New York, USA: Missals are design to mass destruction of target object and locations with warhead/ payload where arrangement of these missals are very strong in both way Physical and Digital access. Designs of software architecture and security access level is complicated, but they have possible security breath by malfunction to proceed unauthorized missiles launch and can be operate by intruders. Trojans, malware or any kind of virus etc are designs to steal or destroys data and the same signature and pattern used to identified these programs (Trojans, malware, virus etc) to stop their executions. Last year in 2022, Indian “BrahMos missile” fired with unguided mode by malfunction and now in Aug 2023, Taiwan reported malfunctions in “Patriot Missile” during testing of air defense system. Both malfunction is incident, but now, Its Ideally can be access to create malfunction in any missile system by Cyber Attacker’s. Once missiles are fired with malfunction by intruder, further they can access and operate missiles to lock target coordinate. These man made malfunction can be generate due to sophisticated software architecture and application platform availably with Metasploit.
Program- LEARN TO EARN
Toronto: we are announcing and inviting you to a program named “LEARN TO EARN” where students of colleges/institutes from around the world. Students can enroll themselves as volunteers in the Organization and get multiple benefits including financial support. The program is designed to develop and sound knowledge of cyber security and the basis of this skill starts earning during student life. This program ensures startup models to deliver next-level entrepreneurs.
Internet Protocol & Security
New York: Today we live a parallel digital life with multiple pieces of types of equipment for different work. Every step has a footprint and possible data breach. Dependency on digital equipment offers more products and services by the manufacturer. The manufacturer uses the same existing internet protocol and communication policy for new equipment which directly offer a back door for data breach. ie- laptop and smart TV both use the internet and support USB as an external storage device. Both devices execute the same internet protocol for communication, but when the laptop storage policy is used in Smart TV storage then a serious security breach. Manufacturers directly copy policy from similar existing devices which is the easiest way to bypass security (hacking)by security experts. To prevent data breaches different types of equipment are required to develop their own protocols and policy.
Wireless Skimmer for Contact less Credit/ Debit Card
Delhi, India: World facing data breach and privacy with controversial policy and financial enforcement agency, especially bank, banking service related card issuing authority offering new back -door for hackers as contactless credit/ debit cards. Now manual skimmer can set with metal detector which pulse is very strong to detect your contact-less card and identify easily with more distance than NFC. This pulse can copy all your card details for further cloning your card. Also this technology capable to transaction minimum amount without your acknowledgment, each time we use metal detector gate. The manual metal detector used by security guard also able to do same. Once your card is cloned by hacker, there is no more authentication required for small amount debit nor bank send alert for small amount transaction usually. Design, developing and deploy wireless skimmer is very easy as you read in this article. So we advice users to get in touch with your bank and check statement to avoid any specious activity and financial fraud with your account.
Paradise of cyber criminals in India
Ranchi, India: welcome to the paradise of cyber criminals where cyber criminals are more technical and accessible than police and agencies, we are (Cyber Care) getting continuous related complaints. Jharkhand is now well-known state for cybercrime and activity, recently lots of cases registered and many unregistered due to as usual police and agency not cooperating with victims. As case registered on dated 25th Sep 2019, In the case of Shubham cyber fraud send a single link to Shubham and withdrawal 2 lacks from SBI and HDFC bank as using third party app. Another side Anushka sheared Google pay a/c details with caller and lost 24,000 INR. In both case cyber criminals get benefits of awareness freak of user. But, in the case of Mr. Krishn Jha is very different where Mr. Krishn Jha blocked his ATM on dated 28th Sep 2019 after an unauthorized withdrawal of 5,000/- INR. It’s unbelievable and shocking that on another day on 29th of Sep 2019 and cyber criminals withdrew 1,04,000/- INR using blocked ATM card details. Use us blocked ATM is a question on banking service and security, but register of multiple cyber crime complaint every day and zero result by police and agencies is more horrible. We already published notice that cyber crime solution ratio by police/agency is 0%. We believe Krishna Jha a/c is linked to third-party app and that’s why blocking of card is not enough to avoid unauthorized withdrawal. We suggest users to freeze their a/c as block ATM/ Credit card for similar situations to avoid misuse of your wealth. To save your wealth and best career option join Cyber Care (http://www.cybercare.info), India’s first Cyber Technology Organization with lots of career-oriented courses and cyber crime related solutions is available.
Digital Scams in India- Security Analysis
We In the vision of Digital India, most effective issue is Cyber Crime and failures to detect/ arrest Hackers/ criminals by agency. Village’s afraid to use digital mode of transaction for mostly 2 reasons- 1. MDR charges paid by applicant and 2nd are they afraid if transaction failed or hacked there is no one can help them.Recently Commissioner of Police, Delhi’s# credit #card #hacked. In this case may be agency find out hacker due to high profile, but rest cases either pending or closed without solving. We have Ranchi-Jharkhand Cyber Crime data where cyber crime solved data ratio is less than 0.01% where Jamtara is known for cyber criminal’s paradise. Cyber Crime solution ratio is very shocking.Few days ago CM’s (Punjab State- India) wife a/c hacked and withdrawals $32855. It’s clearly shown that cyber criminals targeting high profile people now.There is no solution by bank or agency for these frauds till yet. Be a part of #CyberCare and defend your wealth and business from cyber threats. Visit our website with lots of new services available soon. http://www.cybercare.info
Artificial Intelligence Hacking- Privacy and Security Breach
Alexa a great model of AI for every user, but is this safe for user? No recently we found devices connected with AI devices targeted by hackers and and spy on you. We found porn recorded and blackmailed house lady by hacking Smart TV and connected mobile. Similarly Alexa recorded activity of user and transmit to hackers. Some time developed also use your private data using unauthorized access your device.Always turn off front camera of smart tv and devices and avoid to synchronize your mobile with AI devices. Always turn off your internet connection with Alex, Smart TV and devices when not in use.Your alertness ensure your security.
