Skip to main content

Posts

Showing posts from October, 2017

Shop Safely in this FestiveSeason

Online shopping: It is also known as e-shopping in which the purchases made online either by computers or SmartPhones. You can shop online with or without full authentication . E-shopping or online shopping or e-store are all virtual types of stores which allow customers to buy products or services over the internet. It is convenient for the people to shop online without spending their valuable time in markets. But There is risk in ordering things online as Information about user’s activity on the Web is being recorded and there will be privacy losses. Many users are not aware about it. Web users leave a “data shadow” with information about what they read, where they shop, what they buy, whom they correspond with and so on. Mantras to shop online safely: Before Placing An Order Carefully read the terms and conditions, including the small print. These terms and conditions should be available on the merchant’s website. Check t...

"cellphones security"

Mobile Securit y Mobile security has become increasingly important as more & more users & business use smartphones to communicate. But smartphones collect & compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the users. All smartphones,as computers,can be the target of attacks. It can be done by SMS,MMS,Blueto oth & GSM. 3 main targets for attackers:- Data : smartphones are devices for data management, and may contain sensitive data like credit card numbers, authentication information, private information, activity logs (calendar, call logs)  Identity: smartphones are highly customizable, so the device or its contents can easily be associated with a specific person. Availability:  A ttacking a smartphone can limit access to it and deprive the owner of its use. Main Sources:- Professionals, whether commercial or military, who focus on the three targets mentioned above...

"CyberBullying- Cyber Harassment"

Cyberbullying is a kind of cyber harassment using electronic forms of contact. It is increasing day by day, especially among teenagers. It can include posting rumors about a person, threats , sexual remarks, disclose victim's personal information, or hate speech. It can increase suicidal ideation, and a variety of of emotional responses like being scared, frustrated, angry or depressed, among the victim. It has reported that cyberbullying can be more harmful than traditional bullying. Common Forms of Cyberbullying: 1 .Cyberstalking:- It is a form of online harassment in which prepetrator uses electronic communication to stalk a victim. 2. Internet Trolling:- It includes the intentionally try to provoke or offend others in order to elicit a reaction. A troll may be disrupt either for their own amusement or because they are genuinely a combative person. Preventive Measures:- For kids: If someone bullies you, remember that your reaction is us...

Banking Tips: Safe Usage of ATM, Debit Card, Credit Card and Net Banking

An Unethical Hacker/Cracker/Cyber Criminal has many ways to gather a credit card number from an Victim. The most common one is known as phishing, Desktop Phishing, Tab Napping. Ex: – www.paypala.com Instead of www.paypal.com or onlinesbl.com instead of onlinesbi.com or lcalab.com instead of icalab.com [Always check URL before login in any Online Bank account]. HOW A CRIMINAL USES PHISHING METHOD In this technique, the hacker poses as an officer within an organization, let’s say Visa. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime. Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let’s say, Snap de...

India’s Perspective: Need of Ethical Hacker’s in India

The word hacker has always been associated with a negative meaning.  In actual “hacker’' is someone who can build stuff and solve real-life problems.   It’s essential to get highlighted with difference between a hacker and a cracke r ; a cracker is someone who is adept in security breaking whereas a hacker is someone expert in preventing such incidents. With the rapid spread out of cyber-crime it has become difficult for companies to protect their critical data and security systems from the external threats coming in from the web. These companies are unaware to cope with this crime or don’t have a cyber-incident response plan ready with them. Companies and start-up ventures in India are not exposed or rather vulnerable to cyber-attacks or crimes. They must be aware and need strong security measures to safeguard their business with safety plug-ins. ETHICAL HACKING An ethical hacking has becoming a valued skill in India.... For more click here.. ...

'Cyber World' - Common Attacks

Some Common Terms in cyber world: 1.Hacking: Hacking recognizes weaknesses in PC frameworks or systems to misuse its weaknesses to obtain entrance. Example of Hacking: Using password cracking algorithm to gain access to a system. A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. The following list classified hackers according to their intent: 1._Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. 2._Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. 3._Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weakn...