Cyber Terrosrism

Cyber-terrorism, it is illegal activities that use computer as a tool to steal individuals or organizations secret such as theft of confidential information of companies, money laundering, distortion of information, racketeering, decoding software, including sorties to the computer system as computer viruses, destruction and so on.

Cyber Bullying

The positive aspects of technological progress have brought prosperity and comfort to our lives. Obviously  there is other side of technology called Cyber-bullying or  violence in cyberspace has returned to a bitter and wound in  heart to people who have been suffered with it.
Violence is the beginning of the wound. Bullying between children, we have know since a long time ago, and it's still exist in today's society. Bullying is physical harm to a person like a bigger brother bullies his little sister. The physical fight between the children is visible for us to judge who is the first move of bullying and who is the victim?
Today's technology is getting spread and scatter to even a small child. It has become a part of our lives, and a misuse that called Cyber-Bullying (Being bullied through cyberspace) is initially. Anyone can initiate this kind of violence even little children.
Cyber-bullying is bullying through cyberspace between children by different forms including slur, wording that malign others, slander, forward to others any confidential information via the Internet, or even a mobile phone. It causes the victim feeling pain and affect their psychological mind.
This kind of violence, it is impossible to know who is the culprit. This can be devastating to anyone anywhere at anytime. The offender is able continued to emphasize the violence. The victim, who has been bullied, some day may come back as an act of violence to avenge against the initiator. This wicked cycle has no end with the realization that anyone is committing it




Make your flash player updated

Updating flash player is important because it prevents from hacking. Manufacturers of security software alert to computer users quickly update the new version of Adobe Flash Player to protect from the damage caused  by identities theft or another vulnerabilities. After Adobe issued emergency patch 4 times since earlier year 2013, has found the vulnerabilities of the Flash Player that the theft uses to attack computer system by convincing the user to click a link that links to a website that includes malicious contents to computers.

Cyber Terrorism



Julian Assange answers a student's question about what he thinks of the term 'Cyber Terrorism'and the work of  sites such as 'Anonymous'.About Julian Assange: known worldwide as the founder and public face of WikiLeaks. Julian Assange has made headlines across the world by exposing government misconduct. He has championed the principle of freedom of information, yet some have criticized his activities as reckless and dangerous. Under Assange's leadership, WikiLeaks has published innumerable classified diplomatic cables and played a crucial role in shaping the international political landscape. He has currently as a fugitive in the Education Embassy i London.

The world's Most Famous Hackers

Famous Hackers in the world

1) Vladimir Levin
2) Johan Helsinguis
3) Kevin Mtinick
4) Dennis Ritchie Ken Thompson



Who are cyber criminals ?

~ Cyber Criminals ~
1. Kids: age around 9-16 etc. Most amateur hackers and cyber criminals are teenagers. They attribute into a pride to have hacked into a computer system or a website. These young rebels may also commit cyber crimes without really knowing that they are doing anything wrong.
2. Organized hacktivists: they are hackers with a particular motive.
3. Disgruntled employees: we cannot reach to people's mind or what they are thinking inside. Similarly, it's hardly believe how spiteful displeased employees can become. In the old fashion way they can go for strike against their organization. Now, since the increase independence on computers, it is easier for disgruntled employees to do more harm to their bosses by doing some unpleasant activities against their employer that lead its system error.
4. Professional hackers: they are mostly employed by organizations to monitor or hack information of rival industry that could be beneficial to them. 

Why computers vulnerable ?

