Cyber Crime

Every time one jumps on to surf the wonderful World Wide Web they are susceptible to a cyber crime! Understanding the top five computer crimes is valuable information for the novice and even expert internet surfer reports(Cyber Crime) 1 Child Pornography(Cyber Crime)  Sad but true, child pornography makes this list. Child pornography is among the fastest growing criminal segments on the Internet. Child pornography is publishing and transmitting obscene material of children in electronic form. In recent years child pornography has increased...

Computer Virus Infection indicators:

We want to install latest antivirus in our PC and after installation we think our computer became safe and secure but we have to know our computer is infected or not,for this there is no need of huge technical skill simply monitor your PC and find out is behave of your PC match  with following behave. Virus Infection indicators: Your computer always stops responding when you try to use Microsoft Office products. You cannot start Windows Task Manager. Antivirus software indicates a virus is present. You received an e-mail message...

Wireless network security

Wireless-network security isn't a single issue. Businesses need to recognize that they are fighting attacks on several fronts. Many wireless-network threats are unique to the technology, including: Threats: Roaming Attackers: Attackers don't have to be physically located on a business's premises in order to access data on its wireless network. Criminals use network scanners, such as NetStumbler, with a laptop or other portable device to sniff out wireless networks from a moving vehicle — an activity called "wardriving." Performing the same task...

Cyber Crime Police Stations in India

1. Mumbai Assistant Commissioner of Police Cyber Crime Investigation Cell Office of Commissioner of Police office, Annex -3 Building, 1st floor, Near Crawford Market, Mumbai-01. +91-22-22630829 +91-22-22641261 Web site: http://www.cybercellmumbai.com E-mail id: officer@cybercellmumbai.com ---------------------------------------------------------------------------- 2. Chennai Assistant Commissioner of Police Cyber Crime Cell Commissioner office Campus Egmore, Chennai- 600008 +91-40-5549 8211 E-mail id: s.balu@nic.in For Rest of Tamil Nadu, Address:...

Flame virus warning

Microsoft issues Flame virus warning Microsoft warned that a bug in Windows allowed PCs across the Middle East to become infected with the Flame virus and released a software fix to fight the espionage tool that surfaced last week. Security experts said they were both surprised and impressed by the approach that the attackers had used, which was to disguise Flame as a legitimate program built by Microsoft. Kaspersky Lab, one of the researchers who helped to discover the Flame virus. The creators of the virus obtained that certificate by manipulating...

Change passwords on LinkedIn Now

If you have a LinkedIn account, now's a good time to change your password. Up to 6.5 million user accounts and encrypted passwords have reportedly been leaked and posted to a Russian hacker site. LinkedIn hasn't confirmed the passwords have been stolen, but did confirm on its Twitter account they're looking into it. The leak comes off the news that LinkedIn's mobile apps transmit personal data, including meeting notes and calendar info in plain text. Regardless of whether the leak is confirmed or not, it's a good time to change your password....

COMPUTER VIRUS

Every day as internet user we open lot of website and download many file like game,application software,songs,movie with this hope we are safe and secure.but my friends this is not true huge number of virus program gets download and install our pc and make us unsecure.Trojen virus is one of them.Lets gather some information about Trojen------  Viruses work in many different ways. They are harmful to your computer and may even work to steal passwords and personal information. If you have a virus on your computer, make sure you get it taken...

Remote access Trojan

A remote access computer Trojan (RAT) designed to steal credit card details from hotel point-of-sale (PoS) applications is being sold on the underground forums, according to researchers from security firm Trusteer. The researchers found an advertisement on a black market forum for a custom RAT designed to infect hotel front desk computers and steal customer credit card and billing information. The seller was offering the computer Trojan, together with instructions on how to trick hotel front desk managers into installing it on their computers,...

Credit Card Transaction Processing and Security

Cardholder. Cardholder is an authorized user of a credit or debit card. Card issuer. Card issuers are financial institutions that are members of Visa and MasterCard, which issue payment cards on behalf of the two Credit Card Associations and contract with their cardholders for the terms of the repayment of transactions. Acquiring bank. Acquiring banks (also called acquirers, processing banks or merchant banks) are financial institutions, members...

Login Security for Credit Card

Fraud and identity theft are not only a risk to your privacy, but a risk to your finances, so knowing what to look for can help prevent you from becoming a victim. Fraudsters use ‘phishing’ or ‘spoofing’ tactics to get sensitive information from you. The deception usually involves a counterfeit website or email which looks similar to one you’d normally trust. Information you give on a phishing site could be used by criminals to access your account or use your identity fraudulently. Login Userid and Password After entering your username, you’ll...

Credit card

A credit card scam can come in many forms. For example, scammers may use spyware or some other scam to obtain your credit card details. A scammer might steal or trick you into telling them your security code (the three or four digit code on your card) and then make purchases over the internet or the telephone. If they know your PIN, they could get cash advances from an ATM using a ‘cloned’ credit card (where your details have been copied onto the magnetic strip of another card). credit card scam  Of course, there is also a danger of someone...

