The same engines or machines that generate spam – bots – are now sending those bots into banks to scour for ways inside the vault. Spam, the obnoxious stuff that everyone expects to be filtered out by “junk mail” filters, has become the Trojan horse of choice among cyber criminals. The BBC recently conducted a research project looking at the internet address blocks used by 12 of Britain’s most well-known and well-established financial institutions. In the course of their research, they discovered that in 2013 alone, there were more than 20 incidents within British banking networks involving malicious activity, despite banks having some of the strongest defenses against cyber-attacks (Source: http://www.bbc.co.uk/news/business-25336448).
How Cyber Crooks are Cracking the Vault
Inside sources say that banking employee machines are routinely infected by malware. Multiple sources indicate that viruses, spam and other malicious messages regularly appear on banks’ corporate networks, most likely as a result of an employee or contractor encountering a bogus and booby-trapped email attachment, visiting an infected site, and (most likely) being enrolled in a “botnet” (a dragnet of hijacked computers used to mine a corporation’s computer systems). OpenDNS recently gathered statistics that suggest as many as 900 botnets were active in late 2013. The damage that can be wreaked through botnet breaches has many experts deeply concerned given that, “… as banks develop their controls in line with new criminal methodologies, new techniques will emerge”.
What Can Banks Do?
Banks are at the center of data security concerns. The information they gather intersects legal boundaries, intellectual property, and government regulations. To keep abreast of every potential security threat or virus is a virtually insurmountable feat, but, through data encryption – at rest and in the cloud – banking institutions could create a stronger security program than they may be currently using.
Studies show that institutions from finance to healthcare have high amounts of BYOD usage and often lack sufficiently strident data security policies for accessing data outside of corporate networks. Government-grade (FIPS 140-2 validated) data encryption solutions are recommended for all devices used to access and store data, be they BYOD (laptops, smartphones, tablets), as well as devices managed through an enterprise’s network (i.e., desktop computers). If the worst-case scenario should unfold, and a portable device carrying personally identifiable information (PII) is lost or stolen, data encryption via SEDs, for example, protects the encryption key by deleting it each time it is accessed, not storing it in the OS or network, and encrypting the encryption key independently – whether or not the company network is able to access it.
Gone are the days people used to believe webcams cannot be hacked and they cannot be compromised. Nope, webcams hacking is not only possible on movies based on hacking but also in real life. Now even a script kiddie can do that easily with the help of some software and social engineering tactics. If they get access to your computer through some form then they can easily hack your webcam. Hackers can get into your place easily, it is like crushing a paper for them, damn easy.
Why People Hack Webcams? What’s the benefit?
Actually there are several reasons why hackers hack your webcam, they are as follows:
For Peeping opposite sex and taking compromising pictures of them. Then later use it for blackmailing or lust purpose. They are infamously called as “Peeping Toms”.
Use those clips and pictures for Pornography. That is really sad, but true. They sell it for such sites and earn money.
Hack webcams to spy on their girlfriends or boyfriends. Evergreen reason!
To monitor your house and see when you are not in home. So that can break into your house and rob.
The Good News is that you can protect your webcam easily and you can do it now if you haven’t, because your privacy matters the most. Below you can find some essential tips to protect your webcam or prevent your webcam from getting hacked.
Basic Tips To Protect Your Webcam From Hacked
Here are some basic and recommended tips for protecting your webcam from hackers. Having good software + hardware makes things more comfortable.
1. Enable Firewall: Firewalls are used to prevent unauthorized Internet users from accessing private networks connected to the Internet, maybe your own computer. Firewalls can be implemented in both hardware and software. Firewall is MUST since it can block/prevent any third-party access to your webcam.
Some free Firewalls for Windows which you can count on :
2. Use decent Antivirus: Every system should have a proper Antivirus to avoid all sorts of computer and internet security problems. We recommend Bitdefender, you can check our review about Bitdefender Antivirus Plus 2012.
3. Spyware Detection Program: Having a firewall and Antivirus is not enough, you’ll need a Spyware detection program to avoid someone spying on your webcam. You check CNET for free Spyware detection programs.
4. Use WEP, WPA, WPA2 or other security key: If you are using any wireless router or wireless webcam then enable the security key for that. Such security keys make hackers hard to get into. WEP Encryption is now kinda outdated. Simple things like this will secure your Wi-Fi connection and also secure the wireless network you have.
5. Keep your PC/Mac up-to-date: Regularly update the software in your computer. They will contain recent security fixes and are essential for your computer’s security.
