BREAKING NEWS
latest

ADS

ADS

Hacking Tools

Hacking Tools
Showing posts with label Security Awareness. Show all posts
Showing posts with label Security Awareness. Show all posts

WhatsApp Gold is Back, Once again with the updated virus

WhatsApp Gold is Back, Once again with the updated virus

The new “WhatsApp Gold feature” is actually a hoax - Livemint, WhatsApp: What is WhatsApp Gold?, WhatsApp 'Martinelli' virus returns in 2019, WhatsApp 'Martinelli' virus returns in 2019,
WhatsApp 'Gold' Hoax: A Virus That You Should Not Download, WhatsApp 'Gold' Hoax: A Virus That You Should Not Download, WhatsApp Gold scam, Martinelli, Beware! That new WhatsApp Gold feature is a hoax - Technology News,What is the WhatsApp Gold virus and what to do if you are targeted, What is the WhatsApp Gold virus and what to do if you are targeted, There is nothing called WhatsApp Gold; it's just a virus, It Is A Virus: Do Not Download 'WhatsApp Gold'
Most Common WhatsApp Scams, Most Common WhatsApp Scams.


In the technology world day by day new interesting things comes, it might be related to adding new features to the WhatsApp, Facebook, Instagram or LinkedIn. 
Now a day If you are getting any link to download WhatsApp Gold, Be aware! It’s a scam. Don’t install WhatsApp Gold in the device It’s a Virus. In the scam message these things can be find in the message, like if you install this WhatsApp Gold in your device you can send photos to 100 people once & message can be deleted at any time.









But its fake, ignore these kind of message, this can be dangerous for your personal data.
The Officially said by WhatApp, they didn’t launch any such kind of new version of WhatApp. This WhatApp Gold Virus is spreading by hackers, if someone open this message, the phone will be infected with the virus and personal information will be leaked to the hackers.

Manish Kumawat, Director at Cryptus Cyber Security Pvt Ltd Commented, “ This is not the first time when hackers released this kind of updated version of WhatsApp, It has been happened before also. If anyone installed this virus in the phone, then should do factory data reset.

The new “WhatsApp Gold feature” is actually a hoax - Livemint, WhatsApp: What is WhatsApp Gold?, WhatsApp 'Martinelli' virus returns in 2019, WhatsApp 'Martinelli' virus returns in 2019,
WhatsApp 'Gold' Hoax: A Virus That You Should Not Download, WhatsApp 'Gold' Hoax: A Virus That You Should Not Download, WhatsApp Gold scam, Martinelli, Beware! That new WhatsApp Gold feature is a hoax - Technology News,What is the WhatsApp Gold virus and what to do if you are targeted, What is the WhatsApp Gold virus and what to do if you are targeted, There is nothing called WhatsApp Gold; it's just a virus, It Is A Virus: Do Not Download 'WhatsApp Gold'
Most Common WhatsApp Scams, Most Common WhatsApp Scams.



Digital Footprinting Module : How you leave your critical information online

Digital Footprinting or Information Gathering 

A digital footprint is any information about a particular person or any organization that exist on the internet or cyber world as the result of their online activity. It include all the information you leave behind while using services or technology like internet, social media, shopping websites, credit cards, etc.


Today internet is become an important part of our life’s. Every day we just surf internet for many of our basic task and thus how you leave behind much of your personal or commercial information like email id, mobile number, address, online history, etc. 

You will be shock to know how your information or digital footprints are used by the websites, advertisers, spies, and hackers. Through Digital footprints you left behind your personal or professional information can be taken out and can also be used against you. 
But it is not always that your digital footprint are used for malicious purpose. It also benefit you sometime by telling you great deals, offers and much more. It has its own pros and cons.
If you think that you have deleted your browsing history, then you are safe, then unfortunately it’s not the case. Even if you regular delete your history and cache regularly then also your footprint remains in the online world.
What is digital footprint?
There is many misconception about digital footprint and many of you haven’t ever heard about this term yet.



How you leave behind digital footprint?
Every time you visit any website, send any mail, or submit data on online services, all it add to digital footprints. Publishing blog, posting on social media sites like uploading on Facebook, Instagram, Skype, and Twitter all it add something to your digital footprint.
In short all activities you do online, you leave your digital footprints behind.
What are types of digital footprint?



There are generally two type of digital footprint which you contribute while using the services of cyber world.
Active Digital Footprints: 
This is all the data you have provided intentionally and which get add to your digital footprint. For example you can take email, social media, online forums, etc. where you intentionally upload your information. 

