Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

Friday, 17 July 2015

Cyber Criminals Behind E-extortion

VADODARA: When you think of cyber crime, you may usually picture a hacker sneaking into networks and installing viruses designed to destroy data and computers. But cyber crime is not just about destroying computers and data for malicious purposes. Instead it is to steal information and data for financial gain.

This is what founder and CEO of Quick Heal Technologies Kailash Katkar said here on Saturday.
Katkar stressed that cyber criminals are not just making money and robbing hard-earned money of victims, their well-networked underground activities are making even the corporate sector victims.
        Faceless unknown unrecognizable anonymous man with digital tablet computer browsing internet.
"These cyber criminals work from countries which do not have strong cyber laws and are fully involved in extortion activities. They are constantly finding new ways to make money off innocent people," said Katkar, a school dropout, who created a Rs 187 crore anti-virus software business with a seed capital of Rs 15,000.

"In fact, our threat research and response team receives over one lakh unique virus samples on a daily basis. Just six months ago, our team used to receive nearly 75,000 unique virus samples and with the passage of time this number is expected to increase," said Katkar, who in 1985 had taken up a job at a local radio and calculator repair shop to supplement his family's income.

Talking about the growth of anti-virus software industry in the country, Katkar said last year, the total market was estimated at Rs 800 crore.
"The anti-virus software industry is expected to grow because of the penetration of smart phones. While internet is costly in India and computer penetration is still much lesser compared to the developed nations, penetration of smart phones has increased tremendously. This has led to development of security solutions for mobile devices," he said.

"Computers have been able to reach to only 10 per cent of our total population against 70 to 80 per cent PC penetration in developed countries. But penetration of smart phones has increased by over 100 per cent," he said.
'Americans can be easily hypnotized'
Vadodara: Americans can be easily hypnotized compared to any other population in the world. This is what world's most experienced hypnotist and world's first ever hypnotist to appear on television Andrew Newton believes.
"My experience suggests that Americans are the most regimented people on this planet. You can find them standing in queue everywhere and getting all kinds of permits to do small little things," said Newton adding that in contrast the Australian population is a bit aggressive and difficult to be easily hypnotized.
"The United States government is easily looking into emails and text message of its citizens in the name of freedom, democracy and security threat. This spying has a commercial aspect too as the same data is used for targeted election campaigns," said Newton, who has hypnotized over 60,000 people worldwide, including many famous names in the United Kingdom and abroad.
Newton, who has over 6,000 stage and television performances under his belt, said that in the UK like in the US, hypnotism has become a massive industry.
"Thirty years ago, there were just 400 hypnotists in the UK. Now, there are over 4,500 hypnotists, including those enrolled with the UK's national health scheme," said Newton, a senior lecturer in hypnosis at the Hypnoseakademiet in Norway, Europe's premier hypnosis and EFT training school.
"The word 'hypnosis' has always brought a sense of mystery and magic in our minds, but it is a complete science of the subconscious itself. It can't cure cancer but it is very useful for dealing with stress or combat insomnia," he said.

To learn about Identity Theft, contact www.cibilconsultants.com

Source: Secondary

Sunday, 12 July 2015

Are you Safe On The Internet?

Gone are the days when you had to stand in long queues to pay your electricity bills, phone bills, income tax returns and almost everything. But easy access to the internet and availability of these services online not just provide relief but of course helps in saving time. At the same time users are also exposed to the threats of identity theft, loss of personal information and spams.