6. Use Good Webcam: Choose a webcam that has good security features and buy a branded one if you can afford. Buy a webcam that has LED light and lens cover. The former is to identify whether the webcam is “ON” or “OFF” and the latter is to cover the webcam when it is not in use, old fashion but still worthy. You can buy a webcam which has Modesty Shield, it is like a visor which flips down over the lens when you don’t want the camera to see anything.
Good Webcams We Recommend :
Logitech HD Webcam C270
Logitech C260 Webcam
Microsoft LifeCam VX-3000 Webcam
Tip: Don’t forget to read your webcam’s instruction manual, this will make you much easier to find out how it actually works. Like when it turns OFF, when the light color changes and stuffs like that.
7. Use Good Router: You should also consider buying a reliable and secure wireless router. Nothing can replace a good router.
Some More Practical Tips To Avoid Hacking
Great! Now you have protected your webcam from getting hacked, but still if you are worried, you can just follow these practical real-life tips to avoid getting your webcam compromised.
8. Don’t use ‘unknown’ service centers: If you check this post you can see some case studies and instances where service centers compromise customer laptops and use it for their desire and money. So you should avoid strange and unknown service center for repairing your laptop or personal computer. You can approach the official service center if it is near-by. Scan your computer or laptop after getting it from the service center.
9. Don’t do anything ‘private’ in front of webcam: You can be mischief, but don’t try that in front of the webcam. You could be accidentally undressing or doing anything private with your webcam “ON”, so to avoid the risk keep your laptop or move away from that place when you are about to do something ‘private’.
10. Protect Your Associated Accounts: If your Yahoo! Messenger or Facebook account can be hacked, then the hacker could easily make sure of your webcam after hacking by using some tactics since both Yahoo! Messenger and Facebook have video chats.
Silly yet Simple Tips To Protect Yourself
If you are a not geeky type of person and want to solve this simply, then here are some simple tips for you.
11. Unplug the webcam when you don’t use it: So simple right? Instead of wasting all your precious time tweaking the settings you can simply unplug the webcam from the USB Port when you are not using it.
12. Turn it to face a wall when you don’t use it: How about turning the webcam to face the wall?
13. Use a tape to cover the lens: Though not really recommended, if you can uncomfortable with both #11 and #12 then you can count on this one.
14. Don’t keep your webcam in private area: I mean your computer + webcam, you can keep it somewhere like a normal separate room where you don’t do any other stuff. Even if your webcam is hacked, they won’t really get the benefit.
It is true that webcams can be hacked and you can protect your computer as well as your webcam in order to prevent it from being hacked. If you have any queries, kindly feel free to comment below.
Hacking had never been an easy work. Never! But still a lot of computer freaks want to be a hacker. Being a hacker is easy. What is tough is being a good hacker. Here I’m putting down some tips to be a good hacker. Having good skills in computers is an obvious thing that is required to be a hacker, so am not considering that below.
1. Keep up to date
You gotta stay tuned with what’s new in the software market. Keep browsing for the latest software that can help you in hacking. After all, technology and science has made things easier so make use of them. Newer is the technology, faster is the work.
2. Be patient
Patience is a quality that every hacker should have in him. As they say, Rome was not built in a day, so is the case with hacking. If you think hacking someone’s profile or something is a task of a day or two, I’m sorry to say that you are mistaken! Hacking requires patience and of course it keeps checking it too, for in some cases it may take about a week or two to hack a profile!
3. Be a good observer
This quality will help you in making guesses. A good observer is one who observes things very carefully and keeps them in mind for you never know what is next and whenever it’s gonna help you. So, whenever you visit someone’s ,let’s say, facebook profile, observe things carefully like what music, movies, pages on facebook, etc. does the person likes.
4. An excellent guess-maker
After capturing details of a person from his/her facebook profile, your main target to hack is his/her primary e mail address. There is the test which decides how good you are at making guesses. Well, I’m not saying that make guesses for the passwords, but you can try for answers of the security questions. And the details of that person have the maximum probability to have answers hidden in them.
5. Never neglect small things
By small things I mean the things that you may have never thought of paying any attention to them, this is where you are mistaken. Well, even a small and un-necessary detail about the individual can prove to be of a great worth later on. This thing is interlinked to the quality of being a good observer and thus to the guess-making.
