Posts

Showing posts from February, 2018

Google removes "view image" button from search results to make pics harder to steal.

Image
Google is making a change to image search today that sounds small but will have a big impact: it’s removing the “view image” button that appeared when you clicked on a picture, which allowed you to open the image alone. The button was extremely useful for users, since when you’re searching for a picture, there’s a very good chance that you want to take it and use it for something. Now, you’ll have to take additional steps to save an image. The change is essentially meant to frustrate users. Google has long been under fire from photographers and publishers who felt that image search allowed people to steal their pictures, and the removal of the view image button is one of many changes being made in response. A deal to show copyright information and improve attribution of Getty photos was announced last week and included these changes. The intention seems to be either stopping people from taking an image altogether or driving them through to the website where the ima

Olympic organizers hit with hack during opening ceremony.

Image
The 2018 Winter Olympics opening ceremony was an opportunity for athletes around the world to proudly wave their nation's flag and welcome the start of a time-honored tradition of peaceful competition. Oh, and it was also a chance for another highly skilled subset of the planet's population to strut their stuff — specifically, hackers.  According to the South Korean news agency Yonhap News, servers belonging to Olympic organizers were hacked during this year's Feb. 9 opening ceremony. As a result, the TVs at the main press center are said to have malfunctioned.  What's more, in response to the attack, organizers briefly shut down their own servers — temporarily knocking the Pyeongchang 2018 website offline in the process.  At present, not much is known about the individual or individuals behind the attack. However, that the Olympics and related organizations are a prime target for hackers is nothing new. In 2016, the World Anti-Doping Agency admitted to

What are the cyber security challenges in India?

The threat of terrorism has posed an immense challenge in the post Cold War period. Terror attacks in major cities, towns and tourist resorts across the globe have demonstrated the inadequacy of the State mechanisms to address this challenge. Serious attempts have been made by Nations to address this challenge by designing counter terrorism strategies and anti terror mechanisms. However, most of there are designed in a conventional paradigm, which might be effective in a conventional terror attack. However, there are limitations when it comes to a terror attack of an unconventional nature. Information technology (IT) has  exposed the user to a huge data bank of information regarding everything and anything. However, it has also added a new dimension to terrorism. Recent reports suggest that the terrorist is also getting equipped to utilize cyber space to carryout            terrorist attacks.The possibility  of such attacks in future cannot            be denied. Terrorism related to

What is the best free way to protect PC from virus and malwares?

There are 2 ways malware can be implanted in your system: External Media Internet So to protect ourself we have to cover these two aspects. For further explanation you must know this. There are two kind malwares: Zero Day Malware - The one which are made within the last 24 hour time span. Old One (These are easy to tackle.) For most of the time the malware you will be getting through External Media would be way too old so basically every free antivirus can tackle them. Now comes the Internet since the viruses from internet are mostly Zero Day. Even from internet there are various ways through which a virus can enter your PC: Websites implantimg script which aren't malicious but will act as an intermediate for them to enter. Malwares in file you are downloading from torrent or some untrusted sources. There is no way you can isolate your system from virus but you can take some preventive measures like not visiting untrustworthy website or Downloading cracks, k

Why should I root my Android phone?

Image
You may, or may not have heard of the term Jailbreaking for iOS. Rooting is much the same, except for the fact that Apple expressly forbids you from tinkering with your iPhone software. The Android robot, being the kind, open-source soul that it is, suffers from no such inconveniences. You see, when you  buy an Android phone, you are the FULL owner of the phone , and you should be able to do whatever you please with it. Yes, that includes feeding it to the crocodiles. (Don’t sue me if you lose an arm in the process!)   “But why should I spend time and effort getting admin access on my phone? Will it automatically make breakfast for me every morning?”   It will do one step better than that. Like a phoenix rising from the ashes, it will give a new lease of life to your aging phone.  Simple root access will let you remove all bloatware that comes with your phone by default   and hogs up precious memory and space.  Don’t listen to FM? No problem, uninstall it.  What’s that pesky news a

How exactly does an Anti-Virus software work?

Image
An   anti-virus software  program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware). Anti-virus software typically uses two different  techniques  to accomplish this: Examining files to look for known viruses by means of a virus dictionary . Identifying suspicious behavior from any computer program which might indicate infection. Features of Antivirus Software Background Scanning: Antivirus software scans all the files that you open from the back-end; this is also termed as on access scanning. Full System Scans: This is done to make sure that there are no viruses present hidden on your system. Full system scans are also useful when you repair your infected computer. Virus Definitions: Antivirus software depends on the virus definitions to identify malware. That is the reason it updates on the new viruses definitions.

Top Methods That Hackers Steal Money From Your Credit, Debit Cards And Bank Accounts

Crooks keep on finding innovative methods to attackers steal money from our Credit, Debit cards and bank accounts.The hack occurs everywhere, starting from mutual funds, banking sectors, eCommerce stores, debit and credit card swipes. With the report published recently more than 3.2 million debit cards were hacked and published online. Phishing It is a social engineering attack which directs the users to the fake pages and get senstivie informations such as usernames, passwords, and credit card details. Attackers using this method widely to get your Financial data’s such as netbanking credentials, Credit, Debit carddetails. Keystroke Logging Attackers use to push malicious softwares via fake updates, Free softwares and also tricks the users into downloading a software. Once you have the software installed attackers can capture keystrokes that you are entering in the computer. Malware’s Threat actors can install malicious softwares in ATM, or your workstation which allow attckers t

What is Google Dork?

Image
These are specialized keywords to get internal information's about the website or server ,that are accessible by google crawlers (" also known as spiders") since these web developers are not serious about security about their site content. In simple words, we can access them by using some special google keywords these keywords include indexof: , site: , filetype: , inurl: , intitle: , intext: etc It also used by hackers,looking for files containing the usernames and passwords filetype:conf inurl:proftpd.conf -sample Files with Passwords Examples, inurl:”editor/list.asp” | inurl:”database_editor.asp” | inurl:”login.asa” “are set” ext:yml database inurl:config inurl:”Sites.dat”+”PASS=” filetype:ini “pdo_mysql” (pass|passwd|password|pwd) inurl:config/databases.yml -trac -trunk -“Google Code” -source -repository “login: *” “password= *” filetype:xls These Techniques are mostly used by Security Experts to find SQL INJECTION VULNERABILITIES in thei

How do I stay safe from phishing attacks?

Image
What is Phishing? The method by which sensitive information such as usernames, passwords, and credit card details is acquired for malicious reasons is known as Phishing. Cyber Criminals camouflage themselves as a trustworthy entity. They use electronic communication medium to steal information like Phishing email messages, websites etc. They use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. Types of Phishing Attacks · Deceptive Phishing - The most common broadcast method today is a deceptive email message. Messages about the need to verify account information, system failure requiring users to re-enter their information, fictitious account charges, undesirable account changes, new free services requiring quick action, and many other scams are broadcast to a wide group of recipients with the hope that the unwary will respond by clicking a link to or signing onto a bogus site where their confident