Computers are extremely vulnerable. It's not very tough for hackers to steal national secrets from military computers. Here are examine the reasons for the vulnerability of computers.
1. Computers store large amount of data in tiny space: Let see a CD ROM, it can store an emormouse information.
2. Computer is accessible:  as we have heard nowadays the strongest of firewall authentication systems still  have been cracked.
3. Computer is complex: the complexity of computers allow hackers exploiting and gain what they want. There are always weaknesses or flaws for the criminal to breach the system. Even the weaknesses have been patched up, but the hackers will then find another flaw to exploit and the cycle goes on and on. So designing a great security operating system is very crucial.
4. Human error: people leave careless specifying their password for a system, their use a guessable password.
reference: http://www.bezaspeaks.com/cybercrime/whyit.htm




History of Cyber Crime

The era of modern computer  was begun with the analytical engine of Charles Babbage. In 1820, a textile manufacturer in France,  Joseph-Marie Jacquard  produced loom which is the same that cyber crime was first recorded. The engine allowed the repetition of a series of steps in the weaving of specials fabrics. Jaquard's employee found it in a fear because with the machine they are likely not to be hire, the device will do all the task. So they committed acts of sabotage to stop the using of the device. This is the first recorded cyber crime. 
referenc: http://www.bezaspeaks.com/cybercrime/history.htm

Tips For Buying Online

When you the shop online on the Internet you should use:1. Create a safe password to log in in to the site. Do not a general tern used in everyday life such as date of birth, name of family member. Make password complicated by using uppercase, lowercase, number and symbol. Also use a unique password for each account.
2. The process of ordering and payment. Make sure the online store uses Secure Socket Layer (SSL) which encrypts sensitive information. Try to look an icon key at the bottom of the browser to see if you are on a secure site or not
The reliability of the seller : take a moment to familiarize with the merchant or vendor first. View information about the seller as we ass read the review and comments from customers toward the online shop. Many E-Commerce sites including eBay has feedback system to display the comments and ratings from other buyers. Ask questions about the product from vendors before buying or bidding for auction. Good communication will help the transaction go smoothly.
Look for a return or a refund policy. If there are no such policies, ask vendors if they have limited time to return products, a full refund or exchange for another product of equal value or not.
The specific information of product
-
Product with a high demand/high value, rare or expensive such as jewelry, computer, and electronics require special care. You should double check and make sure before order.
- Confirm as a genuine. For example, a collection of sports, verify to ensure that the product is genuine.
Common Alarm: if you notice signs as the following, you should be extra careful
- Delivery delays. Do not overlook the delivery stated.
- Unsolicited offers. Receiving mail from another vendor offering similar product that you just purchased may  be fraudulent.
- Too good incredible. If the offer is too good to believe, this case the seller set the price very low or selling products that almost impossible to find now

Online shop has been popular among the people, and it seems increasingly nowadays. It is saving time because we do not have to drive to check for physical shops so as to lots of fraudulent has been raised on the online shop we must to be extra careful. Do apply the provided tips that would save us from those breaches.

Facebook Gains for Terrorists Seeking Friends, UN Reports

According to the United Nations, the biggest social network like Facebook is risk for users to share message and picture and so on because there are terrorists try to spread propaganda and plan potential attacks.
Read more please visit http://www.bloomberg.com/news/2012-10-22/facebook-gains-as-tool-for-terrorists-seeking-friends-un-says.html

Facebook is not safe anymore

Cyber Terrorism News

This post I included  a news regarding to cyber-terrorism. The article is about North Korea blamed South Korea for cyber-attack. The details is as the following.

