InfoCarnivore.com is your premier infographic website and directory. Browse high-quality infographics and instructographics and submit your own for inclusion.
Posts tagged "hack"
Why would anyone want to hack my car?

Why would anyone want to hack my car?

car hacking, hack, target, cars, autoYour car could well be the next target for hackers... or is it? Why would anyone want to hack your car anyway? This past summer has seen numerous articles on the new threat of car hacking "the crime of the future"... The threat is simple, someone doesn't like...
ATM Biometrics Coming to a Corner Store Near You!

ATM Biometrics Coming to a Corner Store Near You!

“Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years,” But what's happening now is Global Rainmakers Inc. (GRI), based out of New York City, has announced that it will use iris scanning technology to begin creating what it claims will be “the most secure city...

Passwords: Brute Force Attack on You

We've previously discussed guess attacks and dictionary attacks on your passwords. And we've determined now that password security is of the utmost importance. Just today I repaired a machine for a customer and their Vista login password was an old phone number of theirs. Seven digits that could easily be found with...

Passwords: Dictionary Attacks

dictionary attack password hack guess passwordHackers may already know your password. In a previous post, I wrote about guess attacks by hackers on your password. In this brief post I'm going to write about another method that an attacker could use to get your password. So by now, you've already made the...

Short history on hacking [infographic]

A short history on hacking. Hacking has been around as long as computers as a way to reconfigure or reprogram a system. [infographic].

The tricks hackers use, and what you can do to foil them.

Some hackers claim they can teach a monkey how to hack in a couple of hours. We asked two hackers, Syke and Optyx (at their request, we are using their hacking pseudonyms rather than their real names), to give us non-simian reporters a demonstration. What we got was a sometimes-frightening view of how easily nearly anyone's...