Showing posts with label cybersecurity. Show all posts
Showing posts with label cybersecurity. Show all posts

Cybersecurity: Evil Twin Attacks Example

 

evil, twins, attack, attacks, twin, evil twin attack, sample

Evil Twin is a type of cyberattack called "spoofing" attack that connects by hacking users into WiFi connections that imitate (cloned) a legitimate network. Once a victim is connected to a fake WAP network, attackers can see and access all from user activities, traffic, devices, etc. include keystroke (keylogger) login credentials and hsitory browsing.

4 Ways To Secure Smartphone Calls & Messages

phone calls, text messages, email messages, calls messaging, sharing delicate, data, apps, encrypt phone, messages


4 Ways To Secure Smartphone Communications


Smartphone communication through calls and messaging in the work environment is basic to guaranteeing proceeded with efficiency. During the pandemic, countless associations have allowed representatives to work remotely. Accordingly, Smartphones will stay basic to sharing delicate data through different communications: Phone calls, Text messages, VoIP calls, Messaging apps, video calls, meetings, and calendar appointments. This makes the need to know how to encrypt phone calls and messages.


1. Application to Encrypt Phone Calls


The app, a program, and cell phone encryption application is a broadly involved technique for guaranteeing user security. Various security specialists have inspected the open-source app, with cryptographers suggesting it for its encryption abilities. Thusly, Signal users can utilize it to make encoded recordings. On the other hand, Viber & WhatsApp, the main courier stage, involves Signal's encryption conventions for video and voice calls and is reasonable for secure correspondence. Likewise, individuals can utilize the Wire encryption app to settle on encoded group meetings, a fundamental property for safeguarding details of a profoundly delicate phone call.


2. Encrypting Email Messages


Email is a broadly involved technique for sharing delicate information because of its comfort and dependence throughout the long term. Be that as it may, aggressors have formulated different techniques through which they can block email users. Fortunately, different email applications contain work in encryption conventions intended to protect secret messages or hangouts. For instance, users can connect the email client "Mozilla's Thunderbird" with Enigmail to send encoded email messages. Mailvelope is also a program module that users can integrate to encrypt their Gmail accounts. Another is, that Protonmail email gives a straightforward encoded email account yet requires all users to make Protonmail email records to send email messages safely.


3. Data Encryption on Smartphones


Android and iPhone consumers represent the vast majority of smartphone users around the world. Accordingly, they store terabytes(TB) of delicate data that can detect harmful people, like hackers and displeased companions or relatives.

Data encryption is still a basic measure for safeguarding against undesirable admittance to individual information. Fortunately, smartphone capacity encryption is genuinely easy. Smartphones empower full-plate encryption, where setting serious areas of concern can give vital insurance. Additionally, fingerprints empower users to encrypt storage and secure data.


4. Text Messages Encryption


Today's new generation stages give end-to-end encryption to forestall cybercriminals from spying text messages. Viber, WhatsApp, and Signal are among the most recommended messaging apps, prestigious for their message encryption. Also, Facebook Messenger's Secret Conversations encrypt data imparted through Facebook's Instant Messaging application. Be that as it may, other informing services allow users to subscribe without giving phone details like phone numbers or emails. The applications are suggested for smartphone users looking for some degree of independence. In any case, downloading apps from 3rd parties stores, as opposed to the original store, might present security takes a chance with like deficient encryption and backdoor attacks utilized for data exfiltration.

SCAM ALERT: Do not click on SMS message with poison links

Have you been receiving SMS messages from your bank advising you to recuperate your blocked account through a fake link? UnionBank and BDO have given an explanation with regard to the scam alert, reminding consumers that they don't send links in text messages.

sms messages, fake link, unionbank bdo, text message, receiving sms, bank bdo

If you received a text message with a link - Do not click, saying your Union Bank/BDO account is blocked


In the previous week, consumers via social media platforms have been posting about getting SMS messages from scammers utilizing the UnionBank & BDO names. The messages ordinarily tell consumers their account has been already blocked because of unwanted activities. One of their consumer who tapped on the fake link was navigated to a site that seems to be BDO's official site. The URL, nonetheless, was not quite the same as the banks.

Scammers are sending BDO messages with suspicious links to get the information of account holders. Advisory: We won't ever send SMS messages with fake links that request that you account reports or sign in to your account - BDO said on May 25.

We don't send links on any mobile communications. UnionBank won't request that you click on links nor ask you to give this information by SMS, call or text message - UnionBank said.

In March, the BSP delivered a reminder that expresses that the banking, insurance, and monetary services ought to eliminate links in SMS messages delivered to consumers or users.

These tricks are a type of smishing a phishing attack targeting to get victims to steal individual credentials.





The White Hat Hacker

white hat, hat hacker, white hacker, hat whitehat, whitehat hacker, hacker wiz, wiz kid


The White Hat Hacker

White hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cybersecurity or cybercrime conspirators. Then again, he can be an expert criminal who needs to acquire enormous measures of money for himself, or far and away more terrible, rules the world. In the film Matrix, the idea of programmers changed a little. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. 