South Korea has accused North Korean spies of masterminding a series of high-profile cyber-attacks last month. Tens of thousands of computers were made to malfunction, disrupting work at banks and television broadcasters in the South. Investigators in Seoul said they had discovered some of the code involved was identical to that used in malware previously linked to Pyongyang. The allegation adds to growing tension on the Korean peninsula. On Tuesday North Korea told foreigners in the South to "work out measures for evacuation" to avoid becoming involved in a "thermonuclear war". Seoul's foreign minister subsequently said that there was a "considerably high" risk that its neighbor might fire a ballistic missile at it over the coming days. North Korea has not commented on the cyber-attack accusation.
Cyber-evidence
About 48,000 PCs and servers in the South were struck on 20 March. The assault shut down computer networks at TV stations KBS, MBC and YTN, and halted operations at three banks - Shinhan, NongHyup and Jeju. Investigators in Seoul reported their initial findings suggested North Korea's military-run Reconnaissance General Bureau had been responsible. A spokesman announced that 30 out of 76 programs recovered from affected computers were the same as those used in previous strikes. In addition he said that 22 of the 49 internet protocol (IP) addresses involved in the incidents matched those used in attacks blamed on the North over the past five years. The recent assaults shortly followed a South Korea-US joint military exercise, but it was suggested they had been long in the planning.
"The attackers gained control of personal computers or server computers within the target organisations at least eight months ago," a government statement reported in the Korea Herald said.
"After maintaining monitoring activities [they] sent out the command to delete data stored in the server, and distributed malware to individual computers through the central server."
South Korea's Financial Services Commission added that no bank records or personal data had been compromised.
Outdated system
Previous cyber-intrusions blamed on Pyongyang include attempts to block access to the website of South Korea's presidential office and other government departments, and hacks of computers at Nonghyup bank and the Joonang Ilbo newspaper.
In turn, North Korea has accused both the South and the US of preventing users from being able to visit its official media sites - the Rodong Sinmun newspaper and the Korean Central News Agency - earlier this year.
It has led some commentators in the South to criticise the state of their cyber-defences bearing in mind the public there is much more reliant on the internet than citizens in the North.
"South Korea cannot cope with unpredictable and sophisticated provocations from North Korea with a bureaucratic, rigid mindset," wroteChae In-taek in the Joonang Ilbo.
"National security cannot be assured through an outdated system. We must come up with an innovative security system fast."

reference: http://www.bbc.co.uk/news/technology-22092051

Cyber-Stalking

Cyber-stalking is the use of information and communications technology, particularly the Internet, by an individual or group of individuals, to harass another individual, group of individual, or organization. The characteristic of cyber-stalking includes false accusation, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors of sexual purpose, and gathering information for harassment purpose.
How Cyber-Stalking harms ? It is working to frighten and destroy friendship, credit, careers, self-image, and confidence. Spyware software can be used to monitor everything happening on your computer or cell phone, giving tremendous power and information to cyber-stalkers.
How to prevent cyber-stalking ? There are simple way to avoid cyber-stalking.
- As we know that it is risk to be destroyed when we share personal information in public spaces so try to not share any personal information anywhere online, not give it to strangers, including in e-mail or chat rooms
- Be cautious about meeting online acquaintances in person. If you choose to meet, do so in a public place and take a long friend.
- Make your that your Internet provider and Internet Relay Chat network have as acceptable use policy that prohibits cyber-stalking
- If a situation online becomes hostile, log off and surf elsewhere. if a situation places you in fear, contact a local law enforcement agency.
These are simple ways to stay away from stalkers. It is not complicated to apply them for your safety and happiness.

Online Defamation (Continued)

In an online defamation, there are some words and their examples need to be understanding. Those words are public figure, libel and slander.
Public Figure: is a term applied in the context of defamation actions as well as invasion of privacy. A public figure (such as a politician, celebrity, or business leader) cannot base a sample on incorrect harmful statements unless there is proof that the writer or publisher acted with actual malice. The burden of proof in defamation actions is higher in the case of public figure.
Libel: is a false statement of fact expressed in a fixed medium, usually writing but also a picture, sign, or electronic broadcast.
Slander: is a defamatory statement expressed in a transitory medium, such as verbal speech. It is considered  a civil injury, as opposed to a criminal offence. Actual damages must be proven for someone to be held liable for slander.
We can see that the two definitions of libel and slander are similar, is false statement or defamation by written or printed words,or in any form other than by spoken words or gestures. 
Examples of Libelous Statement
-
Charging someone with being a communist (in 1995)
- Calling an attorney a " a crook"
- Accusing a minister of unethical conduct
- Accusing a father of violating the confidence of son
Examples of Non- Libelous Statement
- Calling a political foe a "thief" and "liar" in chance encounter
- Calling a TV show participant a "local loser", "chicken butt"
- Calling someone a "bitch" or a "son of bitch"
I would like to make "online defamation" ends here. See you next post. 

