Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles
Home » Posts filed under Alert
Showing posts with label Alert. Show all posts
Showing posts with label Alert. Show all posts
Thursday, 18 December 2014
Thursday, 18 December 2014
- 0 Comments
If you are active on Facebook to be a local group that you have seen a post on which people are selling their stuff. Looks like Facebook, on groups 'cell' is preparing to give the feature. If that happens, you will be able to sell things on Facebook via groups.
The Next Web reports on the group, some FB users 'Sell Something' is said to see the button. These people say that this button Right Post "button is the next one. After clicking on this button opens a form on which the name of the item, the price of the item of information is required to be paid. In addition to attach photos of the item, the option to pick up and delivery information is the beginning. After all, your post is seen as a classified listing contains all the information about the item, but also about how to pay Transaction or some do not.
According to the Next Web 'Sell Something' right to the point of appearing as a Facebook button that says this is a new feature on Facebook Groups Facebook testing so that people who want to sell your stuff on your items methodically in that post. It was on Facebook a small test groups were those who are active on the sailing community. However, Facebook has a link to a help page which explained that Facebook is not responsible for any purchase.
Wednesday, 17 December 2014
Wednesday, 17 December 2014
- 1 Comment
With holidays around the corner and most ecommerce sites throwing away huge offers and discounts, we have to be extra careful against online scams and frauds. In this post today, we have listed down some helpful tips that you can use for safe credit card usage on the Internet.
So, if you usually shop online with your credit card, here are some safety tips you must consider.
Choose Credit Cards Over Debit Cards
If you use your credit card most of the time for online shopping, then you are already following an important security tip. If any fraudulent charges occur on your credit card, you will still have time to report it to your bank and avoid paying for the transaction made on the card. On the other hand, for a debit card, ‘real money’ gets debited instantly, and it may take days before you can reclaim the money. Also, most banks offer zero liability on lost credit cards. If we take HDFC bank into consideration, it states, “If you lose your card, report it immediately to our 24-hour call centre. After reporting the loss, you have a zero liability on any fraudulent transactions made on your card.”Go a step further – Use a Virtual Credit Card
Another credit card security tip that works effectively, is using a virtual credit card. As the name suggests, this is not a ‘physical card’ and not issued physically. The following are the benefits of using a virtual credit card:- A virtual credit card is mostly valid for 21 – 48 hours only, depending on the bank that has issued it.
- The card can be used for making one payment only.
- Any unused amount left in the card gets credited back to the customer’s account.
- A virtual credit card cannot be stolen or cloned, as it is an intangible property.
Know your Online Shoppe
Always go for trusted, well-known, reputable, online shopping sites. This is more important when you are purchasing expensive items. It is also wise to go through the privacy and security policy of the site that you are shopping from. You might come across a site that offers unbelievable deals; but odds are, the deals are fake or not what they appear to be.Understand What Information Your Online Shoppe Needs
A standard checkout/payment page of most online shopping sites require you to give the following details:- Full name as printed on the card
- Credit card number
- Expiration date
- CVV number
- Shipping/Billing address
But, if the payment page asks for your ATM pin, net banking login ID and password, mother’s maiden name, etc., then you have enough reasons to treat this as a phishing attack. Immediately close the browser, and report the website to the right authority such as Google.
Avoid Public and Free Wi-Fi Networks
This credit card security tip also applies to all kinds of financial transactions that you do online. Avoid using your credit card over public computer network such as cyber cafes and free Wi-Fi. These networks are less secured or have no security against hackers who can spy on your information and misuses it for illegal purpose.Look for “HTTPS” and pad lock symbol
Before giving away your credit/debit information on the checkout page of any site, always ensure that the URL in browser’s address bar begins with “https://” and is accompanied by a “locked padlock” symbol. If it is otherwise, then do not proceed with the purchase. Go for a safer option such as cash-on-delivery.The Better way to Protection Against Phishing and Threats be Sure you have a Better Antivirus System on your Computer or Laptop.