Passive Digital Footprints:
This is all your data which is generated unintentionally and add to your digital footprint without your knowledge. For example, internet browsing, online shopping, etc. Let’s understand this work. Suppose you visit any site, the web server may keep your IP address in log. By the help of this IP your location can be locate. Some website when run script to steal your personal data from your browser without.  
How you can reduce your digital footprint


You can never completely delete your digital footprint of yours in the cyber world. It possible to delete your traces up to limit but removing everything you have done online is quite close to impossible. 
Once any of your information come out in the cyber world publicly, there is no 100% surety about deleting it. You never know how others will use your data. So only method to be on the safe side is to reduce your digital footprint to get store in cyber world.
Now let’s see the ways by which you can delete or reduce your digital footprint.
Controlled Social media use and properly configure privacy settings
Social media site is one of top platform where almost every one leave their lot of information as digital footprint. It the source of active digital footprint fromwhere you can get most recent information of anyone. Today there is the trend in society to update all thing you daily in your status of social sites like where you are, what you are doing, where you visited etc. 
These all information on social account become your digital footprint accessible publicly if you haven’t configure your privacy setting properly. So if you are using social media sites, so make sure that your privacy setting are set to be private and try to upload less data which is not sensitive.
Don’t use professional mail to register on services


Today each service you access on the internet ask for your email to register there. So, you just leave your detail information as a digital footprint on many websites. Not all, but some of this website use to sell your information like mail ids, phone number etc. to advertisers, shopping sites, other commercial platform. That why you get many advertisement from different service on your professional mail id, which disturbs you. So to be safe at this point you should use a temporary or extra (specially made registration purpose) in place of your regular or professional mail id.


Delete critical information on the online marketing account
If you use internet, then you must have use any e-commerce and retailer services. Accounts on these services usually have all your financial data and original information. You should delete all your details like account number, credit card, and other crucial information immediately after using.


Other thing you should remember are that, clear your browsing history and cache every time, use incognito mode while surfing over internet, try to use VPN, proxy or Tor browser, try to hide your genuine information where it not necessary to use and add false information. 
So through this we try to told you that what is digital footprint and how important for you to reduce your digital footprint from cyber world. 

SIM Swap Fraud | SIM Cloning | Airtel, Vodafone, Reliance Jio, BSNL, Idea SIM fraud | How to be Safe

How Hackers hack bank accounts by using sim swapping or sim cloning 

SIM cloning is a very much time taking process especially for GSM SIM cards, which are widely use now a day, and in the SIM cloning process, the complete physical access requires. There is no way till now to clone the GSM SIM card over a phone call and in SIM Cloning the imsi number requires too

how to do sim swapping



Yes, you read about sim swapping exactly right! your smartphone can be a cause to lose of your hard earned money from your bank accounts. You should aware yourself about general awareness so that you can save your hard earned money. You must have heard about sim cloning or sim swap now a day. 
In a recent case a man lost his Rs 93 lakh from his bank account. Now a day this sim swap cases increasing day by day. Hackers performs it by using phishing or vishing techniques, in most of cases hackers used these kind of techniques in financials frauds. Doesn’t matter which company sim card you are using like Idea, Vodafone, Airtel, Reliance Jio, BSNL etc.  or which phone do you have.
What is SIM Swapping?
SIM Cloning or SIM swapping is a technique in which a person can create exact same another sim card of original one. The original sim stops to work and another working fine and bad guy start to use the sim and use it in getting OTP codes for making fraudulent activities without knowledge of the mobile subscriber.
sim cloning




"SIM Swapping means registering a new SIM card with your mobile number. A person with your authentic details will contact the telecom company, provide your all the authentic details and get a new sim card with your mobile number," said Manish Kumawat, Director at Cryptus Cyber Security.
Kumawat added that the original SIM will soon become invalid. "Scammers use the new SIM to get the OTPs from the bank or any social networking sites, whatever they want to get access," he said.
 How do the scammers work?
 Kumawat explains the sim swapping process. How scammers process the fraud by this method.Some fake telecom company guy or scammer will call you as authorised person from the telecom company and ask the user information which requires to get a new sim. He may ask you unique SIM code and will convince you to press 1 to confirm.


how to do sim cloning


They connect the same call to the telecom customer care and make it authentic call from user to telecom company. When user press 1 to confirm, the telecom company customer care confirm that user has lost the sim and wants to get a new sim, and they released the new sim to the scammer with the same number.