6. An effective convincer
You should have very good convincing skills so that you can make your target to log in on your phisher. Well, it’s a bit tough task to convince the person on the other end, but yes if you are a high class convincer, you are half way through.
Always remember – While you are hacking don’t think of any kinda guarantee that you’ll surely penetrate through someone’s account or else. Sometimes you have to taste defeat too. As they say, where there’s a will, there’s a way, so, try for an alternate method. Like, if your guessing method has failed many times, go for phishing method. If that too fails, try remote key logger. Well, there are many ways to hack something and one of them will surely work unless your target is very intelligent and has a good knowledge of computers too.
Try avoiding – Being over-confident is what you are not supposed to be. Don’t ever underestimate your target and take him/her as a fool. Always plan for the future and for your alternate hacking method that you’ll choose if the current one fails. One more thing you should avoid is publicizing yourself and your hacking skills and techniques.
If you are a good hacker, everyone knows your name; but if you are great hacker, no one knows who you are!!!
This article is written by Bharat Chauhan. He likes coffee and Pepsi very much, cause those are very good source of caffeine instead of doing drugs. If you wish to write for us, kindly check this.
An information from scratch can be used to gather certain information that can be really astonishing. Here in this post I will show you how a person can reach your place if he/she has your IP address or domain name. Here I will demonstrate using a spam email which deliberately flooded my inbox from a particular sender and show you how we can reach his house. So lets start….
Disclaimer: This post is actually to aware people about there online privacy rather misuse this trick.
Information Gathering :
From the email I got the “Domain Name” and name of the person and used it do the whois. As you all can see I got the address, phone no, fax etc from the image below. You can also use the IP address from the email header to obtain the information.
Then I opened Google Maps to find the street view of the above obtained address. As you all can see I reached the street of the person and the desired place is approximately near to it.
I will show you what more info I got, I used his name,city and country to find info about his family from here as shown below.
Then using his name and location in Google search I found his MySpace account as shown below and got to see his face.
#1 – One should always use “Tor” like anonymous tools while browsing and especially using email accounts.
#2 – Keep the information of your Domain name set to private.
#3 – Keep the information on your Social Networking sites set to private.
#4 – Take care while sharing your Phone no or Fax no with any stranger or unknown website.
This guest article is written by Satyajit Das, Author and Owner of SecurityHunk. He is a 23 years old ethical hacking enthusiast and a part time blogger. If you wish to write for us, kindly check this.
[UPDATE] FULL LIST HERE – 40+ Movies Based On Hacking & Computer Technology
I picked up top movies based on computer hacking, security, science-fiction and in other similar categories (as of May 09) which triggered me into blogging in these categories. I found some similar posts in the blogosphere, but some interesting movies are missing there. Because those posts and articles are older. I decided to create a updated list of movies. I watched half of the mentioned movies and the rest are in my system, they are yet to watch. These movies are a must for die-hard fans of computer hacking and security. I learned lot of information from these movies, hope you too. I didn’t arrange these movies in rank order, they are arranged by year wise. I like to give credits to Yahoo ! Movies and Internet Movie Database (IMDb) for helping me gather information in their sites. If you feel that I really missed some interesting movies here, then you can mention it in the comments ! 🙂
ALSO CHECK : Movies Based On Robotics And Machines
1. The Conversation (1974)
Starring : Gene Hackman, Harrison Ford, Robert Duvall, John Cazale, Allen Garfield.
Direction : Francis Ford Coppola.
Production : Francis Ford Coppola, Fred Roos.
MPAA Rating : PG.
Story : A lone surveillance expert, with a meticulous devotion to his work and a policy of never getting personally involved in the jobs he’s given, finds himself slowly drawn into an assignment that he starts to detect has major ramifications.
Starring : Henry Thomas, Dabney Coleman, Michael Murphy, Christina Nigra, John McIntire
Direction : Richard Franklin
Distribution : Universal Pictures
MPAA Rating : PG
Story : 11-year-old Davey, whose mother is dead and whose father doesn’t spend nearly enough time with him. So the boy loses himself in video games–and even has an imaginary friend, a super-resourceful secret agent. When he accidentally comes into possession of a spy group’s secret plans, and winds up on the run from them, he must learn to rely on himself and his imaginary pal to save his skin.
Starring : Sandra Bullock, Jeremy Northam, Dennis Miller, Diane Baker, Wendy Gazelle
Direction : Irwin Winkler, Buddy Van Horn
Distribution : Sony Pictures
MPAA Rating : PG-13
Story : Angela Bennett’s a software engineer type who works from home and has few friends outside of cyberspace. Taking her first vacation in years she becomes embroiled in a web (sic) of computer espionage.
