Wednesday, December 23, 2009
After long interval I am going to post a valuable comment of one of my valuable reader for you about how to stop Credit Card fraud physically i.e from clonning or skimming. Here it is for you:-
I wanted to post an article on countering Counterfeit Credit/Debit Card Fraud.
A world class security expert Mr. Tom Patterson has developed a technology that will stop Counterfeit credit/debit card fraud. The technology uses the fact that the Magnetic Sripe on a card is unique like DNA. No two cards have the same microstructure on the magnetic stripe.
MagTek Inc. where Mr. Patterson is the CSO has used this fact to combine the Personal Data of the Card holder and the uniqueness of the Magnetic Stripe holding that data to create a unique DIGITAL ID for each card holder. This way even you duplicate someone's card the Duplicate Produced will never match the original card's digital signature created by this Technology. The Technology is called "MagnePrint".
As long as any card uses Magnetic Stripe on the back using standard format (3 Lines) is concerned this technology will counter duplication. The Technology could be used for "Driver's License", "Credit Cards", "Debit Cards", University Exam Cards etc. It is cheaper than RFID and very very easy to use.
Hope your viewers will enjoy the article.
He also sent me a link from you tube about credit card skimming. I checked it and for that I would request you to visit the link and enjoy the video in the following link
paste it on your browser and visit
Thursday, October 15, 2009
What is Latest in Phishing
After long interval I am again going to tell you a new threat of phishing. Earlier I already discussed you about different phishing attacks in the phishing topic and there you learnt that they send you mail for updating your bank account, they send you offer for being their bank employee for collecting their money, they send you offer letter by claiming your details including your family members name, they tell you about your email id has got lottery of huge amount but later on you have to get your custom clearance by paying a certain amount and finally you get nothing and you lose your money, they tell you that a trust has nominated you for paying a certain amount and finally you get the same result like the last example and all these are phishing mails, which causes you a huge monetary loss.
Now I will tell you what the latest threat is. You have got an email from your bank security mail id that someone may have compromised your bank account and we found a suspicious net transaction of RS. 10000 from your bank and we stopped the transaction for suspicion but if you think that it is a right transaction then allow it or stop it by accessing your account on the following link. And if you click on it you will find a cloned webpage of your bank and then you will access it by putting your user id or password and first time they may tell you that your user id or password may not be correct and that’s why they are not opening but put the same user id and password second time that will open and ask you for allow or stop and then they will tell you thanks your suspicious transaction has been stopped as you desired. Now you think that you have got the relief.
But what already happened here, they got your user name & password and they asked you for logging in 2nd time for confirming your user name and password and have already started to operate your account and finally after 24 hours they have transferred your bank amount to their person and if you don’t realize it within 24 hours your amount will be withdrawn by fictitious bank account holders, who opened the accounts by providing fake names and addresses, from ATM counters. This is the actual fact in reality.
Wednesday, September 16, 2009
You have learnt so far that what is Identity theft and how your identity is theft by criminals and we requested to see two films namely “The Net” and “The Net 2” for knowing the original incident in the world as well as cyber world and now we are going to tell you the signs of Identity theft i.e.:- how your will start suspect that your identity might have been theft. So let give a look on the following points:-
• Accounts you didn't open and debts on your accounts that you can't explain.
• Fraudulent or inaccurate information on your credit reports, including accounts and personal information, like your Social Security number, address, name or initials, and employers.
• Failing to receive bills or other mail. Follow up with creditors if your bills don't arrive on time. A missing bill could mean an identity thief has taken over your account and changed your billing address to cover his tracks.
• Receiving credit cards that you didn't apply for.
• Being denied credit or being offered less favorable credit terms, like a high interest rate, for no apparent reason.
• Getting calls or letters from debt collectors or businesses about merchandise or services you didn't buy.
Friday, September 11, 2009
Sorry for being absent from you for a long period. We had already discussed most of the cyber crimes which occurs in cyber world to our personal life and as our motive is to make aware the netizens about the danger of cyber world and how to remain safe from them without knowing any good computer knowledge and just from applying the common sense so we will now bring before you another dangerous cyber crime which may make your life hell even you are not aware of anything about the complaint against you. Yes friend it is Identity theft.
So let us discuss you what does it mean? Suppose your name is Bill Clinton and you have your credit card, social security number, separate bank account, office identity card and so many things which will speak for your identity and someone has stolen all the data of your personal information and reaching all those places before you and taking all the advantages which you should get or doing crime in your name and in this situation cops has reached in your house for arresting you. What will you feel now? We think it will not be a good experience for you and your family. So we can tell that when someone steals someone’s identity that is called identity or ID theft. Let discuss in the voice of cyber world.
Identity theft is a phrase that is used to describe any kind of fraud that results in the loss of personal data, such as passwords, user names, banking information, social security numbers or credit card numbers.
