Hackers in action
This video shows hackers probing areas of Fermilab's computing network in search of vulnerabilities.
Most of us operate a computer daily without thinking about its vulnerabilities or the hackers waiting to exploit them.
For computer security experts such as Joe Klemencic, vulnerabilities and hackers are often all they focus on.
The above linked video, sent in by Klemencic, computer security coordinator, shows a recorded snippet of a two-minute capture of hacker activity.
In the looped video, each bubble represents a hacker probing the network for potential vulnerabilities.
"This goes on all day and all night," Klemencic said. "Traffic similar to this hits our networks all the time."
Thankfully, the traffic visible in this video is of probes to darknets, areas of the network with no machines "living" on them. Computer security experts use darknets to watch the hacker activity to detect trends or unusual activity.
The upper left portion of the video shows a standard scan. The activity on the lower left of the screen shows an outside node that is fiercely probing the network. The video also shows the probes in color. Those showing up in red and black are new hackers starting to scan the networks.
The frightening thing, Klemencic said, is that the same sort of activity happens anywhere, including when you connect to the Internet from home.
"You connect and you get swarmed," he said. "Each one of these is an opportunity for exploitation."
-- Rhianna Wisniewski