Exploits on Climate Change Emails

Staggering news about hacked e-mail files was ignited at the climate change debate. The argument came upon on how the e-mail messages were given out covertly. The incident was truly a concerning issue about privacy and security of the community.

According to reports, the event happened in Hadley Climate Research Center located in United Kingdom where thousands of e-mail messages were breached. The e-mail and document files that were fortified by the hacker were latterly found posted on the internet. These files were uploaded in Russia via FTP server and are now raising alertness on everyone.

However, it is not yet clear if all the breached files from the prominent research center were genuine but officials announced that some of the posted e-mail messages were certainly hacked from the climate change center. In charge personnel stated that they are conscious and now in alert of the availability of private files in the World Wide Web.

Records showed that the event was not a first timer. The Sarah Palin’s hacked e-mail account was of the same incident which happened at last year’s Presidential campaign. The corresponding circumstances were done by leaking details on the internet.

Even this year, a popular networking site named Twitter was victimized. Some time in January a few personal Twitter accounts was jeopardized.  Fraudulent e-mail messages from Rick Sanchez of CNN were suspiciously leaked. The same occurred last May when a hacker was able to get hold of internal files and important documents of employees’ salary and subsequently posted it on the internet.

Surprisingly, these attacks are not exceptional actions by hackers. Both Palin and Twitter hacks are undoubtedly due to weak security supervision of e-mail providers. It is really sad that the hackers are able to acquire personal usernames and even passwords and use this to break in a private program.

All these compromised actions conclude the importance of the use of encrypted data on all internal servers especially to those that are not intended to be exhibited to the public. It is also a must to improve security regulations of sites to stop unauthorized individuals to access ones private files. Nonetheless, the encrypting of data is the best approach to establish security.

A senior consultant of BT Global Services named Ben Rothke stated that the attacks were thoroughly executed due to weak internet security system and cheap mail storage of most programs.

The occurrence of these events makes us assume and think that there is no privacy on the internet and whatever you do you are still in danger of being exposed unwillingly. In the online world, with million of users using digital storage systems, there is no assurance that your personal data will be safeguarded.

I am not concluding that internet users should not be confident of their chosen programs because you can also help protect yourself from such attacks by having quality passwords and doing security procedures suggested by most sites. With responsible handling of your account from your part and enhanced encryption from the service provider, we can assume better protection. But despite all of these earnest attempts to secure ones privacy, it is a sad truth that hackers are still able to find new ways to exploit us. Just do remember that you are responsible on what you share in your e-mail messages and other social networking sites such as Facebook. It is necessary to be aware of your actions.

Rothke suggested that every organization should not take security lightly. He said that every system and programs should double their security protocols to ensure privacy.

For everyone, it is a must to regularly update your security protocols. It is also better to use encrypted data to double your protection incase your file was compromised. And most importantly never share significant information in your e-mails.

Doing our part is a responsible approach but until internet networks do theirs, we will always be unsure.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.