Tuesday, 29 October 2013

Three million software users hacked

One of the world’s biggest software companies is suggesting clients to change login details after a hack was exposed. Adobe is used in both offices at on home computers throughout the world and the details of about three million customers have been shared. The banks have been informed to limit credit card deception, expert say the origin of the hack could be some famous software programs will constant at risk for months to come. Tom Nightingale reports that with programs which are file readable, design documents and edit videos, PDF is the most pravelent software used in the worldwide.


Dam (1995) and Granstrand (1999) claimed that software liscen offers public to entitled the rights of legal to use software as long as they are paying the liscesing fee. Yet, most software is permitted instead of given as intellectual property. A software liscene usually is a ban to the computer software which can function on, the amount of software users and also the frequency used as backups. Therefore as an evidence, if we do not know PDF software is affected, but for the purpose of argument - how to express the fact like phising attacks which is uninvited spams and something like that, as long as a readable PDF is send and that is really easy to hack someone.


From my opinion, hacking is a very dangerous act of electronically invasion of someone's computer account or even software. It might be an act of stolen password or peek into someone else's privacy. But still, we can try our best to protect our privacy by creating longer passwords to secure our accounts, make sure there is no one else peeking at the keyboards when we are typing passwords, log out any accounts after using it and even for the best outcome, do not expose our passwords to anyone else.




References list:

Nightingale, T 2013, Three millions software users hacked, Listen To Tuesday's program, ABC News.
Krogh, G and Hippel, E 2003, Special issue on open source software development, Research Policy, Volume 32, Issue 7, pp.1149-1157,
Image source: thehackernews.com

No comments:

Post a Comment