ensuring that Medicaid funds are spent appropriately and effectively, not making it harder for citizens that need coverage to get it," he said.

Most Recent Comments


© 2018 Arkansas Times | 201 East Markham, Suite 200, Little Rock, AR 72201
Powered by Foundation