Online Defamation

The tort f cyber defamation is considered to be the act of defaming, insulting offending or otherwise causing harm through false statements pertaining to an individual in cyber space. This commonly done through the Internet via websites, blogs, forums, emails and instant messaging, chat rooms and now in the social networking. Defamation law in general describes the tort as "the issuance of a false statement about another person, which causes that person to suffer harm".

Elements of a Defamation Claim: the party making a defamation claim (plaintiff) must ordinary prove four elements.
- a publication to one other than the person defamed;
- a false statement of fact;
- that is understood as being of and concerning the plaintiff; and tending to harm the reputation of plaintiff. If the plaintiff is a public figure, he or she must also prove actual malice.

There are ordinary 6 possibles defenses available to a defendant who is used for libel (published defamatory communication)
1. Truth. This is a complete defense, but may be difficult to prove.
2. Fair comment on a matter of public interest. This defense applies to opinion only, as compared to a statement of fact. The defendant usually needs to prove that the "opinion" is honesty held and the comments were not motivated by actual "malice"
3. Privilege. The privilege may be absolute or qualified. Privilege generally exist where the speaker or writer has a duty to communicate to a specific person on a given occasion. In some cases the privilege is qualified and may be lost if the publication is unnecessarily wide or made with malice.
4. Consent. This is rarely available, as plaintiff will not ordinarily agree to the publication of statement that they find offensive.
5. Innocent dissemination. In some cases a party who has no knowledge of the consent of a defamatory statement may use this defense.
6. Plaintiff's poor reputation. Defendant can mitigate for a defamatory statement by proving that the plaintiff did not have a good reputation to begin with. Defendant can prove plaintiff's poor reputation by calling witnesses with knowledge of the plaintiff's prior reputation relating to the defamatory content.
   Anyway, an opinion cannot be defamatory, but it is merely labeling a statement as your "opinion" does not make it so. Courts look at weather a reasonable reader or listener could understand the statement as asserting a statement of verifiable fact.

Cyber Law

The Cyber law Act in Malaysia: the Malaysian government has passed several cyber law to combat and reduce the Internet fraud. These cyber laws are as the following
- Digital Signature Act 1997: it secures electronic communications especially on the Internet. Digital Signature is an identity verification standard that used encryption techniques to protect against e-mail forgery.
The encrypted code consists of the user's name and a hash of all the parts of the message. By attaching the digital signature, one can ensure that nobody can eavesdrop, intercept or temper with transmitted data.
- Computer Crimes Act 1997: it gives protection against the misuses of computers and computer criminal activities such as unauthorized use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks. By implementing the Computer Crime Act 1997, users can protect their rights to privacy and build trust in the computer system.
- Communication and Multimedia Act 1998: is to secure information, the network is reliable and the service is affordable all over the country. This Act also ensures high level of user's confidence in the information and communication technology industry.

Cyber law refers to any laws relating to protecting the Internet
and other online online communication  technologies

Notorious Cyber Criminals

Hacker is some who seeks an exploit weakness in a computer system or computer network. They will be motivated by multitude of reasons such as profit, protest, or challenge. Nowadays, there are a lot hackers, they are a very diverse bunch  and their portrayal in the media has ranged from the high-tech super spy. In this post will introduce to ten of the most famous hackers.