Don’t Follow Links in Emails
If you receive an email from your online shopping site about a great offer, and asks you to follow a link to view it, then here’s what you should do. Go to the website by typing its URL in the browser or Google, and verify if it is really hosting any such offers. Never click such links in emails even if they seem to have come from your favorite or a popular retailer.Have Anti-phishing Protection on Your Computer
Nowadays, it is impossible for normal users to differentiate a fake, phishing website from a real one. Even a professional, neatly done website that seems innocuous, can be a compromised site waiting for you to fall into its trap. Hence, having an anti-phishing protection on your computer can be extremely beneficial. This feature, as the name suggests, automatically restricts user from landing on a fraudulent or phishing website.If you think you have some more credit card security tips to add to this post, please feel free to leave them in the comment box below. Stay safe!
Basically, Honan’s digital presence was all but destroyed after hackers managed to delete his Google Account, wipe his iPhone, iPad and Macbook and deface his Twitter account. The reason for the attack, according to one of the people behind it, was “lulz” and to play around with a three-character Twitter name.
Honan’s position as senior reporter at Gizmodo did nothing to provoke nor protect him from the attack. Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.
Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.
Though Amazon and Apple have responded by updating their security policies, hopefully to prevent future attacks along the same vector, many have been wondering what they can do to strengthen their security online.
The truth is, no security is perfect and anyone who is a valuable enough target can be bit. But you can make yourself a more difficult target and someone who can not be trivially exploited and you can minimize the damage an attacker can do.
With that in mind, here are a few mostly common sense steps that can get you started to being more secure online.
- Make or Write Smart Password Using Letter, Numerical, Upper & Lower Case:
A good password should be long, at least eight characters, easy to remember and contain a combination of lower case letters, upper case letters, numbers and symbols. Most importantly, it should not be a word found in the dictionary nor any variation of one.Also, you should never reuse a password for more than one site and you should never write your passwords down.
If this sounds like a lot, it is. It’s too much for pretty much anyone to do without help.
One solution is to use a device known as a cipher to generate passwords on the fly. For example, you can look at the domain name of the site and generate a password based on it. Basically, to do this, you look at the site you’re at and create a hard-to-guess password from the domain.
For example, facebook might have a password of g1s@v3r$ if you use the cipher of looking at your keyboard and writing the first four letters of the domain “face” using the keys one to the right of the real ones and then breaking up the letters with the numbers 1-4 alternating with the shift function every other time. Look at your keyboard (US) if you are unclear.
Alternatively, you can also use services like LastPass to help you generate, store and automatically fill in passwords. However, these services are a trade off between random, difficult passwords and a new central point of failure. As long as the service itself is secure, you’re most likely fine.
- Two Factor Authentication Attempt:
Matt Cutts at Google recommended this strongly on his blog and I agree.Two factor authentication simply means that you need two forms of authentication to log into a site. However, they have to be two different forms (not simply two passwords).
One form, obviously, is your password (something you know) but the other is usually something you have. These days, your cell phone is the most likely thing as many services, such as PayPal and Google, will send you a text that you have to repeat to log in. Google also, has its own app for most phones and that’s how LastPass handles its two-factor authentication.
This is an incredibly powerful tool because, even if your password is compromised, which Honan’s attack shows it can be easily in some cases, your account is not. It’s very unlikely, barring drastic steps, someone is going to have both your cell phone and your password. One or the other is possible, even likely, but not both.
If your account offers two factor authentication, turn it on as soon as possible. It’s a very powerful step.
- Personal Information:
A lot of sites will ask you to create backup security questions in case you forget your password. Common ones involve things such as your favorite pets name or the street you grew up on.The problem is that many of these things can be trivially researched. However, you can beat this by simply lying on the questions.
After all, there’s no rule that you be honest, just that you remember your answer. If you’re asked for your favorite pet, give the name of your childhood imaginary pet. Ideally, your answers should be related enough to the questions to remind you of what you said, but far enough off base that it’s not trivially guessed.
