Posts

Showing posts from August, 2019

Best Practices For Using Public Wi-Fi

Image
Public Wi-Fi networks can now be found almost everywhere – in airports, coffee shops, libraries, restaurants, malls, and hotels – making it easy for anyone to connect to the Internet wherever they are. Although these Wi-Fi hotspots can be convenient, they are not always secure, potentially exposing you to online risks and presenting an opportunity for cybercriminals to steal sensitive information. It is important to understand these risks and take measures to protect yourself while connecting to Wi-Fi networks.


SIMPLE TIPS

Think before you connect. Before you connect to any public wireless hotspot – like on an airplane or in an airport, hotel, or cafĂ© – be sure to confirm the name of the network and login procedures with appropriate staff to ensure that the network is legitimate. Cybercriminals can easily create a similarly named network hoping that users will overlook which network is the legitimate one. Additionally, most hotspots are not secure and do not encrypt the information you…

Thinking About Antivirus (Computer Vaccine) Are They Useless?

Image
Recently, I saw a noticeable article on security. It was an article that mentioned the uselessness of antivirus called computer vaccine. Since I have been working in the security industry for almost 90% of my social life. I could not resist myself from writing a blog about it.

It is true that antivirus is called a vaccine. Of course, my company uses Kaspersky, and Microsoft's default Windows Defender as an antivirus. Overseas, many companies like Symantec's NAV (Norton Anti-Virus) and avast are also used. There are many antivirus products out there, and it's true that they are available for free and for a fee.

Antivirus has evolved significantly since its early days. In the past, the scan rate was slow and the update of the virus database was slow. Recently released products, which have been steadily gaining popularity, are fast and also update the virus database regularly. Of course, it is true that overseas anti-virus products receive higher evaluations than domestic an…

5 Steps To Protecting Your Digital Home

Image
More and more of our home devices - including thermostats, door locks, coffee machines, and smoke alarms - are now connected to the Internet. This enables us to control our devices on our smartphones, no matter our location, which can, in turn, save us time and money while providing convenience and even safety. These advances in technology are innovative and intriguing; however, they also pose a new set of security risks.


SIMPLE TIPS
Hackerfoss Campaign encourages you to follow these simple steps to secure your connected devices.
Secure your Wi-Fi network. Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network, and your digital devices, by changing the factory-set default password and username.Enable stronger authentication. Always enable stronger authentication for an extra layer of security beyond the password that is available on most major email, social media, and financial accounts. Stronger authent…

Document Security System To Prevent Confidential Leakage

Image
I. Enterprise security systems
There are many things to consider when running a business, but there are operating elements that have been particularly acute over the years. Usually, the security system that a company wants to adopt is called an enterprise security system. Since there are many kinds and various ranges of security, many people are wondering which security system should be adopted to run the company safely.
There are usually three types or four types of enterprise security. First, there is an access management system that manages human access. It is a system that allows only authorized persons to enter the company by using various recognition sensors such as fingerprint recognition, card recognition, and iris recognition. Also known as a physical security system, it is often used in connection with a computing system. Next is the network security system, which allows only authorized systems to access the network. Network Access Control (NAC) is typical, and Data Loss Pre…

Reverse Engineering File Format From Scratch

Image
Usually, file structures are vastly documented with open-source parsers available, but that's not always the case. In this article we will take a look at a case study of reverse engineering After Effects' project file - this will serve a dual purpose of demonstrating how we can understand the file structure of an undocumented format and showing that it’s not as scary as one may think. Based on the acquired knowledge we should be able to build a file parser and extract information.

The first thing I did was opening the file in a hex editor to get a general feeling for it, and I also run the “file” tool to learn what I could about the file format.


In this example, it was revealed to be a big-endian RIFF file. While learning more about it I also wanted to better understand how these files are used inside AE. Since AE is a pretty huge I didn’t want to RE the binaries just yet and hope to skip that overall. AE allows us to “Save As > Save a Copy As XML” which caught my attentio…

Safe Mobile Payments And Banking Tips Hackers Hope You Don't Know

Image
More and more frequently, consumers are using their mobile devices for online banking, payments, and shopping. We can now check our bank account balances, deposit a check using a mobile device’s camera, pay bills, transfer money between friends, and make purchases directly on our mobile devices. However, since these activities require users to provide sensitive personal information such as their names, account numbers, email addresses, and passwords, it is important to weigh the perceived benefits and potential risks associated with mobile payments and banking.


DID YOU KNOW?

More than half of adults (51 percent) bank online and 32 percent of adults bank online from their mobile device.Young adults between the ages of 18 and 29 years old are leading the mobile banking trend, with 54 percent banking on their mobile devices.22 percent of all mobile phone owners have made a mobile payment, up from 15 percent in 2012.62 percent of non-mobile payment users cited concern about the security of…

The Art of Carding: A Detailed Look Into Scammer Strategy To Steal Your Money - Part 3/3

Image
In the previous blog post, we learned about what SOCKS, Cardable site and what cardable means, Carding while on the job, Skimming whilst on the job, Trashing and Phishing over the phone are.  In this blog, we will continue to learn more about it and As a result of the feedback which I have received for the last two parts of the series, I have decided to make this blog more immersive for you.
In this blog, we will be getting into a scammer character and will learn more behind the scenes of the art of carding. (*Assume YOU are a scammer. Let's find out what you can do*)


Keylogging for CVV2s Hardware keylogging First of all it's best if you use hardware keyloggers here that you put into the keyboard of a computer belonging to an area where a lot of people are going online a lot and logging into e-mails, Ebays, PayPal, etc, pretty much giving you enough info for you to go searching through if you get in their e-mails, or maybe you're lucky enough to get someone who is buying so…

The Art of Carding: A Detailed Look Into Scammer Strategy To Steal Your Money - Part 2/3

Image
In the previous blog post we learned about what carding is and about online carding  In this blog, we will continue to learn more about it and I will start this blog describing the precautions a scammer take in the process. 
SOCKS is an Internet protocol that exchanges network packets between a client and a server through a proxy server.
"They say it's very important to cover the traces to not get caught by law enforcement." A Hacker usually uses a combination of SOCKS, Proxy, and VPN to spoof their locations. That way, it is far less traceable and it takes far longer to find out who was behind certain attacks.
In the same way, most of the scammers use the same old technique to hide their traces as well.
"If you were a scammer, you really don't want to get caught, do you?"
Now you're probably wondering what SOCKS is and why scammer uses them. Now with ANY fraud at all you have to take precautions so you don't make it easy for anyone to catch you in your wr…

The Art of Carding: A Detailed Look Into Scammer Strategy To Steal Your Money - Part 1/3

Image
"Curious to know, how one can steal your hard-earned money from under your nose?" You are at the right place, I will share you all behind the scenes of this process.

Few things to know before we get started with the main part of the blog. Let's all understand about the bad guy who is focused to rip your bank balance. Here we are dealing with a scammer.
"A scammer is a person who commits fraud or participates in a dishonest scheme."
In this blog, I will explain how a "scammer" can rip your bank balance in a matter of moments with a scam called carding.

Let's begin with the question, "What is carding?".In short, Carding is the act of obtaining someone's credit card information, from the CC#, CVV, CVV2, CVN, and the billing address, along with the expiry date and name of the person the card belongs to along with a signature.
So by summing up, we can say that the scammer requires the above information to rip your bank balance. In general, scamm…