Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Monday, August 20, 2018

Best Way To Be Completely Anonymous On The Web

By Jitendra Indave On Monday, August 20, 2018
anonymous-tool

The threat of “Blue Whale” and “WhatsApp MOMO” are some examples through which peoples are got blackmailed, threatened also inspired to commit suicide. Just a few days ago, the news flashed that a teen from Argentina committed suicide. The investigation report said that it happened because that teen was trapped in the trap of MOMO. Not only teen but there few are cases examples when adult also committed to self-murder because of “Blue Whale”. Now, one more same kind of thing is coming out which is called “Kiki Challenge”. In the “Kiki Challenge” the participant has to step out of the running car, show some dance steps while the car is moving and then again jump back into the car, without getting any hurt. Many cases of causalities found across the country who were completing this challenge. 

Now, let's move on the main point that why this kind of foolish thing happening all around us. How can any unknown person threat us and ask us to do anything he likes. It is because; he has some sensitive and confidential information regarding people like us. The less exposure of yours online the more secure you are. Today online surveillance is still a constant threat should not be neglected. Peoples use various tools to minimize their exposure online. Here I am going to discuss few things about to keep safe ourselves online.

Use VPN Service 

It is the simplest and most effective to keep secure your privacy. Choose any reputable VPN service provider preferably one based overseas. This provides you with an encrypted mode to communicate. Your lSP and local authorities can’t trace your activities. For the websites, it becomes harder to identify from where your connection is coming. There are lots of free VPN service providers available. But personally, I will not recommend it. We’ve heard stories of user data being

accidentally leaked, or deliberately sold to fund operations – which undermines the whole point. More ever there are plenty of chances that free VPN service provider can insert their own content into your data traffic which can be in the form of an advertisement. There is another benefit of this service, the sources which are blocked for your country are available for you. Because you can normally route your connection through servers in a variety of different countries.

Use Tor browser

The word “Tor” stands for – “The Onion Router”. The multilayered path through which data passes is secured structure. It routs internet data through multiple servers before reaching to its destination. Tor adds encryption elements, with each node with each node that your data passes through decrypting a little more of the packet, like peeling away another layer of onion skin. When your request reaches its destination, it will have been fully decrypted. If any user wants to intercept the data, he may not succeed because he will not have the complete set of record. So, the Tor browser is safe to use. If you are chrome lover still there is an extension of tor is available in the chrome web store. If you are using the Android platform, I will suggest Orweb Private Web Browser, which routes requests over the Tor network.

Block Fingerprint Technique Extensions 

Even if you’re using a supposedly private browser (incognito mode) that doesn’t store cookies from one session to the next, the website you visited builds your profile of interest and activity. They identify you by recognising what type of device you are using to connect. The profile that includes detail combination of computer hardware and software which is used to reach that particular website reveals our identity. The distinctive configuration of your computer acts as a fingerprint. If you change any single hardware or software to prevent this situation of identifying yourself, it’s likely you’ll still be recognised as the same person. Using VPN you can hide your location but information of your computer configuration forwarded to the visiting website. The Tor provides full security as data passes through the various servers which are located in different countries. The visiting website only notes downs the exit point of the visitor. Therefore, the original computer configuration profile not traced by the website. To reduce the user exposure JavaScript should be disabled. Or User should look for search extension that can block specific fingerprint technique. 

Crunching Cookies 

When we visit a website that contains flash elements, the data packet called a “local shared object” are stored on the user computer. This kind of contents may not be deleted when user clear cookies from the computer because these are managed by Flash host. Those data packet can be used to identify the user. It doesn’t matter if you change web browser. Do this to get rid of it. Make sure “View hidden item ” is ticked, because some of the files will be in the hidden format.

Go to -

C:\Users\[you]\AppData\Local\Macromedia\FlashPlayer\#SharedObjects\

And

C:\Users\[you]\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\

Delete all located in inside. If you are working with Chrome, also check the following folder.