- Credit Card Common Sense Tips:
Credit cards are like passwords, ideally they should not be used more than once and should never be stored. As Honan’s attack showed, even if they aren’t used for financial gain, they can still be used to open up exploits into other accounts.If you have a bank or a credit card company that will issue single-use credit card numbers, use them. They are immensely powerful. If you don’t, try to avoid storing your credit card numbers and especially about storing one number across multiple accounts.
It might be annoying to re-enter your credit card data every time you want to buy a book on Amazon, but it could be what saves you from a minor hack becoming a major one.
- Bottom Line:
In the end, security is about the trade off between protection and convenience. Most of the things that make you more secure will also take up more of your time.It’s really annoying to have to find your phone every time you want to log in to your gmail or you have to enter a complex password that’s difficult to guess. Life would be much easier if we didn't have to deal with those things.
But, of course, that isn't practical. The problem is that others don’t value your life, your privacy, your information or your work. They would happily destroy it all, whether it’s for profit, a vendetta or just “lulz”, there are individuals who will not think twice about destroying your world.
If you realize that and that no one is too unimportant to be a target, then it only makes sense to take precautions now. Today’s hassle may save you from tomorrow’s attack.
Tuesday, 16 December 2014
Tuesday, 16 December 2014
- 0 Comments
X5 Max price of their new phones in India vivo is kept at 32 980. This phone is 4.75 millimeters thick, that it is by far the most slim mobile handset. 5-inch full HD Super Amoled display the phone, 64-bit processor Octa core Qualcomm Snapdragon 615 , 2 GB of RAM, expandable to 16 GB inbuilt features like memory. It runs on Android KitKat.
Vivo X5 in China this month, was announced on December 10. Vivo in India have joined hands with the Viacom 18 Solutions integrated network. vivo Import your phone is currently in India but hopefully they will also make calls to India in 3 years.
The only news coming from the Messaging app Mr. Dyorov Telegram-Founder Powell told Tech Crunch that the feeling that they have been working on since Whatsapp Whatsapp its web version of their web developer Higher Tried to. However Whatsapp information from any web version but a recent search of Android World dot NL Powell has fanned fears. Whatsapp the latest updates in the code Whatsapp Web is written. In addition, the code in the web service to track logging and online Stetson has written about.
However, it can not be taken as definitive evidence that Whatsapp but it seemed to work on the team is engaged in a web functions.
The one plus one plus one smartphone in India on December 2, was launched. Based u soon Cyanogen Micromax phone is its series to India. The Micromax say, 'He has a contract with one plus Cyanogen violation of the agreement to sell your phone is illegal in India. Plus, if one is not stayed so Micromax smartphone sales can cause considerable damage. "
One plus point is that at the beginning of this year and the trademark license agreement Cyanogen a Collaboration agreement was signed, according to which he Cyanogen anywhere in the world except China can use the trademark and software. However, in India also launched one plus days before the agreement was over 15.
Earlier Cyanogen has announced that the agreement with Micromax in India that one plus one will not support the phone. The first Ericson Cyanogen and pulls the case of one plus the court imposed a ban on Chinese company Xiaomi. However, the Court of Xiaomi January 8 is allowed to sell its Qualcomm-based handsets.
Sunday, 14 December 2014
Sunday, 14 December 2014
- 0 Comments
New Delhi (India) Railway Station has recently been Wi-Fi enabled. Do you know that Wi-Fi at public places while your system and data-use are both at risk? What to do then? Wi-Fi at public places such as using some important settings in your computer and take advantage of this feature from the rest:
Hotel on, railway stations, coffee shops, etc. The public Wi-Fi networks are not as safe as you think. Among them is the password, even though you are a network share with the thousands which means that you are taking a risk. While working on the same network and steal someone's username and password to track what others are working on it, very easy to operate. Obviously, you do not want to take any chances. Here are some tell about the settings are any public Wifi networks while on the must-use, even if the network is password protected or not.