           
If we follow a few golden rules we can easily protect our personal information and greatly reduce the possibility of fraud. Here are some of them:
Security suites
Outpost Security Suite: This is the only free security suite that offers antivirus, firewall and anti malware in a single package. It even offers email and web surfing security for online protection and monitors application behavior to keep a check on malicious infections. Being free, it does have some limitations — only one auto update is allowed in a day. Others need to be manually done. Also, it does not include identity theft protection or technical support.
Norton 360 (v 6.0): As an all-in-one suite, Norton 360 (Rs 1,649) is pretty complete. Apart from protecting against local threats, it has a set of tools for online identity theft protection, to tune up your PC, Email and instant message monitoring as well as browser plugins to warn you of harmful websites & downloads. It even has parental controls to track Internet usage and keep kids safe from online threats. Finally, the price includes 2GB cloud storage. Norton 360 can automatically take a regular backup of important files to the cloud.
Firewalls
Comodo: The free Comodo firewall uses cloud-based data to to protect your computer against online threats and programs. It is capable of detecting most trojans, worms, hacker attacks and even has a sandbox mode where new programs can be run in a protected, virtual environment to make sure that they are not harmful. In 'game mode', Comodo works silently in the background — useful if you don't want to be disturbed while playing a game or watching a movie. Finally, a built in 'TrustConnect' Wi-Fi feature encrypts and safeguards data transfers when connected to a public network.
ZoneAlarm Pro: The Pro version of ZoneAlarm's Firewall (US$ 30/year) protects your computer against hackers and makes it invisible online by hiding your information. It has a built-in anti-phishing tool that stops fake/infected websites from opening on your system and it even authenticates websites to show you which ones are secure and which are not. If an active download is infected, the firewall automatically suspends the download for protection. It even gives you 2GB online storage where the program uploads and backs up important data that can be restored if required.
Mobile
Avast for Android: Avast's free app provides real time antivirus protection and even offers a firewall that can stop any app from accessing the Internet. It even offers SMS/call filtering, an app task manager and can show access rights of each app installed to detect any data stealing. The app has a strong set of anti-theft features that include lost notification on the phone, SIM lock, SIM change notifications, remote restart, remote wipe as well as the option to remotely locate your phone using GPS. The only thing that this free app skips out on is any sort of data backup service.
VirusBarrier for iOS: This $2.99 app can do on-demand scans of content downloaded on to your iOS device. The program scans for malware, adware and hacker tools on the iOS device which might get transferred and then infect the computer (Windows/MAC/Unix) when the device is connected to it. It can scan through zip files, email attachments, files stored online in Dropbox or on FTP severs and can also scan websites for phishing links or other online threats.
More options for advanced users:
Stay safe while downloading: Using Torrents is not illegal - sharing of copyrighted information is. Having said that, if you are a torrent user and are fed up of internet service providers clamping down on torrent speeds or are wary about your privacy being compromised (because of over-zealous media industry watchdogs), you should consider services like www.peerblock.com and www.btguard. com.
BTGuard's paid service completely hides your computer's IP address and provides a secure, encrypted route for your torrent data. PeerBlock is open source and works in conjunction with www.iblocklist.com. It essentially blocks your computer's communication with advertising or spyware oriented servers, computers monitoring torrents or computers which have been 'hacked' ( botnets).

To learn about, Identity Theft, visit- www.cibilconsultants.com
Source: Secondary

Friday, 26 June 2015

Lakhs of Indian Computers Infected

NEW DELHI: Over 42 lakh computer systems, including mobile phones, were infected in India by June last year with 'botnet' malware being used for various kinds of cyber crimes.
As per the data shared by Indian Computer Emergency Response Team (CERT) with other government departments, the botnet infected systems in the country was 25,915 in 2007 which peaked to about 65 lakh in 2012.
The number of botnet infected system grew rapidly and reached over 60 percent in first half of 2013.
"The bot infected systems are under control of cyber criminals. The bots steal sensitive information such as online credentials, credit card numbers, email id and passwords which cause data loss and financial loss to victims," CERT-in said in on setting up botnet cleaning centre in the country.
The term 'bot' is short for robot. Cyber criminals distribute malicious software that can turn a computer into a bot. These bots can be networked together as 'botnet' that can perform automated tasks over the Internet, without the owners of the devices coming to know about it.
Criminals use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud. It also slows down speed of infected computer or mobile phone.
Cyber criminals use Internet to plant malicious software or programmes in a system. In India there are about 210 million Internet connections which include both mobile phones and computers.
To know more about Identity Theft visit www.cibilconsultants.com
Source: Secondary