Starring : Jonny Lee Miller, Angelina Jolie, Jesse Bradford, Matthew Lillard, Laurence Mason.
Direction : Iain Softley
Distribution : MGM Distribution Company
MPAA Rating : PG-13
Story : A boy is arrested by the US Secret Service for writing a virus & banned from using computers until he is 18. After 18, he and his new friends find a plot to unleash a dangerous computer virus. They must use their skills to find evidence, while pursued by Secret Service.
Starring : Richard Waltzer, Melissa McBride, Rod Roeser, Gerald McCullouch, Brooke Radding
Direction : Martyn Burke
MPAA Rating : Not Rated
Story : Television movie based on the true-life visionaries whose battle to rule the fledgling computer empire changed the world. Focuses on the battle between rivals Steve Jobs of Apple Computer and Bill Gates of Microsoft.
Starring : Nick Cornish, Vanessa Marcil, Bai Ling, Tone Loc, Artis Ivey
Direction : Terry Cunningham
MPAA Rating : R
Story : America’s best player is being pulled in to the ultimate cyber-terror. The game’s mastermind has stolen his identity, put him on the FBI’s Most Wanted List, and is blackmailing him to take a part in a real twisted plan of world destruction. With just hours left, can the code be broken to save the world from total annihilation?
Starring : Keanu Reeves, Laurence Fishburne, Carrie-Anne Moss, Hugo Weaving, Jada Pinkett Smith
Direction : Larry Wachowski, Andy Wachowski
Distribution : Warner Bros. Pictures
MPAA Rating : R for sci-fi violence and some sexuality.
Story : Neo and the rebel leaders estimate that they have 72 hours until 250,000 probes discover Zion and destroy it and its inhabitants. During this, Neo must decide how he can save Trinity from a dark fate in his dreams.
Starring : Nikki Deloach, Demet Akbag, Neil Hopkins (II)
Direction : Charles Winkler
Distribution : Winkler Films
MPAA Rating : NR
Story : The life of a young computer systems analyst is thrown into turmoil when, after arriving in Istanbul to start a new job, she finds her credit cards useless, her bank account empty, and her identity stolen.
Starring : Bruce Willis, Timothy Olyphant, Maggie Q, Jeffrey Wright, Mary Elizabeth Winstead
Direction : Len Wiseman
Distribution : 20th Century Fox International
MPAA Rating : PG-13 for intense sequences of violence and action, language and a brief sexual situation.
Story : John McClane, with the help of a young hacker, takes on an Internet-based terrorist organization who is systematically shutting down the United States. Features cool gadgets like flexible keyboards.
Starring : Matt Lanter, Amanda Walsh, Colm Feore, Chuck Shamata, Maxim Roy
Direction : Stuart Gillard
Distribution : MGM Distribution Company
MPAA Rating : PG-13 for some violence and language.
Story : Computer hacker Will Farmer (Lanter) engages a goverment super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain glitches have turned made him become paranoid.
Starring : Diane Lane, Billy Burke, Colin Hanks, Joseph Cross, Mary Beth Hurt.
Direction : Gregory Hoblit
Distribution : Sony Pictures
MPAA Rating : R for some prolonged sequences of strong gruesome violence, and language.
Story : FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.
Starring : Gerard Butler, Kyra Sedgwick, Logan Lerman, Aaron Yoo, and Johnny Whitworth.
Direction : Mark Neveldine and Brian Taylor.
Production : David Scott Rubin, Michael Paseornek, and Mark Neveldine.
MPAA Rating : R for frenetic sequences of strong brutal violence throughout, sexual content, nudity and language.
Story : Set in the near future, a time when mind-control technology has taken society by storm. Humans control other humans in a mass-scale, multiplayer online game. Reclusive billionaire Ken Castle has created the controversial form of entertainment, “Slayers”.
Starring : Jesse Eisenberg, Justin Timberlake, Andrew Garfield, Joseph Mazzello and Armie Hammer.
Direction : David Fincher.
Production : Kevin Spacey and Scott Rudin.
MPAA Rating : PG 13 for sexual content, drug and alcohol use and language.
Story : A story about the founders of the social-networking website, Facebook. On a fall night in 2003, Harvard undergrad and computer programming genius Mark Zuckerberg sits down at his computer and heatedly begins working on a new idea.