1. Turn off sharing
If you're at home, you file, folder, printer, or other things to share with others, but after coming over a public network like you to stop this kind of sharing so that no one can access your information. Follow this approach to the sharing of Windows:
- Start by going to the Control Panel Open the system.
- Network and Sharing Center, click on.
- Left side look up Change Advanced Sharing Settings. Click it.
- Come and give you a file and printer sharing is off. Network Discovery and Public Folder Sharing can also off.
2. Enable Firewall
Nowadays, most operating systems come with basic firewalls. Unnecessary local users to pry into your computer, it is a simple step to prevent. Use only will you have firewalls. Czech for Windows can thus: Control Panel> System and Security> Windows Firewall. Windows Firewall in the Control Panel option in many computers are seen. Make sure that your firewall is going on here. From here you can also decide which applications you want to access. The Control Panel> System and Security> Windows Firewall> Allow a program or feature go and edit it to your liking. Firewall does not mean that you have to keep on all escaped the danger, but it's always good to keep on.
3. Using "https" Enabled Sites For Transaction or Browsing
Facebook, Gmail is "https"(Means Hyper Text Transfer Protocol and "S" means SECURE)on its own as many sites, but while working on someone else's site, or sensitive data or passwords must take the time to look at the address bar put. S Make sure that there is at http. If s is not immediately log out. Advice is that if credit card or banking jobs are related to the public Wi-Fi networks Do not Use. Sensitive to such things would be better at home.
4. Turn off Wi-Fi if Not Using It
Safety of your computer every time you want and do not need the Internet to Use Wi-Fi to your place of. Every time without a Wi-Fi only if you keep the others, it increases the chances of your work Watch unsuspecting. Wi-Fi is off easy in Windows. For this you right-click on the wireless icon in the task bar and turn off Wi-Fi.
Saturday, 13 December 2014
Saturday, 13 December 2014
- 0 Comments
The Delhi High Court on Xiaomi Chinese company selling smartphone in India has imposed a temporary ban. The case is still in court final judgment.
Spicy IP Ericsson India against Xiaomi report, the court ordered a trial.
Ericsson's Standard Isendahl Patents (SEP) is based on the lawsuit. Court Xiaomi selling phones that violate these Patents advertising, and to import is banned. However, it is not clear that the effect of the Xiaomi smartphones sold in India have a certain phone.
Court Rules IPR customs authorities, in 2007 ordered to stop the import. Court told local commissioners Xiaomi Explore the office is going to follow the order or not.
According to reports in the case of Xiaomi Ericsson Patents be the same case as Micromax, was against Jioni and Intex.
Micromax Delhi High Court had earlier ordered that use technology to Ericsson Patents price of their devices as a percent royalty to Ericsson.
Xiaomi Manu Jain, head of India told us that the company has not officially Ericsson or court. He said that India is a key market for the company's legal team Xiaomi media reports, will oversee the case. He emphasized that Xiaomi follow all laws and will settle disputes with Ericsson.
Wednesday, 10 December 2014
Wednesday, 10 December 2014
- 0 Comments
Google Chromecast Google Play store, sell on Snapdeal Airtel stores and online shopping sites. Airtel broadband plan with 20 GB of data per month for 3 months free use will. Airtel's new connection activation charge borrowers discount of Rs 1,000.
It can put you into any TV with HDMI port. After putting it like YouTube or Netflix video service can be viewed on TV. Netflix is not in India. YouTube and Google Play Movies in India, currently only with Chromecast Eros Now, Spul and application partners such as Sport is Yupptv.
Chromecast your smartphone, or computer connected to the TV Tablet transmits the content, while Apple and Roku streaming Internet content in the box to select the remote control has to be resorted to.
Chromecast requires USB power. Must connect it to the USB port of either the TV or the power plug.
In Cromecast small version of the Chrome operating system, which is used in laptops. Chromecast Apple TV box and the price is lower than the Roku box.