C:\Users\[you]\AppData\Local\Google\Chrome\User Data\Default\Pepper Data\Shockwave Flash\WritableRoot\#SharedObjects

Be cautious while installing extension or plug-in for your web browser these of browser can easily trace to collect your activities, interest and other information. 

Proxy Servers

There are many free proxy servers available which can be used to hide your original identity. The user can surf the web anonymously.  Hidemyass.com is a good example of it. Most of the web browser provided proxy server extension with the single click it can be activated.

Last and final tips I would like to share instead of Google you can use duckduckgo.com. What result you get in Google the same you will find here. It is best for anonymous search. This website does not store your record of search or share any information about you at all.
Read More

Wednesday, July 11, 2018

Hackers Can Hack the Password Using Your Body Heat.

By Jitendra Indave On Wednesday, July 11, 2018
Thermanator-cyber-security

Mr Irvin, the researcher from the University of California brings new study research in front of the computer users. He says that by analyzing the heat left on your computer's keyboard, criminals can steal your password, private banking information. According to the new research, the heat wave which is left after pressing the keyboard button for a minute can be captured using the thermal camera. Therefore, researchers believe that hackers can wait up to a minute until the user leaves his position from the keyboard. Then after logging in detail, bank pin or any sensitive information can be hacked by hackers. Thermal sensors are easily available in the market so we can’t deny such attacks. The researchers have given the name to this type of attack is “Thermanator”.

For this type of attack, the hacker must place thermal camera within clear view of the computer keyboard. The footage of the thermal prints can be analysed to capture a password and other entered information.

During the experiment, 31 participants entered their password on four types of keyboard. Eight non-expert persons asked to analyse the footage taken by them using the thermal camera. The thermal camera captures scenes up to 30 seconds from pressing the keys. And what data was collected during the experiment was good enough to decode user password and entered information. 

Below are the mentioned steps those can follow to keep safe information online.

1. Use the process of authentication - Some website asks further more information to the user along with username and password for authentication purpose. The user should use such combination while signing in. It will be hard for hackers to steal your data.

2. Don’t user public wi-fi – That is a good idea not to use public wi-fi. Because every time when you are accessing public wi-fi, there is no guarantee that data passing through the h encrypted channel. So, it’s better to avoid. Keep locked you mobile device. There is no loss of using the antimalware software.

3. Be in touch with financial institutions - When the cards like debit, credit or any other financial related are used at that time, such financial institutes sends the message regarding transactions or alert. We should be in the touch in with them. If using net banking, set limit for the transaction. Or you should use the virtual card.
Read More

Friday, July 06, 2018

The Battery and App can be Used To steal Data From Your Smartphone, Claims Research

By Jitendra Indave On Friday, July 06, 2018
Cyber-Theif-Internet
A new case steady revealed that your mobile phone battery, as well as the screen, could be turned into a secret surveillance tool to observe and steal your data. According to the research work published in the DE GRUYTER OPEN, A malicious battery may serve as a powerful platform for attacks on user’s privacy. 

A researcher clarifies in their research work on how malicious batteries in smartphones could be used to read your data just by analyzing the battery energy levels. Using apps, the user can keep watch power consumption to increase the life of the battery, by managing the resources and improve the responsiveness of a gadget. The battery status API links both software and hardware by creating a communication channel. In the background, such API can be stealing information and send toward the attacker without the user’s acknowledgment. These types of “Attack” can occur by replacing the battery of a target smartphone with a compromised one. The data collected with the help of micro-controller and Battery Status API could be analyzed using Acquisition Interface to match power flows with specific keystrokes and pinpoint the characters typed on the keyboard. Using this method hackers can – detect all the incoming calls on that device, capture keystroke, observes web browsing history.

The following hardware and software were used for research purpose.