“Scammers actually look for the phone numbers which are registered in the bank accounts and they use the number in the payment transfer APIs so that they can easily transfer the amount in another bank accounts. Scammer gets the OTP code at fake sim card. Once the complete process done, scammers destroy the SIM card so that no trace left,” said Kumawat.



how to do sim swapping


How to identify whether the SIM has been cloned or not?
There are some points to stay safe from SIM cloning.
·     someone calls you regarding telephone bills.
·     Your phone went missing for a few hour or don’t getting mobile network.
·     Phone busy even when that is not using on a phone call
·     Too many wrong number calls for collecting confidential information
 However, is there any way to stay safe from these kinds of frauds?
 Manish Kumawat, said that there are a number of ways by which one can stay safe from these kind of scams.
"Scammers generally scare the user that their number will be deactivated or telco may issue disconnection of service order. In such a case, visit your nearest telecom service store with your concern. Do not share any detail over the phone," said Kumawat. 
Below are some dos and don’ts that you must follow: 
1.     If you will get a call from telecom company if they are asking the SIM card number and some other sensitive details.
2.    Remember no-one from telecom company never calls to their customers for collecting such kind of information.
3.    Scammers usually asks you the 20 digits sim card number, if someone ask you this kind of information it means they are definitely a scammer.
4.    Scammers requests you to confirm any digits in your phone key pad. They connect the same call to the customer care and make it authentic call.
5.    No bank employee calls to the customers to collect such kind of information. 



How to protect computer from ransomware Attack easy steps | how to be safe from ransomware

Easy Steps To Protect System from ransomware attack

WannaCry Based on a vulnerability in Windows Operating System, first discovered by the NSA, and then publicly disclosed to the world by the Shadow Brokers (Hactivist).

Image result for ransomware

Biggest ever cyber attack on May 12th 2017 in Internet history.A ransomware WannaCry affected systems through the web, with the damage over more than 150 countries.
In the first few hours, 200,000 machines over 150+ countries were infected. Big organizations such as Renault or the NHS were struck and crippled by this ransomware attack.


Ransomware has been a growing trend for the past two years to affect systems and ask for money from the victims, and this is just a culmination, a grand reveal to the wider world of just how big of a threat it is in the cyber attacks. But we’ve been writing about this for a while now.
Some time ago, a pizza delivery guy walked into our office in delhi. While we signed for the package for the delivery, he came to know that we work in cyber security and asked that:
My entire music video collection from the past 5 years got encrypted by ransomware attack.
"Is there anything I can do about it?
They are asking for $700 for the decryption key."
My first thought was: I hope he has a data backup. So I had to ask:
Do you have a backup of your data?
He looked down and said a bitter „no”.




This scenario is unfolding right now somewhere in the world anywhere. Maybe even in your city or anywhere in the world.
In this very moment, if victim is clicking a link in a spam email or activating macros in a malicious document it will give a reverse connection to the attacker.
In a few seconds, all their data will be encrypted and they’ll have just a few days to pay hundreds of dollars to get it back by decrypt key. Unless they have a backup, which most people don’t have.
Ransomware creators and other cyber criminals involved in the malware economy are remorseless. They’ve automated their attacks to the point of targeting anyone and everyone.
Take this story from the New York Times:
MY mother received the ransom note on the Tuesday before Thanksgiving. It popped up on her computer screen soon after she’d discovered that all of her files had been locked. “Your files are encrypted,” it announced. “To get the key to decrypt files you have to pay 500 USD.” If my mother failed to pay within a week, the price would go up to $1,000. After that, her decryption key would be destroyed and any chance of accessing the 5,726 files on her PC — all of her data — would be lost forever.
Sincerely, CryptoWall.


I hope you’re reading this post to be prepared for a malware attack. Prevention is absolutely the best security strategy in this case.
This guide is packed with concrete information on:
  1. What is ransomware attack?
  2. How it evolved ?
  3. Who ransomware creators target most frequently systems?
  4. How ransomware spreads via the websites?
  5. How ransomware infections happen online?
  6. Why ransomware often goes undetected by antivirus or Intrusion systems?

What is ransomware?

Ransomware is a sophisticated piece of code for making a malware that blocks the victim’s access to his/her files in his/her system, and the only way to regain access to the files is to pay a ransom.

Locally, on the PC

  1. we should not store important data only on my PC.
  2. we should have 2 backups of my data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.
  3. The Dropbox/Google Drive/OneDrive/etc. application on computer should not turned on by default. You should open them once a day, to sync your data, and close them once this is done.