Black Hat Hackers: who work to exploit computer systems. Some of then do it for fun and curiosity.There are five most famous of black hat hackers
1. Jonathan James: cracked into NASA computers, stealing software worth approximately $1.7
2. Adrian Lamo: Dubbed as homeless hacker Broke into New York Times and Microsoft.
3. Kevin Mitnick: The Department of Justices describes him as the most computer criminal in the U.S.,
his exploit detailed into two movies Freedom Downtime and Takedown.
4. Kevin Pulsen: Known as Dark Dante and law enforcement dubbed him as the Hannibal Lacter of computer crime. He hacked into LA radios KIIS-FM phone lines, which earned him a brand new Porsche, among other items.
5. Robert Tappan Morris: Known as the creator of the Morris Worm. He wrote the code for the worm, the first computer worm to be unbleached on the Internet.

White Hat Hackers: Hackers that use their skill for good are classified as "white hat". They work often work as certifid "Ethical Hackers", hired by companies to test their integrity systems.
1. Stepehn Wozniak: is famous for being the "other Steve" of Apple along with current Apple CEO Steve Jobs, co-founded Apple Computer.
2. Tim Berners-Lee: is fame as the inventor of the World Wide Web, the system the we use to access site. documents and files on the internet. He has received numerous recognition, most notably by the Millennium Tecnology Prize.
3. Linus Torvals: the very popular Unix based operating system. He calls himself "an engineer"
4. Richard Stallman: stall-man's fame derives from the GNU project, which he founded develop a free operating system.
5. Tsutomu Shimomura: reach fame in an unfortunate manner. He was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him

reference: http://www.itsecurity.com/features/top-10-famous-hackers-042407/

Computer Crimes Act

Today as there has several fraudulent activities been occurred by using a computers as a tool to commit computer crimes, a law needs to be formed to promote a high level of consumer confidence and to protect the information security and network reliability and integrity. Therefore, the first important step that is taken by the government to combat this new type of crime is by introducing a new legal framework to facilitate the development of ICT systems by countering the threats and abuses related to such system called Cyber Laws of Malaysia.

Malaysian legal frameworks

- computer crimes in Malaysia are mainly provided in the Computer Crime  Act 1997since the Act was intended to be the first specific cyber-crime legislation in the country
- Due to limit scope of the Act compared to the evolving types of computer crimes, not all redresses can be sought to this specific law.
- This where other laws including the conventional laws would cover the remedies. Included in the list are Copyrights Act, Communication and multimedia Act, Panel Code and Internal security Act.

Computer Crimes Act 1997:  One of the main laws that cover computer crimes is the Computer Crimes Act 1997, designed to make criminal offence. It was passed to provide for offences relating to misuse of computers. It addresses unauthorized access, unauthorized modification, and wrongful communication. It prohibits different types of computer related crimes.  
  • Within the first category, CCA criminalizes the acts of unauthorized access (section 3), unauthorized modification (section 5) and wrongful communication of access code or passwords (section 6)
  • Meanwhile, for the second category that involves other substantially criminal offences, the CCA penalizes the act of unauthorized access that purports to facilitate further offences (section 4)
         Unauthorized Access
  • Section 3(1): A person shall be guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case
  • The section follows on by stating that a person guilty under this section is liable to a maximum RM 50,000.00 fine or to 5 years imprisonment or to both.

    Unauthorized Modification
  • Section 5(1): A person shall be guilty of an offence if he does any act which he knows will cause unauthorized modification of the contents of any computer
  • The offences under this section are punished with a maximum RM 100,000.00 fine or to 7 years imprisonment or to both. However, if the act is done with further intention of causing 
  • injury, it can be punished up to RM 150,000.00 fine or to 10 years imprisonment or both.

    Example of unauthorized modification
  • Unauthorized alteration, amendment and modification of data
  • System intrusion and sabotage
  • Website defacing
  • System and website destruction
  • Spreading virus that may cause data alteration or system destruction.

    Wrongful Communication of Means of Access
  • Section 6(1): A person shall be guilty of of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate.
  • With this provision, it is clearly an offence for any person to let unauthorized people know any means of access to a computer system (in the form of number, code, PIN, password, etc.) This provision is very important to ensure the confidentiality and integrity of an information and data stored in the computer system. This type of offence is punishable by a maximum RM 25,000.00 fine or a 3 years imprisonment or both.