Mobile Device
Huawei Mate 9
Samsung Galaxy Note 4
Samsung Galaxy S4
Chipset
Hisil. Kirin 960
Snapdragon 805
Snapdragon 600
CPU
CPU Cortex-A73 & Cortex-A53
Cortex-A57 & Cortex-A53
Krait 300
Display
5.9’
5.7’
5.0’
OS
OS 7.0 (Nougat)
5.1.1 (Lollipop)
4.4.2 (KitKat)
Browser
Chrome 53
Native 6.2 / Chrome 63
Native 2.1 / Chrome 43
Battery
Li-Po 4000mAh
Li-Ion 3220mAh
Li-Ion 2600mAh

In another research done by computer science academics at Northeastern University, more than 17000 apps were stealing information in the background by collecting data and share to the third party without user acknowledgement. You may have noticed that today you are talking about to purchase of Nike shoes and very next day you face advertisement in your email regarding Nike shoes. How’s it possible? Yeah, there are some apps on android those keeps watch and listen whatever being done by you. The research was done on more than 17,000 apps using the automated program that kept watch the incoming and outgoing flow of data. As a result over 8000 apps were found for sending data. In the year 2016, a mass communication professor at the University of South Florida Kelli Burns alleged that company is kept listening to their conversation and that was used to show related advertisement in his news feed. But later social media giant Facebook dismissed the allegations.
Read More

Saturday, June 16, 2018

Is the security app necessary for Android?

By Jitendra Indave On Saturday, June 16, 2018
Android-antivirus

     It’s not just on the desktop PC platform which are getting smarter in term of security. When there were limited threats to an operating system like Linux. Developers were not much anxious about malware attack. But now the scenario has been changed. Historically, mobile operating system Android, which is Linux based, has been notoriously appearing soft target to malware, since its open structure allows users to install even untrusted code.
Read More

Monday, October 14, 2013

Six Simple Tips To Keep Secure Smartphone And Tablet From Malware

By Jitendra Indave On Monday, October 14, 2013
Android-Device-Security

Every day thousands of apps are dumped on some of the trusted sources. Sometimes, Android lovers blindly install and uses those apps without knowing that whether those are from a trusted source or not. And that becomes one of the reasons to pay them. Here, Enigmazone going to give some basic security tips to keep secure your smartphone and tablet. Before it, let’s have a quick view on those reasons which lead us to loss.

Android bugs and scams

These rogue apps lock android devices and the only way to unlock them is to get your wallet out. Pop-up dialogue boxes and notification will keep appearing if you do not pay.

Phishing

Since many people use their Android devices to manage their finances, phishing attempts to try and extract personal details and log-ins to gain access. Sometimes users are tricked into installing malware.

Fake apps

Fake BBM Android apps keep cropping up on Google Play but they are just the tip of the iceberg. Fake Angry Birds and Cut The Rope apps are big examples of it, it used premium rate text messages to defraud customers £27,850.

1.

Install antivirus software. As long as you select an app from Google Play from a company you recognize, you will get peace of mind with a package that scans your device for issues.

2.

Keep updating. If you can push your device to the latest version of Android, then do so. For example, Jelly Bean will alert you if an SMS is being sent to a premium testing service.

3

How popular is the app? Has it been downloaded thousands of times but with no reviews? Scammers will artificially inflate the number of downloads to get it ranked higher.

4

Check app reviews. Be sceptical and read reviews. Over-positive reviews should set off alarm bells. Reviews that make mention of viruses are a godsend; avoid these apps like the plague.

5.

Stick to Google Play. Malware developers do target Google Play, but they target third-party marketplaces more. Rogue apps are better spotted and flagged up in Google Play.

6.

Check permissions. What is the app actually looking to do and how far-reaching are the permissions? Question exactly why the app you are downloading may need certain access.
Read More

Tuesday, October 02, 2012

Do Not Track: An Option To Control Privacy

By Jitendra Indave On Tuesday, October 02, 2012
Avoid-Tracking-Data
ONLINE TRACKING AND PROTECTION is a most trending topic nowadays. Every computer genius wants to keep safe himself in this internet world. The administrative team of Obama and Federal Trade Commission (FTC) -USA, demanding privacy protection against tracking since last June.  Are they preparing for security against big cyber attack or hacking? Honestly, I don’t know. If it is then are we ready for it? I don’t think we are. I know all we are not IT specialist.
Read More