Credit Card online Scam

Online ScamAs more and more people are using online tools to pay for their monthly utility bills, scammers have found a way to take advantage of the convenience, according to the Internet Crime Complaint Center. Victims are sent emails from a scammer claiming to be from a utility company asking for the recipient to pay an outstanding bill, according to a release from IC3. When the victim clicks on the attachment, they are actually opening up their computers to a virus. Authorities warn people to always be suspicious of any unsolicited emails, even...

Virus Security

 To keep secure computer and personal data we have to know how virus can affect  ours computer as well as how antivirus work to save our PC. An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).Anti-virus software typically uses two different techniques to accomplish this: Examining files to look for known viruses by means of a virus dictionary Identifying suspicious behavior from any computer program which might indicate...

Top Ten Antivirus Top Ten Antivirus

Top Ten Antivirus 1 BitDefender Antivirus Advanced Features: The BitDefender Antivirus offers these advanced proactive protection features: • Antivirus software protects against known and new viruses and other malware using industry-leading technology. • The real-time scanning feature constantly scans web, email and instant messenger activity to keep your computer safe. • Protects against harmful spyware by blocking spyware software that try to track your surfing habits. • Guard your instant messaging conversations by providing real-time scanning...

Andhra government websites hacked

As many as 27 websites of various departments of Andhra Pradesh (India)were Thursday hacked, exposing the chinks in the state's cyber security.The cyber criminals broke into one of the government servers and hacked the websites. The websites which were hacked include those of departments of commercial taxes, general administration department, horticulture, factories, gazette notifications and government orders. The officials said the hackers did not deface the pages or steal the information but only added additional pages with their message. State...

One or Hacking

An Israeli hacker calling himself Hannibal stole and exposed the Facebook login credentials of 85,000 Arabs earlier this week. It's the latest retaliatory strike in a politically motivated battle between Israeli and Arab hackers that's been going strong since the beginning of the month.Hannibal posted 20,000 Facebook users' email addresses and passwords of what he called "helpless Arabs" on Sunday (Jan. 15); the next day, he posted 30,000, followed by 10,000 on Tuesday and 25,000 on Wednesday, ZDNet reported. Hannibal posted the credentials on...

10 Computer Threats You

Strong anti-virus software and firewalls do a great job of protecting our computer systems. But even when virus definitions are fully updated and firewalls properly configured, there are still insidious threats that can worm their ways in, stealing your data or hijacking your PC and leaving you none the wiser.Fake Tech-Support CallsThat job isn't fixing your computer. In fact, he's really just after your personal information.If you receive a call like this, hang up, call the company the bogus technician claimed to be from, and report the incident...

Wi-Fi networks under virus risk

Indian computer security analysts have detected and alerted Wi-Fi users in the country against a possible virus attack that could lead to crashing and hacking of secure networks. The Indian Computer Emergency Response Team (CERT-In), country’s national agency to respond to computer security incidents, has found that the “Wi-Fi Protected Setup (WPS) contains a design error that could allow a weaker-than-expected defence against brute-force attacks,...

Hackers break into Rancho Mirage's website

Rancho Mirage — The home page of the city of Rancho Mirage website was hacked late Monday by a group calling itself “Team ShadowSec” — which left a message in support of the Occupy movement and against a proposed federal anti-piracy law. “Your security is inferior. Your website has been seized, because we come with an important message,” the statement began. “I don't suppose it's a sign of super strength, but if they can break into the Department...

After Zappos hack, how to protect yourself online

Another week, another computer security breach. Hackers broke into a Zappos server in Kentucky Sunday night, giving them access to personal records of 24 million Zappos customers -- which means if you've ever used the site, you're probably a victim too. Actually, if you've ever been online, the chances are pretty good that some malevolent person has captured personal information about you and tried to break into your personal computer or credit card account.malware security.malware  Although the criminals were after more than your shoe...

Hackers attack two Israeli websites

STORY HIGHLIGHTS Saudi hackers say in an e-mail they attacked the sites Earlier Saudi hackers had exposed thousands of Israeli credit card numbers Deputy foreign minister has his website hacked Jerusalem (CNN) -- The websites of the Tel Aviv Stock Exchange and of El Al, the Israeli airline, were brought down Monday morning by an apparent hacking attack. An internet hacker who calls himself Ox Omar sent an e-mail to the Jerusalem Post Monday in which he claims that together with a hacking group calling themselves "Nightmare" that the websites...

Virus writers target children

Virus writers target children with cartoon gaming websites that secretly infect their parents' PCs Sites offering cute games secretly infect PCs Sites with 'game' or 'arcade' in title pose danger Infections remain until when parents log in One site infected 12,600 users last month  Children are the latest target for writers of computer viruses - seen as an easy 'way in' to their parents PCs.Hackers are targeting children with sites that install malicious software on PCs, disguised as innocent-looking cartoon gaming websites. But the...

Chinese 'attack US DoD Smart Cards' with Sykipot Malware

A new strain of the Sykipot malware is being used by Chinese cyber criminals to compromise US Department of Defense (DoD) smart cards, a new report has revealed. The malware has been designed to take advantage of smart card readers running ActivClient - the client application of ActivIdentity - according to unified security information and event management (SIEM) company AlienVault. ActivIdentity's smart cards are standardised at the DoD and a number of other US government agencies. The cards are used to identify active duty military staff, selected...