    Computer Crime Act is very essential to be formed in such frauds easily happen. The Act is remaining for combating computer threats that committed by criminals. One more significant to stay away and avoid from bleaches is to be careful ourselves such as do not write down any password in any insecure place. 

Categories of cyber-crime

Last post I stated that cyber-crime can be divided in to three major categories: cyber-crime against persons, property, and government. Within this post material I would like to include its details.

Cyber-crime against persons 
This type of cyber-crime is including transmission of child pornography, harassment, identity theft and cyber stalking with the use of a computer such as email.

Cyber-crime against property It is including unauthorized computer trespassing through cyberspace, computer vandalism , transmission of harmful program, and unauthorized possession of computerized information, hacking and cracking. In addition, creating and dissemination of harmful computer programs as well as software piracy.

Cyber-crime against government  
A distinct example of is cyber-crime terrorism, in which cyberspace is used by individual and groups to threaten government and to terrorize the citizens of a country. This crime may take the form of individuals
"cracking" into government or military maintained web site.

There are commission of computer crimes, as follows
Illegal use of the Internet
- Money laundering
- Pom
- Selling illicit drug
- Propaganda by illegal organisations
- Defamation,slander
- Untrue or false information
- Illegal flesh - traffic
- Illegal gambling
- Copyright violations of Software
- Market manipulation

These are some of commission of computer crimes. Next post I would like to put a material about Computer Crime Act.

Computer Crimes

"Cyber-crime" I believe that most people are very familiar with the word especially people who are used with computer and the Internet. Cyber-crime has become heavily influenced of this rapidly technology changing period. According to Ferrera, et,al "Cyberlaw Teext and Cases" said that cyber-crime is any illegal act that involves a computer, its system, or its application. It is any intentional act associate in anyway with computers where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain as well as US. Dept of Justice stated that cyber-crime is any illegal act for which knowledge of computer technology is essential for either its perpetration, investigation, or prosecution. There are another definitions of cyber-crime that was given by Computerdocter Online Dictinary,  Criminal activity committed on the internet. This is a broad term that describes everything from electronic hacking to denial of service attacks that cause electronic commerce sites to lose  money also Thefreedictionary.com, crime committed using a computer and the Internet to steal a person's identity or sell contracted or stalk victims or disrupt operations with malevolent programs. Additionally, in accordance with Technology Support Service said that Crime related to technology, computers and the Internet. To simply conclude its definition is any activities refer to a misdeed involving a computer, its system or its application.

How could a crime be committed ?  
There are several ways for criminals to involve into computer-crimes, They are using computer as a tool for committing a crime, that says; unauthorized access into a computer, making unauthorized changes in data or information, inserting bug or viruses, bombardment of website with junk message, defacing wbsite. The followings are chance method of violation :-
- Fraudulent use of ATMs
- Credit card frauds
- Theft of money from transfer accounts trough manipulation of computer processes
- Frauds committed through internet transactions
- Fake call and the charges are billed to anther customer
- Used to hack into another computer.

Who is committing cyber-crime ? 
Anyone could be committing a computer-crime, bu latest incidents show that computer-crime can be committed by :-
1) Students
2) Members of organized crime syndicates
3) Disenchanted employees
4) Terrorist who gain on their computer proficiency to commit frauds, theft, and terrorism activities.

Types of cyber-crime: cyber-crime can be divided into three major categories; cyber-crime against persons, property and government. According to Council of Europe's Convention on Cybercrime 2001, cyber-crime is typed into the followings :-
- Offence against the confidentially, integrity and availability of computer data and systems
Computer-related offences
- Content-related offences
- Offences related to infringements of copy right and related rights
- Ancillary liability

Today I would like to finish here, as you can see and read in the last post  I already talked  about common cyber crimes which included in topic of "Danger of Online world".