Saturday, September 08, 2012

Way To Keep Personal Information Out Of Search Engines and Social Media

By Jitendra Indave On Saturday, September 08, 2012
Remove-Personal-Data-From-Search Engines

     As we discussed before about the key that hacker mostly use to track and steal your data. We provide opportunities to the hackers by blindly uploading personal and sensitive information on social media platform, in the survey, in web marketing and in messages. The less personal data you share, the less chance for the hacker is there. If you're worried about the personal data you've found, here are five tips to get it removed
Read More

Speed Up Your PC Using PrivaZer Privacy and PC Cleaner Tool

By Jitendra Indave On Saturday, September 08, 2012
PrivaZer-Privacy-PC-Cleaner

     Lots of programs clean up your computer and remove evidence of both online and offline activity, but PrivaZer's scan comes equipped with a vast selection of tools to find and remove references to everything you've ever opened, watched, downloaded or deleted. It also securely erases private Files; cleans up USB drives, (Pods and MP3 players; and restores your computer or Registry if you encounter problems. PrivaZer can be installed, run directly without installation, or turned into a portable tool on a USB memory drive. You can also schedule scans. PrivaZer works with Windows XP, Vista and 7 for both 32 bit and 64 bit version.You can schedule backup of cookies, jump list,scanner, cleaner.
Read More

Friday, September 07, 2012

Way To Protect Yourself While Surfing

By Jitendra Indave On Friday, September 07, 2012
security-tips

     Most of the time user share sensitive, personal and important information without any care over the internet. That can lead to harmful output. Once your sensitive or personal information is traced by hackers you will find yourself in big trouble. Easily you will be made target to reveal your bank account information, email id and passwords by hackers.
     In this social networking world, we hardly care what is being accessed and shared by us. If you want to avoid the above situation follow these ten points: 

1. Limit the Information you share publicly. If you’re including your birthday in a social profile, avoid stating your birth year - this is a key identifier, which trackers can use to distinguish you from other people with the same name. 

2. Use a secondary email address when registering for websites, forums, competitions or shopping online. Outlook and Yahoo offer free, quick to set up accounts. The way to create disposable/secondary email address in outlook we have seen in the last session. 

3, Use one browser for general web activities and another for more sensitive information. Avoid using 'Like 'and G+1'Buttons. 

4. Regularly change your passwords and use a separate one for each account. A password manager can be useful here, 

5. Make sure any browser you use has the Privacy settings switched on. These are often off by default. Enable private surfing in the web browser. 

6. Don’t ever respond to the pop-ups that appear at once while surfing, most probably when it is asking you to enter personal detail. 

7. Whenever you receive an email with attachment make sure you have scanned download link of the attachment. If it appears suspicious then avoid downloading it. 

8. If you are using a public PC to access all your personal information, always clear the cache and history of the web browser. 

9. Make sure no Trojan horse is running down background to steal your sensitive information. To check it simply go to the startup. You can access by typing in msconfig in run option from the start menu. 
10. Anonymously surf the internet using proxy sites e. g. flyproxy.com or you can use third-party software like IP shield, hot shield, IP changer etc. Hideman is the best one free and easy to use which lets you browse the web anonymously and makes it appear as if you are based outside India. As a limitation, you can surf as anonymous for up to five hours of the week, but it works very well. 
Read More

Monday, September 03, 2012

Ever Password: Free Encrypted Password Manager On Iphone, Ipad, Windows & Mac.

By Jitendra Indave On Monday, September 03, 2012

     The Ever Password provides a secure password management tool for windows desktop or laptop computers anytime. The user can effectively control it. It manages tons of accounts user ID and password information as well other important information in encrypted format. 
Read More

Saturday, August 11, 2012

Prevent Unauthorized User To Install Software In Computer.

