أخبار خاصة

No solutions with tech hackers: be careful

In an interview conducted by the newspaper with the social media expert and the head of the Arab Song Production Company, to ask some questions after the problems experienced by many accounts on the Instagram website.
At the beginning of the interview, Chhadeh mentioned the warning that he had issued in a previous interview, in which he explained the mechanism of applications in the permanent update, explaining that the mechanism is parallel, as hackers work at the same time to discover software vulnerabilities in the update and this process does not end.
Chhadeh explained in his answer to our question about what happened and why so many people, “most of them artists,” lost their accounts within days:
The methods of “hackers” can only be distinguished, as applications protect their users greatly, forcing them to develop smart methods to detect vulnerabilities that programmers did not notice; this time, the Instagram update was a big one, and the company worked to ensure the truth of each person greatly. This interest in checking the personality and protecting the information of its users made the traditional methods of hacking near impossible. Until now, it is difficult to say that the Instagram system is easy to hack or can be hacked; but things do not go in this way. There are always those who work in the opposite way to achieve their goals and not discover the loopholes in the application or discover them with great difficulty. The “hackers” think in a faster and easier way, and so they invented a method that may be described as non-traditional, or to be more precise, it is a method that uses the traditional in unconventional ways. After the beginning of the authentication process for any social networking site, the site begins with personality verification and the first stage is to verify the account by sending messages and options to the e-mail. Here and at this stage, the hackers succeeded in programming a fake message that appears to the account holder asking him the “e-mail”. When entering the e-mail, the account has already been hacked. What distinguishes this method is that it does not arouse any doubt, as the site itself sends a similar message almost 100 percent and asks for e-mail.
– Mr. Chhadeh, is it possible to separate the two messages, and what is the best way to protect the account from this trick?
The issue here will be difficult to judge. The two messages are very similar, and for every change made by the company, “hackers” are met with a similar standard in minutes, as I explained previously. It is better for people to seek the assistance of social media experts, as often determining the difference between the two messages is based on software factors that can only be discovered through. As for the best way to protect the account, there is no doubt that it is trust. The trust between the account holder and his advisor on social networking sites, this trust is the only one that will authorize the specialist to carry out the process of documenting the account, which has become “dangerous” in light of the development of hacking methods. Of course, the specialist may also make mistakes, but specialists are often able to correct the error within a period of time not exceeding 60 seconds, which is the time needed by the hacker to gain control of the account and take its content.
– Finally, Mr. Chhadeh, will we witness stability soon and the end of electronic problems?
This principle can never be said. It is a development that will never stop. Programs and applications seek to improve their documentation, and with each new one, we are surprised by a slip that disturbs the new development, and so on, as I said previously, the trust between the account holder and his advisor on social networking sites alleviates many of the problems.

الوسوم
اظهر المزيد

مقالات ذات صلة

اترك تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

زر الذهاب إلى الأعلى
إغلاق
google-site-verification: google3b1f217d5975dd49.html