  1. Your operating system and the software which you use is up to date, including the latest security updates.
  2. For daily use, you should not use an administrator account on your computer. you should use a guest account with limited privileges.
  3. You should have turned off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc.
  4. In the browser
  5. You should have removed the following plugins from your browsers: Adobe Flash, Adobe Reader, Java and Silverlight. If you absolutely have to use them, you have to set the browser to ask  if you want to activate these plugins when needed.
  6. you should adjusted your browser’s security and privacy settings for increased protection.
  7. you must removed outdated plugins and add-ons from your browsers. you should only kept the ones which you use on a daily basis and  keep them updated to the latest version.
  8. You must use an ad-blocker to avoid the threat of potentially malicious ads.

Online behavior

  1. You should never open spam emails or emails from unknown senders.
  2. You should  never download attachments from spam emails or suspicious emails.
  3.     You should never click links in spam emails or suspicious emails.



Anti-ransomware security tools

  1. You should use a reliable, paid antivirus product that includes an automatic update module and a real-time scanner.
  2. You understand the importance of having a traffic-filtering solution that can provide proactive anti-ransomware protection.

Thank You 





Cyber Security Tips For Secure Online Shopping | How to be safe from online hackers

Cyber Security Tips For Secure Online Shopping

here are top cyber security tips for safe online shopping for online shopping.


However, the main question arises: Is it safe to do online shopping? Especially with so
many users sharing credit card information over online shopping websites.






Here are some tips that you have to keep in mind before releasing your credit card information and clicking, 'BUY' or 'checkout'.


1. DO NOT CLICK On Suspicious Links

Malicious links are sent by scammers over internet who look more real than the original ones. As these links are specifically of the well-known sites like eBay and Flipkart, many online users fall victim. These links are created for installing malware in visitor's pc.The secure way of not getting tricked by these would be NOT to open these links if provided via social media sites, messages or emails from unknown sources.

2. Keep your Eye on New Vendors or websites

People tend to purchase goods and services from new vendors or websites as they generally give attractive discounts over social networking sites also.




However, one should always be safe from such vendors as sometimes the customer is trapped and exploited easily.

·       Always get a double confirmation of the things that are necessary including product purpose and suitability, materials and construction, quality, and other things like speedy shipping, prompt refunds, and returns.
·       Always try to start from minimum purchases and then shift to the major ones.
·       Always look before you leap.
Search online for other people's experiences online and also some sites like www.bbb.org and others.

3. Always Use Strong Passwords

This tip is one of the most obvious ones, but people do not intend to use it generally.
·       Always try to avoid easy to crack passwords by including a combination of upper and lowercase letters, numbers and special characters in your password & put hard password not easily guessable.



·       dont put simple passwords like 12345 or admin12345.
·       don't have same password for multiple sites.

4. Always Use Secured Websites for shopping
Before releasing your sensitive information over online webisite, check to make sure if the website you just visited is a secure site.




Secure sites have a closed padlock in the status bar, and its URL starts with HTTPS, which means:
·       Communication is encrypted
·       SSL verifies authenticity
5. Avoid Using Debit Cards, Instead Use Credit Cards

Do not use debit card for online shopping.
 In a case, if someone manages to intercept your financial information online, they can do less damage.

·       Credit cards have spending limits but debit cards do not have.
·       Credit cards should also be used with low credit limits even as other option also given by the bank as "one-time use."
You can even make use of virtual credit cards that are specifically designed for online shopping only.

6. Important Things to Remember While Shopping

·       Always keep documentation of your online purchases, mostly an email is sent to the customer confirming the order.
·       It is the duty of every customer to print the document or save it somewhere safe till receiving the order.
·       Moreover, it is always suggested to log off from the retailer's website after making the purchase.
These are always considered to be the smarter options to adapt than to become a victim.

7. Do Not Provide Your Details to Every Website You Visit 

Online stores provide an option for the customers to check out as a one time customer.If you are not shopping regularly from any site, avoid filling unnecessary information, just in case, to be safe.

8.Check Your Bank Statements Regularly

Most of the banks now allow for setting up email notifications of any credit card 
transaction.If you see any charges that are unusual.
they have to get reported, and suitable actions should be taken that are needed to get a prompt refund.

Secure Transaction Online | How to make secure your credit card details | how to make secure your banking information | secure shopping online tricks & tips