Skip to main content

Posts

Showing posts from December, 2012

How to Detect FAKE Profiles in Facebook...???

1.   Look for photos in the profile.If there is only one photo of the individual in the whole profile it makes it quite clear that the account is fake. 2 . Look for status updates,wall posts and comments.If the user hasn’t updated a status for quite a long time and hasn’t been involved in any wall posting or commenting of other statuses,it means that the profile is likely to be fake. 3.  Look at the recent activities.If it is that the user has just been adding randomers and making new friends,and that there are no pages liked or groups joined,it suggests that the user is determined in jst adding people and hence the profile is fake. 4.  Check out the friend list.If found that maximum of the friends are of the opposite gender,it can be assumed that the profile is used either for fun or for random dating. 5.  Check the info.If found that there is no ideal links given regarding school or education institutions or workplace and that the user is looking for dating and interested in both men

Non-Windows attacks will increase in 2013

As your work and play converges even more on a digital device - a tablet, smartphone or the laptop, beware of the increasing threats.  Android   devices are now the highest selling mobile devices in the Asia Pacific market and hackers will take advantage of that by developing mobile malware. Consumers aren't the only ones at risk of mobile threats. Enterprises, particularly those embracing Bring Your Own Device (BYOD), are also at risk. Overall, non-Windows attacks will increase in 2013. Software security expert  McAfee , an  Intel  company, in a release, looks at the threats to computers in 2013:  Top 10 Enterprise Security Predictions   1. Targeted Attacks: 2012 saw an increased growth in targeted attacks that proved successful in disrupting service and fraudulently obtaining significant amounts of intellectual property. We expect cyber criminals will continue to use this method and as a result, in 2013, we are likely to see significantly more targeted attacks and targeted malwar

Protection from Hacking

Hacking Protection , takes place with the explicit permission of the company whose system is being attacked.  Hacking Protection , often performed by white hats or skilled computer experts  using them for defensive purposes, In other words is the use of programming skills to determine vulnerabilities in computer systems While the  Hackers  or black hat exploits these vulnerabilities for mischief, personal gain or other reasons resorting to malicious or destructive activities. The  security specialist  evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. The word hacking has strongly negative connotations, and, for the most part, rightly so. But securit specialization is much different. It takes place with the explicit permission of the company whose system is being attacked. In fact, their “good guy” role is underscored by the nickname  “White Hat” Security specialist  have been given . The nickname is a throwbac

Who Creates Computer Viruses?

Computer viruses are written by a variety of perpetrators. Historically they have been brilliant teenage kids or desperate people in search of attention. They are typically male and in their teens or early 20s. However,  David L. Smith , author of the famous  Melissa virus , was 30 when the FBI caught up with him. Still, I like how Jack Sebbag, a vice president at the  antivirus software company McAfee, characterizes virus writers: "They're 14-year-old kids who can't  get a date , but have incredible talent and  are looking for  a challenge to bring (millions of) computers down just to get a little notoriety." And some, as it turns out, are looking for work. In one variant of the MyDoom worm, there was a message to the antivirus software industry that said, "We [sic] searching 4 work in AV industry." It's an ill-conceived strategy, of course. No one in the antivirus industry will go near them. Graham Cluley, senior technology consultant for Sophos, an an

Smartphone Security : Get Smart to your Mobile...!!!

You probably store a lot of personal and financial information on your smartphone that you would not want revealed if it is lost or stolen. Here are some ways that you can help increase mobile phone safety and secure our smartphone. 01) Protect your phone with a password or Personal Identification Number (PIN). 02) Be careful when you install apps on your phone. 03) Install u pdates for your phone. 04) Make sure your phone has a feature that helps you find it if you lose it or if it is stolen. 05) Don't jailbreak or root your phone. 06) don't use the free Wi-Fi at a coffee shop or other access point if you are doing something sensitive on your phone, like checking a bank account or making a payment. 07) Have updated security software on the phone. 08) Be aware of applications that enable Geo-location. These application will track the user's location anywhere. 09) Use the same precautions on your mobile phone as you would on your computer when using the Internet. 10) If you