THE DARK SIDE OF THE DIGITAL WORLD, DOXING!

Doxing, in simple terms, means the malicious publication of personal information or files about a person. In most cases of doxing, the goal is to intimidate the person or to direct others to intimidate the target
. Mat Honan, a technology writer, defin! the term dox as a “revenge tactic.” Mat Honan is a writer who was personally attack! by hackers and then proactively encourag! the victims to take steps to protect their online identities. Hackers operating illegally use doxing as a tool to expose the private information of the people they target to legal sanctions. Honan’s victimization is as follows; First, hackers took control of Honan’s Google, Twitter, Amazon and Apple accounts by taking advantage of

The gaps in Apple and Amazon’s security policies

 

They then took control of his personal qatar whatsapp number data 5 million computer and delet! all the documents, emails and photos he had taken since his daughter was born. As can be seen from this true story, doxing can cause a lot of damage. So doxing can often be us! for revenge purposes, to violate people’s privacy. It can also reveal records of information that a person has post! and delet! long ago and that cannot be reveal!, and this information can be reveal! in an unexpect! way.

A person who does doxing first acts to obtain

 

the other person’s personal information. Bas! rules for effective partnership in the legal profession on the fact that people can share information such as age, phone, e- alb directory mail, and photo publicly on the internet, whether they realize it or not, accessing this information can be easily accessible information in the first place. Attackers do not access the private information of the target people by using only their public information. One of the methods us! for this purpose is Doxware. So, what is Doxware? In

short, it is a blackmail virus. Doxware emerges as a result of the combination of ransomware and Doxing. Doxware is a cryptovirology attack and is different from other ransomware attacks. For example, a typical ransomware encrypts your personal files and data and demands that you pay to decrypt the password. In this case, the victim’s ability to regain control of their data and disclose it is under the control of the computer virus. In a Doxware attack, the attacker steals the victim’s data and threatens the person by publishing the data in his possession. Of course, he demands payment in.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top