Agent smith malware- Steal your data
Agent smith malware targeted 25 millions of android user. This malware replace code of privacy and communication part in application to unauthorized access and control of user activity. Attacker upgrades / downgrade application version which is vulnerability.We suggest user to check and remove unwanted / useless applications from your mobile and avoid greedy advertisements.
Virus vs Expired Antivirus- Security Breach Analysis
Antivirus is protecting our gadgets and secures our data and privacy from virus and malicious attacks. Antivirus is not a simple application- authorized to access kernel related applet and capable to make changes any credential and data. Some time users ignore to renew expired antivirus and continue with expired application.New research result found many expired application and expired antivirus turn into virus and change ACL (Access Control List) as well as harm your data and enable back door entry port/ service.We suggest our users to renew expired application and antivirus and update patch regularly to avoid virus malicious attacks. In case not renew expired antivirus, then immediately remove from your system.like follow and shear our page.
OTP Hacking (One Time Password Hacking)
ओ.टी.पी, एक बार प्रयोग होने वाला टेम्परोरी पहचान जो कि पहले से वेरिफाइ किए हुये मोबाइल या ईमेल में सर्विस प्रोवाइडर के द्वारा अपने ग्राहक को दिया जाता है। ओ.टी.पी टेक्स्ट मैसेज, वॉइस कॉल या ईमेल के रूप में उपयोगकर्ता तक पहुँचता है। ओ.टी.पी सर्विस का सुरुवात उपयोगकर्ता के सुरक्षा एवं सत्यापन के किया गया था, लेकिन तकनीक सुरक्षा के साथ खामी बनकर उभर रही है। ओ.टी.पी हैकिंग कोई नए तकनीक नहीं है, तकनीक के सुरुवात में फ्रौड करने वाले कम पढ़े –लिखे और नए उपयोगकर्ता के साथ स्पूफिंग का सहारा लेते थे और उपयोगकर्ता से ओ.टी.पी का जानकारी लेते थे। लेकिन इस समय ये नए सिरे से नई तकनीक का उपयोग कर उच्य शिक्षित और तकनीक उपयोगकर्ता के साथ भी आसानी से धोखा-घड़ी को अंजाम देते हैं। **** यह आर्टिकल केवल इन्फॉर्मेशन एंड रिसर्च कार्य के लिए है, इसके द्वारा किसी भी प्रकार के अपराध या नुकसान के लिए साइबर केयर कि कोई जिम्मेवारी नहीं है। *** इस समय पूरी दुनिया में ओ.टी.पी हैकिंग 2 आसान तरीके से संभव है जिसके लिए किसी स्पेशल ट्रेनिंग या स्किल कि कोई जरूरत नहीं है जैसा कि कुछ समय पहले वॉइस ओ.टी.पी हैकिंग के द्वारा एक्सैस किया गया। इजराइल में ओ.टी.पी हैकिंग संभव होने का एकमात्र कारण ये था कि लोग डिफ़ाल्ट ओ.टी.पी (सर्विस प्रोवाइडर के द्वारा अपने ग्राहक को दिया गया पहला पासवर्ड) को बदलते नहीं थे। किसी भी सर्विस प्रोवाइडर का डिफ़ाल्ट पासवर्ड या तो एक ही होता है या फिर किसी पैटर्न में जो कि उसके सर्विस पोर्टल और डिवाइस में आसानी से मिल जाता है। हम सभी कभी न कभी अपने दोस्तों या परिचितों को अपना फोन किसी काम के लिए देते हैं। मैं अपने किसी अजनबी/ फ्रेंड/ रिलेटिवे से बोलूँ की मेरा फोन काम नहीं कर रहा है और एक आवश्यक कॉल करना है तो वह अपना फोन मुझे दे देगा। यही वह समय है जब मैं उसके फोन में उसका नंबर किसी और नंबर में फॉरवर्ड कर सकता हूँ, जैसे मेरा अजनबी/ फ्रेंड/ रिलेटिवे फ्रेंड आइडिया का सिम कार्ड इस्तेमाल कर रहा है और मुझे उसका कॉल अपने नंबर 9471556551 में फॉरवर्ड करने के लिए *43#9471556551 पर कॉल करना होगा। अधिक जानकारी के लिए अपने सर्विस प्रोवाइडर से कॉल फॉरवर्ड जेनेरिक कोड ले सकते हैं। अब अकाउंट को लॉगिन करने के लिए ओटीपी वॉइस कॉल का ऑप्शन सेलेक्ट करने पर कॉल मेरे पास आएगा जिससे अकाउंट लॉगिन किया जा सकता है। अन्य तरीका ये है कि जब वह अजनबी/ फ्रेंड/ रिलेटिवे मुझे अपना फोन देगा मैं उसमें कॉल फॉरवर्ड एप्लिकेशन या स्पाइ सॉफ्टवेर लोड कर सकता हूँ जो कि मुझे एसएमएस और कॉल डीटेल मेरे मेल पर देता रहेगा और अजनबी/ फ्रेंड/ रिलेटिवे का सभी अक्टिविटी देख और कंट्रोल किया जा सकता है। **** यह आर्टिकल केवल इन्फॉर्मेशन एंड रिसर्च कार्य के लिए है, इसके द्वारा किसी भी प्रकार के अपराध या नुकसान के लिए साइबर केयर कि कोई जिम्मेवारी नहीं है। *** नए अपडेट्स के लिए पेज को लाइक और फॉलो करें।