There are two main types of identity theft – account takeover and true name theft. Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to acquire even more credit products by changing your address so that you never see the credit card bills that the thief runs up.
True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. The Internet has made it easier for an identity thief to use the information they've stolen because transactions can be made without any real verification of someone’s identity.
I would request you to see two great Hollywood movies over this for your better understanding. They are “The Net” and “The Net 2”.
We have discussed about identity theft and now we will brief you how your identity is theft.
1) Social networking: - This is as good as bad for everybody in the net as most of the person who does not think for evil side of the net supplies their personal details to their new unknown friends.
2) Untrusted web form fill up and Job Sites, where we put our personal details for getting job.
3) Skimming:- This happens for Credit cards. (PL search for details about skimmer and skimming in this blog for)
4) Phishing:- All of you have already been discussed in this blog in details. So please search for it.
5) Old-Fashioned Stealing:- They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.
6) Pretexting:- They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
Again I would request to see the Hollywood Movies “The Net” and “The Net 2”
Wednesday, September 2, 2009
We have already discussed many topics in our blog and now we are going to tell you about infectious website. We think now you are thinking that is it possible? Website and that is infectious, its cant be possible. But my dear friends it’s possible. Now definitely a question has come to your mind that so what is infectious website.
A infectious website is that website which contains virus or harmful materials for your computer and when you run that website your computer will face problem and if you have strong antivirus or use good browser like Mozilla or IE or Google Chrome they will alert you that you are going to visit an infectious website which can cause problem to your computer. Now if you don’t visit its ok but if you continue there is every possibility of installing virus or Trojan in your computer even your antivirus can’t stop it to install it. So we think you have understood how danger it is. But there are also some websites for which browser will not alert you about its infectiousness but they are infectious. Now you should realize which is dangerous and which is not though it is infectious. The infection report which shows the containing about virus, Trojan and worm and other vulnerable software are dangerous but the others are not so vulnerable.
How the websites get infectious?
When a website is taken control by outsider and installs some hidden vulnerable software or Trojan in its content, it gets infectious or when the web administrator installs it with its content for attacking the target machine which visits its site and this happens in case when you visit some porn site or hackers own site and in this cases your browser even cant alert you about its vulnerability.
Even our experience says that one well known Management and Engineering College’s website is also vulnerable and if you visit you will be attacked by Trojan and virus and those will be installed automatically.
Now see the scan report of that website and we are not telling the name of that College.
Diagnostic page for thatverycollege.org
What is the current listing status for thatverycollege.org?
Site is listed as suspicious - visiting this web site may harm your computer.
Part of this site was listed for suspicious activity 5 time(s) over the past 90 days.
What happened when Google visited this site?
Of the 4 pages we tested on the site over the past 90 days, 3 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2009-08-19, and the last time suspicious content was found on this site was on 2009-08-18.
Malicious software includes 8 trojan(s), 2 scripting exploit(s), 2 virus. Successful infection resulted in an average of 1 new process(es) on the target machine.
Malicious software is hosted on 1 domain(s), including chura.pl/.
This site was hosted on 1 network(s) including AS32244 (LIQUID).
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, thatverycollege.org did not appear to function as an intermediary for the infection of any sites.
Has this site hosted malware?
No, this site has not hosted malicious software over the past 90 days.
How did this happen?
In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message.
This was the scan report of thatverycollege.org website
How to Scan a Website?
Now definitely you are very much eager to know what the easiest way to scan a website is. Google helps us to scan a website through their scan system and here is the tool of Google.
http://www.google.com/safebrowsing/diagnostic?site=www.example.com (replace www.example.com with your own site address). It will show whether Google found anything suspicious on your site.
Sunday, August 30, 2009
In our earlier posting we discussed about Fake Antivirus and it may be in case of Spyware i.e.: Fake Anti-Spyware but now we are going to discuss you who is the villain behind all these. We think now you have understood what its name is, yes it is Virtumonde. So let us make you clear what Virtumonde is? This is a Trojan which came in the world of internet I the year 2004 for playing a dangerous game with us i.e.: netizens.
What do they do?
If they are installed they come in the form of pop up by showing that your computer is infected and u need to scan it by a particular anti-virus or anti-spyware and the said pop-up will also come on your screen when you are offline and not only that they disable your automatic system update and the function of your original antivirus. Do you know if you are infected by this Trojan they don’t allow your browser to surf those sites which guides you to remove this Trojan, disable the registry editor, msconfig, task manager, Firewall? So we think now you have understood how danger this is.
It is tough to remove this Trojan from computer if once infected but you can get help or try by reading the guidelines of www.bleepingcomputer.com but we are not sure about this when one of our friend’s computer was infected we advised him to format the computer after taking a backup of some important files and he did so. But mind it if your anti-virus is updated they will alert you that your system is infected with vundo or Virtumonde Trojan.