1. Damini
This app was developed after the occurrence of December 16, 2012 Gangrep. If this app to your mobile, so any time of danger through the message will go to your registered numbers. Intermissive to these numbers will continue to be your GPS locations. Not only that, once activated app after it started to draw pictures of the place and then sends them to the registered numbers, are also saved on the cloud. Then the mobile phone or broke off, even if the mobile can be removed from the video and call detail.Size: 1.1 MB
Platform: Android
2. Circle of 6
This way, especially with college students has been designed keeping in mind, but it may prove Useful for all women. In case of any trouble, help is just a tap of the message will go to your friends. This app is also available in Hindi and also in Delhi helpline numbers are already feed.Size: 12 MB
Platform: Android
3. bSafe
This app will help you in the event of crisis or close family members can alert people. Family Members or to feed the numbers of people that are close to each click of the button message will play if required. Additionally, calls will go away on its own. The risk on mode and the number given to you by your GPS location can share.
Size: 5.9 MB
Platform: Android, iOS and BlackBerry
4. Scream Alarm!
The simplicity of this app is its USP. This app is going to loud noise. At the risk of any woman's scream like a button you can create loud. It gives voice to alert people nearby.Size: 951 KB
Platform: Android
5. Safeti Pin
This is a special way to ensure the safety of women try. It is a platform where people give information about places in the area, in terms of women who are not safe. People can share photos of the places on the app and you can rate them in terms of safety. App It also helps to know what the place is not safe at night or in the late afternoon of day.Size: 6.4 MB - 20.3 MB
Platform: iOS, Android
Download Link: Click me
6. Smart Shehar(City) Woman Safety Shield Protection
The app can be taken from the picture. As you press the emergency button with the picture already selected location information to emergency Contacts will go. Before sending it to lose your phone, so do not be upset. App will send the information automatically in a few seconds. The "Walk with Me" feature in real time before people decide to be able to track your movements.
Platform: Android
7. VithU: V Gumrah Initiative
The phone can be activated by pressing the power button, which is already set for emergency near Contakts "I am in danger. I need help. Please follow my location" message will continue to be updated on every 2 minutes with location.Platform: Android
8. Suspects Registry - FOR WOMEN
Platform: Android
9. Pukar-A Personal Safety App
Decide in advance of an emergency Contacts SMS alerts inter missive goes with the GPS location. The phone does not go unnoticed, no sound comes from the phone during the brightness of the screen is too low.Platform: Android
10. Women Safety Help Totem SOS
This mode can be selected according to the level of danger. Choose to feel safe green. If you are unable to decide, then choose yellow, the only fixed on your GPS location while Contacts something will pass. Red mode dial 100 numbers will be going to go to your location Contacts emergency. Also take photos and audio on the app will record every 10 seconds.Platform: Android
11. Raksha - Women Safety Alert
Go to the app without your location by pressing the volume button will go to the emergency Contacts. The mobile Internet is not going to go call the 100 number and the SMS will be lost.Platform: Android and IOS
12. iGoSafely - Personal Safety App
Once activated, the phone is rocking out or headphone Contakts it will alert you. Email and text message with the GPS location will be lost. Should be closed until then will continue every minute updates. GPS location of each alert message, Street Address (if available) and the audio recording is 30 seconds.Platform: Android
13. Smart24x7-Personal Safety App
It sends information to panic CContactsemergency alert, which is the condition of the audio recordings and photographs. These are referred to the police. The call center can track the user's primary contact movement.Platform: Android, iOS, Windows and Blackberry
14. Women Safety Secured
This app takes howling danger signals and emergency Contacts as the location and sends a text message.Platform: Android
15. Women's Safety App
In this app Shake and Alerts' feature in which to blow on to the phone will run on the emergency alert Contacts. It alerts you to look elsewhere shock a phone to run on, so you can determine the severity of shock.Platform: Android
Download: Click me
Subscribe to:
Posts (Atom)