By Jitendra Indave On Saturday, August 11, 2012
Prevent Unauthorized User to Install Software

     The InstallGuard is such application as blocks all new software installations and allows only authorized users to install software. This software monitors all the attempts made by an unauthorized user to install software. It prevents not only the installation but also access to any program. It monitors every single attempt made by an unauthorized user to install software in computer.
Read More

Sunday, August 05, 2012

Prey: An Anti-theft Solution for Phone, Laptop and Tablet

By Jitendra Indave On Sunday, August 05, 2012

Using Prey, user can track stolen or missing device that can be phone, tablet or laptop. It is open source software which gives remote control in your hand. Basically, a small piece of software, called agent installed in the device which silently sit and wait for your remote signal to track device. That signal can be sent using either internet or text message (SMS).As result user can retrieve hardware detail, geo location and network status of the stolen device. It also triggers specific actions on it.
Read More

Way to Secure Your USB Flash Drive

By Jitendra Indave On Sunday, August 05, 2012
Free Opensource Encryption Tool - Truecrypt
     
     Imagine the situation - you low your flash drive and it ends up in the hands of a criminal. The thief pokes around in your precious files and your private information gets into the wrong hands. What a nightmare! But there's a solution: encryption. If you're lucky enough to have a copy of Windows 7 Ultimate, you can right-dick the flash drive icon from The Computer menu and select Turn on BitLocker'to start the process. Other versions of Windows lack the BitLocker facility, but there's a free application that does the same thing -you'll find TrueCrypt at www.truecrypt.org.
Read More

Friday, August 03, 2012

Backup Your Social Networking Account, Web Contents and Cloud Application Data Using Backupify

By Jitendra Indave On Friday, August 03, 2012

The Backupify is a website which provides services for automated backup for all your LinkedIn, blog posts, messages, Facebook, Gmail, Twitter, Picasa, Flickr, Zoho and other web accounts. This is a perfect solution for backup of Google App. In case of data loss or corruption user can restore in minimum time, with single mouse click. A fresh and secure copy of user accounts for various websites will maintained by Backupify. According to business size one can choose a perfect plan for it. Right now it offers 15 days trial account for business plans.
Read More

Tuesday, July 17, 2012

Best 7 Tips to Keep Secure User ID and Password on Internet

By Jitendra Indave On Tuesday, July 17, 2012
User ID and Password Security Steps
As seen in the last update, not only LinkedIn but also other giant like Yahoo, not safe from hackers. Around 4 Lac ID and Password from Yahoo network was stolen and posted publicly. This makes normal user anxious. Anyone can think if such giants are targeted easily than what about normal user? Is he really secure over here with his ID and Password? We can’t say surely about it. But we still maintain strong security if we follow certain rules. Here Enigmazone providing information to our readers what to do to keep secure your user ID and password.  
  
Read More

Sunday, July 01, 2012

How To Set Authentication Icon For Verified E-mail Sender

By Jitendra Indave On Sunday, July 01, 2012
Varified Sender In Gmail
If you are customer of online shopping site ebay and money processor Paypal  then this is related to you. In Gmail, there is setting where the user can set the authentication icon for the mail sender who belongs to either ebay or  Paypal. This way the user can get information that the mail is not fake anymore. Spammers and phishers always tries to trap user by sending fake emails using the name of trusted site Paypal or ebay. This will really help to keep away such phishers and spammers. For that just go to option in Gmail. Select "Lab". In the list click on enable of "Authentication icon for verified senders" option. That's you are done. As output will be getting key icon as prefix in email if it is from a trusted source.
Read More

Wednesday, February 08, 2012

When to change password ?

By Jitendra Indave On Wednesday, February 08, 2012
In our daily routine of internet surfing so many times we enters user id and password. Sometimes it shows some illegal or suspicious activity that took place to access your id and password. In this case here one of the web site gives us indication that should you change password or not ? As web sites says that they are having database of the passwords in large number, those released by hackers publically. They just compare with it. If the match found  in that database, site suggest us to change password. You can check your here: https://shouldichangemypassword.com/   
Read More
// this code is not working of page navigation