Some “Dumb” Hacks

Hackers are known to be very clever and smart — which they need to be to remain one step ahead of the IT Security Professionals and the law administrators. However, here are some interesting “dumb moves” by Hackers that helped the officials track them down. Extracted from an article by Alan Wlasuk, and from a recent “PC World” article.

 

Continue reading “Some “Dumb” Hacks”

ATM Skimming – Precautions To Be Taken

ATM Skimming happens when thieves attach devices onto ATMs in order to copy a credit-or-debit-card number, the information on the magnetic strip and even your personal identification number.

 

A fraudster can benefit from ATM Skimming by creating a cloned card that can be used in an ATM or at a POS terminal. For using in the POS Terminal, only the magnetic strip info is required, whereas for using in an ATM, the fraudster will need the PIN also.

 

Thus there are two critical components involved in ATM Skimming : a device on the card-reader slot to obtain the magnetic strip information from the card; and either a camera or a pin-pad device on the existing pin-pad to obtain the PIN.

 

Continue reading “ATM Skimming – Precautions To Be Taken”

Controls and Governance for Cloud Computing

Of late, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Companies have recognised that by simply tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. However, Cloud Computing is fraught with security risks and more and more concerns are being raised on the risks involved.

Continue reading “Controls and Governance for Cloud Computing”

Whaling – an advanced and more focused model of Phishing

 

Whaling describes the most focused type of phishing currently encountered by businesses or government – targeted attacks against groups of high-level executives within a single organization, or executive positions common to multiple organizations (e.g. the CTO or CFO).

 

In a whaling attack, the phisher focuses upon a very small group of senior personnel within an organization and tries to steal their credentials – preferably through the installation of malware that provides back-door functionality and keylogging.
Continue reading “Whaling – an advanced and more focused model of Phishing”

Two Step Authentication for your Google Account

Losing control of your gmail account could be a nightmare.

 

Google has an advanced sign-in security for interested users which can prevent anyone else from logging into your account – even if they have your username and password.

 

This is done by configuring your phone to receive a one time password each time you wish to login, thus preventing others from accessing your google account.

 

If you have very sensitive information – including other site passwords – in your gmail account, check out this method at here.

Tech Terminology Demystified – Android

Android is an open-source software stack for mobile devices that include an Operating System, middleware and key applications.  Android’s OS is based upon a modified version of the Linux kernel.

 

Google purchased the initial developer of the software, Android Inc, in 2005.  Google and other members of the Open Handset Alliance collaborated on Android’s development and release.  Currently, the Android OS is the world’s best-selling smartphone platform.