So friends take care keep on touch with us for some more cyber crime prevention awareness which you don’t know.
Friday, August 28, 2009
Fake Anti virus
We think most of we love our PC or Laptop and for that we always want to keep our computer clean from all kinds of dangers and for that all the experts say that we should use Antivirus. So we think all of we know what is antivirus and what it does for our computer and as we all are afraid of virus both in human and computer life we always keep our self from viruses. For this two types of men in the world are running their business. One of them want to do good for us and the other person pretends to do good for us but actually they do nothing for us rather they causes harm to our both in economical and living age.
So now we thing you have guessed what we are going to say. Yes it is like fake medicine which does not work in your body but can cause harm to you and it happens to their life who are trapped by the dishonest businessman. So fake antivirus is that antivirus which comes to you in disguise of antivirus but work nothing for you installing Trojan, Spyware and Adware to your machine.
When you will understand its presence, what are the dangers and what to do?
When you see that a pop up is blinking in your screen that your machine/computer is infected by ………..viruses and for removing this virus you will have to install that particular antivirus as no other antivirus can remove this. Don’t be tensed just use your original updated antivirus and scan your machine and do nothing for that fake antivirus even don’t click on them
You see a pop up is blinking and asking you like “do you want to free scan your machine from viruses?”. Don’t do this as if you do that they will show you so many viruses had already been installed in your machine and the message like earlier noted and not only that if you do that they will install some viruses in our machine and for that you will have to either purchase their product or formatting your machine and during purchasing you will have to give them your credit card number which will be misused by them .
So when you get this type of message don’t get nervous just avoid them and don’t show your interest on them but by mistake if you click on them there is every possibility to install virus or Trojan or spyware or adware in your computer. So always keep your computer scanning regularly and update it regularly. Computer experts says this type of anti-viruses as “rogue antivirus” and this is the system the dishonest cyber businessmen and cyber criminals are applying this in the cyber world. So be cautious.
Wednesday, August 26, 2009
After long interval again here are some tips for you for keeping your computers safe from hackers/crackers which is given to us by one of our readers for the sake of all netizens who has to visit internet for their works.
1. Install Anti-Virus Software - This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages
2. Update All Software - Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat the new threats. Make sure you anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it. Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.
3. Install only Trusted Software - If you’re not sure what a piece of software does from it’s name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the first application. Be careful of that because it’s usually spyware. Install software from big names sites only, such as Microsoft or Adobe.
4. Avoid P2P File Sharing Software – If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans.
5. Delete Unknown Emails – If you receive emails from random people’s names, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc asking for you to verify bank account info or address info. No bank ever does that.
6. Do not click on Ads - Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.
7. Run Virus Scans Regularly – If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.
8. Be careful what you attach to your computer – This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.
9. Avoid Shady Web Sites – If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get some virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not effect your current operating system. If you want to find out more, search for “Virtual PC” or “VM Ware” in Google. Otherwise, simply avoid going to shady web sites!
10. Turn On or Install a Firewall - If you’re running Windows XP, make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.
11. Secure Your Wireless Network – Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router, otherwise anyone can connect to your home network and access everything.
12. Use a Complex Password for Login – This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.
Tuesday, August 18, 2009
How to restore a hijacked browser
The following six tips can help restore your browser's settings:
Stop cascading pop-up windows.
If endless pop-up windows appear on your screen, you'll probably want to stop the deluge first. To do this in Microsoft Windows Vista, Windows XP, or Windows 2000 while using Internet Explorer:
This closes all instances of Internet Explorer. Then you can re-open the program to continue browsing as usual. To help prevent future attacks, you should also have a pop-up blocker turned on. To turn on the pop-up blocker in Internet Explorer 7:
If you still experience the other effects of a hijacked Web browser, try the following:
Install preventive software such as the kinds mentioned in the preceding Preventing browser hijacks section. Many browser hijacking programs can be identified and removed by downloading, installing, and running these programs.
Run the Malicious Software Removal Tool. This can catch some, but not all, kinds of hijacking software.
Reset Internet Explorer settings. If you're using Internet Explorer and your home page has been changed, you can often reset it yourself.
Disable add-ons. Many browser hijackings come from add-ons, also known as ActiveX controls, browser extensions, browser helper objects, or toolbars. These items can improve your experience on a Web site by providing multimedia or interactive content, such as animations. However, some add-ons can cause your computer to stop responding or display content that you don't want, such as pop-up ads.
To learn how to disable add-ons in Windows Vista or Windows XP Service Pack 2 (SP2), read How do browser add-ons affect my computer?
Removing unwanted programs with the Add/Remove feature. If you're ready to try some advanced removal methods, the Microsoft Help and Support article Unexplained computer behavior may be caused by deceptive software provides additional steps you can take, including how to use the Add/Remove feature, the built-in program remover, and the program finder in Windows Explorer.
