Tuesday, October 25, 2016

WhatsApp Video Calling

How to make whatsapp video call?

To make video calls download beta version of whatsapp from the link- https://drive.google.com/open?id=0B70nHD-VvnjRWXNmT3piSS1WRm8


Monday, October 24, 2016

Phishing Awareness

What is phishing?

Everyone knows that what is fishing, it is a practice of catching fish in a water body with the help of a bait hook.
Fishing

Phishing is also a similar process like fishing, it is the process in which a fake address link, page, offer, telephone call, email,(bait hook) is targeted or send to lure the targeted individual (fish) into providing sensitive information like- bank details, login password, credit card details, and any other information.
Phishing is a form of fraud in which the attacker tries to learn information by masquerading as a reputable entity or person in email, or other communication channels.
Phishing


Phishing is popular with cybercriminals, as it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer’s defenses. Although some phishing emails are poorly written and clearly fake, sophisticated cybercriminals employ the techniques of professional marketers to identify the most effective types of messages --  the phishing "hooks" that get the highest "open" or click through rate and the Facebook posts that generate the most likes. Phishing campaigns are often built around the year's major events, holidays and anniversaries, or take advantage of breaking news stories, both true and fictitious.
To make phishing messages look like they are genuinely from a well-known company, they include logos and other identifying information taken directly from that company’s website. The malicious links within the body of message are designed to make it that they go to the spoofed organization.
The use use of sub-domains and misspelled URLs (typo-squatting) are common tricks, as is homograph spoofing -- URLs created using different logical characters to read exactly like a trusted domain. Some phishing scams use JavaScript to place a picture of a legitimate URL over a browser’s address bar. The URL revealed by hovering over an embedded link can also be changed by using JavaScript.

Era-

At present about 30 lac phishing mails, links and other communication channels are send in India, every week and about 2 to 5 % targets individuals gets phished and loose their privacy.

Security Measures-

  1. Guard against spam emails.
  2. Communicate personal information only via. phone or secured websites.
  3. Do not click on links, download file or open attachments in emails from unknown senders.
  4. Never email personal or financial information, even if you are close to the recipient.
  5. Beware of links in emails that ask for personal information.
  6. Never enter your personal information in pop-up screen.
  7. Protect your computer with a firewall, spam filter, updated anti-virus, and anti-malware software.
  8. Check your bank accounts and bank statements regularly.

Thanks for reading

Keep your information system safe and secure.
Best regards, from Ethical Hacking.

Tuesday, October 11, 2016

Ethical Hacking

Ethical Hacking

Ethical hacking, also known as penetration testing, intrusion testing or red teaming, is the legal act for the purpose of locating security vulnerabilities and weaknesses of computer and information system, so as to minimize or eliminate potential attacks.
Ethical hacking also known as “white-hat hacking”, is a security profession to apply the hacking skills for defensive purpose against the malicious hacker known as “black-hat hacker”.