Danger of online world

There are various frauds on the online world. The followings are example if fraudulent incidents that happen such this rapid changing technology period.

1. Fraudulent sales: This fraud has been long time since the world has no internet. As the availability of the online trade, criminal take advantage of unseen face of each other during a trading. Forexample, buyers do not know where the seller is. So it's easier  to occur a deception between the parties. This incident regular happens especially with a product that has been interested such as iPhone.

2. Steal credit card number
     This is the most feared. In fact, it is not difficult to block out the number on the card from Hacker. The first step to dealing with a reliable web or shop online, has encryption system for paymen by observing the web address is https:// not just http:// 

3. A lure is available.
     This usually comes in the form of his term SMS, MMS or a phone call from an automated system. When we receive the call, then press the button or press the SMS, MMS without realization or not listen or read well before it becomes a subscription.The best way is not to accept a call from strange or do not open tSMS or MMS sent from unknown people. 

4. Invited to join a direct sales business.
     While direct sales is not a criminal. Sometimes an online form that will allow us to bother. Or lose money without knowing it. If we have to fill out information that sometime it involes with confedential information hence we might be be revealing our secrets information which may lead  malicious user to commit crimes. 

These are some of those frauds that we often see and her from the internet or TV or newspaper. We should be careful and always realize that crimes can happen any where and any time. 

Identity theft and scams.


Every time you open the email, visit unfamiliar websites or download anything on the Internet you are subjected to the risk of the activities. A virus or malware that may steal your private information. The followings are the general characteristics of fraud on the computer system.

Attacks Phishing
Phishing is a fake website or email. Often pretends to be from reliable organizations such as banks and the use disguise to steal personal information.

Operation Aurora attacks
Attacked through a vulnerability in the browser.

The stolen information to purchase online
Hackers can use Cross Site Request Forgery (CSRF) to pose as you. And financial transactions on your behalf. But you will be safe. If you follow the simple instructions from the bank.

Phone fraud
One way that criminals use today is to call you and claim to be contacted by a bank or government agency. And try to intimidate the victim offers tips for smooth transactions with the bank.

The incidents have been occurred a lot in such this rapid changing technology. Learn how to observe and how to protect ourselves from the deceptions.

Stay Safe When Using Free Email

We must admit that these days the daily life of the people has more to do with the Internet and computer systems. Using a mobile phone, searching information on the Internet, involving electronic mail to communicate between friends and relatives as well as deal between the government and private organizations. Most popular free email is such as Hotmail or G-mail. These free emails are easy getting risk of an attack because your personal information are stored in the server of the service provider. Your confidential information might be leaked to the public. When your email get hacked your life can be ruined and carried out a terrible effect. You can have even money stolen as an effect. So if you own and use any free email, here are some of the very minimum things you should do if you want to stop hackers.
  • Make your password complex, it must not be a name, birthday, ID number or information about someone or something around you. An complex of a strong password is something like "ny_up+K.
  • Update anti virus software and anti-malware software, there are various free anti virus programs on the internet. Use the program to scan for things that anti virus programs miss and update it automatically.
  • Be careful of your password and your important information, do not send it store online or offline. Especially through chat or email. If you need to send passwords to workers, family then call then of the phone. You should also avoid saving passwords on your hard drive as that too is really easy to access.
  • Make your security question tough, those security question like "what is your pet's name ? " Make them complex answers. If you ever get hacked you need this information to re-gain access to the account.
  • Back up everything, constantly back up your email to an external hard drive. If your information were deleted you can get it back up.
  • Don't click links in emails, do not ever click any such email you get because it might be a tourist trap. 
  • Use a phishing filter 
  • Research and read up, up to date with the latest in internet security.

    I hope this benefit to readers that may help you to stay away from hackers. Stay posted and interact with me so we can carry out a discussion.