Empty the Recycle Bin. When you've finished these steps, especially if you've removed an unwanted program. Then restart your computer.
Sunday, August 16, 2009
Today we will discuss about Browser Hijacking and its details. So we think before discussing Browser Hijacking you must know some definitions which will help you to understand this easily and we think if the netizens know this they will realize if this thing happens to them as now a days due to the strong anti viruses the cyber criminals are using this method to get the data of netizens during net surfing for exploiting them.
So Let’s start our discussion with the definitions:-
Browser: - What is Browser? It is we think known to all. It is an application program that provides a way to look at and interact with all the information on the World Wide Web. So web browser is a client program that uses HTTP (Hypertext Transfer Protocol) to make requests of Web servers throughout the Internet on behalf of the browser user.
Plug-in:- What is Plug-in? Plug-in applications are programs that can easily be installed and used as part of your Web browser. They are called helper applications and run as run as a separate application and require that a second window be opened. They add additional software to your computer when web page is accessed.
Active X: - What is Active X? ActiveX is a set of object-oriented programming (OOP) technologies and tools that Microsoft developed for Internet Explorer to facilitate rich media playback. ActiveX is Microsoft's technology for signing plug-ins.
Computer Parasites: - What is this? Computer parasites are unsolicited malicious programs, which are installed to the system without user knowledge and consent. Most of these threats silently run in background, so you can't notice them. If you have running suspicious processes, strange toolbars in your web browser, changed system settings, undesirable pop-ups or your system runs too slowly and unstably, then there is a huge possibility that your computer is infected with some parasites. Parasites affect mostly Microsoft Internet Explorer web browser.
And now we will come to our main point that is to make you understand clearly what Browser Hijacking is. We think we need not tell you what is hijacking as even the children of today know the term hijacking from the televisions and films. So we think you have already guessed what Browser Hijacking is. Suppose you wanted to go to London but but but you were forced to go to Lahore by the ………………….So who are they? Are they friends or foe? Definitely they are foe and they are criminals yes they are Hijackers. In the same way you opened your browser for visiting Google and your browser is opening page for Alkaida or Pornography. What is this? This is Browser hijacking.
What cyber world says about Browser Hijacking is that it is a malicious program, usually a web browser plug-in that modifies web browser settings in order to change default home, search or error page and redirect a user to undesirable Internet sites. The most generally accepted description for browser hijacking software is external code that changes your Internet Explorer settings. Generally your home page will be changed and new favorites will be added. Most browser hijackers take advantage of Internet Explorer's ability to run ActiveX scripts straight from a web page. Generally, these programs will request permission to install them via a popup that loads when you visit a certain site. If you accidentally give them permission to install, IE will execute the program on your computer, changing your settings. Others may use security holes within Internet Explorer to install themselves automatically without any user interaction at all. Worse, these can be launched from popup ad windows which the user has not even intended to view. (Source www.2-spyware.com)
We have learnt so far what Browser hijacker is and we will learn what they do in our computer. How we will fill that we have been attacked by Browser Hijacker.
- Changes web browser’s default home page to a particular web site without asking for user permission.
- Changes web browser’s default search page to a predetermined web site without user consent.
- Sets own error page instead of web browser’s default one, which is displayed when the entered web site address is not valid.
- Redirects a web browser to a predefined site whenever the user enters invalid address or performs an Internet search.
- Modifies essential web browser settings, decreases default security level and adds undesirable or insecure resources to the trusted sites list.
- Creates numerous links to advertising pages, places desktop shortcuts to marketing sites, adds multiple bookmarks to the web browser’s Favorites list.
-A seemingly endless barrage of ads pops up on your screen.
-New toolbars or Favorites are installed that give you icons and links to Web pages that you don't want.
-Your computer runs sluggishly. Malicious software can slow down your computer.
1. Usually browser hijackers are installed by unsafe freeware, shareware or advertising-supported programs such as various browser add-ons or toolbars. Even some reputable products’s Instant Messenger can change default web browser settings. Uninstalling the host application in most cases doesn’t remove bundled parasite.
2. Lots of spyware and adware parasites have integrated browser hijackers that get silently installed during the host parasite’s installation process. Removing a particular spyware or adware doesn’t affect a browser hijacker.
3. Some widely spread browser hijackers get into the system using Internet Explorer ActiveX controls or exploiting certain web browser vulnerabilities. Their authors run insecure web sites (mostly with pornographic or illegal advertising content) filled with malicious code or distribute unsafe advertising pop-ups. Whenever a user visits such a site or clicks on such a pop-up, harmful scripts instantly install a parasite. A user cannot notice anything suspicious, as browser hijackers do not display any setup wizards, dialogs or warnings.
So dear readers now you have realized that if you don’t do this you are safe from Browser hijacking.(Source www.2-spyware.com)