Posts

What does Spamming & Doxing means..? Check it Out..!!

Image
                        Spam, as I’m sure you're aware, is Unsolicited messages most often coming in email, like the one you can see here trying to get you to buy pharmaceuticals or some other nonsense. But they also come through instant messages, forums, social media, even text messages now, blogs, wikis, and pretty much anywhere else that they can think of in order to spam you . Mostly it’s to advertise some sort of product. You would think that spamming wouldn’t work, but the barrier to entry to become a spammer is low. So spamming remains economically viable because spammers have very small operating costs, and is difficult to hold senders accountable for their mass mailings. It’s relatively easy to hide where the emails are coming from. If you send millions upon millions of emails, enough of a small, small percentage take the bait. The email protocols we use today and have always used were designed in a time of t...

How can your phone calls and text messages can be hacked..? Check it out..!!

Image
Yes..!! you are thinking right, Your phone calls and text messages can be hacked now the question arrises, How, how it can, and who can hack it..?                  A vulnerability means hackers can read texts, listen to calls and track mobile phone users. What are the implications and how can you protect yourself from snooping? Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide mobile phone network infrastructure. The exploit centres on a global system that connects mobile phone networks, and can give hackers, governments or anyone else with access to it remote surveillance powers that the user cannot do anything about. But how can this happen, is it currently being used and what can you do about it? What is being hacked into? Signalling System No 7 (SS7) , which is called Common Channel Signalling Syst...

How Gift Cards used by Cybercriminals to fetch personal data.

Image
By creating fake websites for free generation of gift cards, many cybercriminals are tricking users into parting with their time and data, for no return, researchers at cybersecurity firm Kaspersky Lab have warned.   While legitimate apps like Tokenfire and Swagbucks buy card codes from vendors, to then give them to clients as a reward for certain activities, criminals have apparently recognised the popularity of such websites and have decided to deceive users using a simple algorithm. "The success of these new fraud schemes is based on criminals exploiting the drive of users to get something for free," Lyubov Nikolenko of Kaspersky Lab said in a statement this week.  "However, at best they will spend hours of personal time doing worthless tasks, and at worst lose money without receiving anything in return. So, if you want to get your hands on a free gift card, try to earn it on legal and trustworthy sites," Nikolenko added. When on the fake site, the...

How to remove shortcut virus from drive.

Image
What is Shortcut Virus? This is quite a reasonable question regarding the fact if it is the first time that your Windows PC or Laptop has been affected by this shortcut virus. Now if you are one of that new victim of this Shortcut virus then here is what you will need to know about it. Shortcut Virus is one of the new Malware that turns any files on your Windows including folders and files into a shortcut. While hiding the original files on your Computer which is quite irritating the fact that all your important files on your Windows Computer will be inaccessible. Now another important piece of information that you should keep in mind is that most of this Shortcut virus on Windows Computer are undetectable by any of the Antivirus that are currently in the market. So the only option is to remove shortcut virus manually or by using a Shortcut Virus remover. How To Remove Shortcut Virus Permanently in PC/Laptop/Pendrive/Flash Drive: Here are some of the methods that I used ...

Advanced Wi-Fi Jamming Using MDK3.

Image
You may have heard of a signal jammer before, usually referring to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries, but Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter. Traditional signal jamming has been a cat and mouse game of detecting and disabling signals an opponent is using to communicate. Cutting off a target's ability to communicate leaves them isolated and vulnerable, making jamming these signals a top priority in modern day electronic warfare. Countries today have developed capabilities to jam and spoof cell phones, GPS, Wi-Fi, and even satellite links. Different Types of Jamming There are two main types of jammers: elementary and advanced. Here, we'll be discussing elementary Wi-Fi jamming, focusing on unencrypted management frames. Elementa...

Privacy VS Anonymity VS Security . Whats the difference between them. Check it Out.!

Image
Privacy, Security and Anonymity are common terms used in day to day life by normal people. People use these terms but sometimes get confused between these terms. Privacy: The terms privacy means when the client and the server both knows about each the but the people in the middle doesn't know what they are sending. " Suppose you want to send the letter  from A to C but the B does not know about the content in the letter is that much secured that it is not read by the mediator. Security:  The terms Security in normal means keeping your system secure with outer surrounding like web attacks, wireless attacks etc.. from hackers and crackers . Anonymity:  The terms anonymity means when the client access the services given by the server by keeping his identity anonymous that means the server does not knows about the client. For example the people use TOR browser for keeping their identity anonymous from the internet. So thats it. Hope you guys like it. If yes t...

Singapore's Largest Healthcare Group Hacked, 1.5 Million Patient Records Stolen. Check it Out.!

Image
Singapore's largest healthcare group, SingHealth, has suffered a massive data breach that allowed hackers to snatch personal information on 1.5 million patients who visited SingHealth clinics between May 2015 and July 2018. SingHealth is the largest healthcare group in Singapore with 2 tertiary hospitals, 5 national specialty , and eight polyclinics. According to an advisory  released  by Singapore's Ministry of Health (MOH), along with the personal data, hackers also managed to stole 'information on the outpatient dispensed medicines' of about 160,000 patients, including Singapore's Prime Minister Lee Hsien Loong, and few ministers. The Ministry of Health said the hackers "specifically and repeatedly" targeted the PM's "personal particulars and information on his outpatient dispensed medicine." So far there's no evidence of who was behind the attack, but the MOH stated that the cyber attack was "not the work of casual hackers...