However, things don't have to arrive at that limit. We are not at war with intelligent machines so that kind of scenario is a bit dramatic. Therefore, a white hacker is an individual who is capable of modifying computer specs or software. They showed up before the appearance of PCs when decided people were captivated with the chance of altering machines. 

For example

Entering a determined code in a phone in order to make free calls. At the point when PCs showed up, these individuals found another domain where they could take advantage of their abilities. Presently they were restricted to the requirements in actual, all things being equal, they could go through the virtual world of PCs. Before the web, they utilized Bulletin Board Systems (BBS) to impart and trade data. Nonetheless, the genuine blast happened when the web showed up.

Today, anyone can become a white hat. Inside that group, there are many kinds of hackers. The popular one is the black hat hacker, also known as a cracker, some who uses his computer knowledge in criminal activities in order to obtain personal benefits. 

A typical example is a person who exploits the weaknesses of the systems of a financial institution for making some money. On the other side is the white hat hacker. Although white hat hacking can be considered opponent to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may find. 

If you want to become a hacker with a white  hat, Linux, a PC and an internet connection is all you need.



Found this blog interesting?

Follow Internet Hacks Journal on FacebookTwitter, and Instagram to peruse more selective substance we post. Also subscribe to our new YouTube channel.

The Black Hat Hacker

  

black hat, hat hacker, hat hackers, hackers turned, hacker black, techniques how, how make, white hat, hat hacking, hat blackhat


The Black Hat Hacker 


Black hat hackers have turned into the most notorious of all hackers in the world. The word hackers have turned into an equivalent for cybercrime. Obviously, that is an unfairness made by our own translation of the broad communications, so we should realize what a hacker is and what a black hacker or  cracker does. So, let's learn about black hat techniques and how they make our techniques and how they make our lives a little more difficult.

Black hat is used to describe a hacker (r, if you prefer, cracker) who breaks in to a computer system or network with malicious intent compare to a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps, destroying files or stealing data for some future purpose. The Black hat hackers exploit the system, maybe, crashing the system or taking information for no reason. The Black hat hackers may also spread the word about the adventure for different hackers or potentially people in general without presenting the person in question. This offers others the chance to take advantage of the weakness before the security organization can get it.


What is Black Hat Hacking?

A Black hat hacker otherwise called a system cracker who lives on the dark web and somebody who utilizes this ability with a criminal or illegal activities. Some examples are: cracking bank accounts in order to make a transference to their own accounts, stealing information to be sold in the black market, or attacking the computer network of an organization for money. 

A few well-known instances of Black hat hacking incorporate Kevin Mitnick, who utilized his Black hat hackers' abilities to enter the associations like Nokia, Fujitsu, Motorola and Sun Microsystems (it must be mentioned that he is now a white hat hacker); Kevin Paulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest (the prize was a Porsche 944 S2; and Vladimir Levin, which is the handle of the mastermind behind the stealing of $10,000,000 to Citigroup (see Notable hacker).



Found this blog interesting?

Follow Internet Hacks Journal on FacebookTwitter, and Instagram to peruse more selective substance we post. Also subscribe to our new YouTube channel.

The Grey Hat Hacker






grey hat, hat hacker, hat gray, gray hat, def con, cyber event, hacker somebody,


The Grey Hat Hacker


Grey hat (gray hat) hacker is somebody who is in the middle between a white hat and a black hat. They might involve their abilities for lawful or unlawful presentations, however not or individual increases. Grey hat hackers utilize their abilities to substantiate themselves that they can achieve a decided accomplishment, yet never do it to bring in money-making. The second they cross that limit, they become black hats. 

For example

They might hack the company or organization of a public office, let's say, NASA. That is a cybercrime. If the authority catches them, they will feel the long arm of prison. Nonetheless, assuming they just get inside, and post, and get out without bringing on any sort of harmful, at that point, they can be counted as gray hackers. To find out about hackers, then you can go to one of their forums. Consistently hackers from everywhere in the US, and from various regions of the country.


DEF CON events are highly agreed upon. 6,600 individuals went to conventions. Consistently, DEF CON is commended in Las Vegas, Nevada. In any case, hackers are not by any means the only ones who go to this cyber event. There are so many professional attendees, such as tech journalists, lawyers, government employees, computer security experts, and students. The cyber event is made by tracks out of various kinds, every one of them related, here and there to the universe of hackers (computer/internet security, worms, virus, innovations, programming, etc.).

Other than the lines, there are challenges that include ethical hacking. Any kinds of hacking skills or characters you wish to use, toward the end, is just a reason: to prove the system is safe or not. The fact of how much has our government or private sector influenced by technology industry.


Found this blog interesting?

Follow Internet Hacks Journal on FacebookTwitter, and Instagram to peruse more selective substance we post. Also subscribe to our new YouTube channel.

Social Engineering Attack

 

Social Engineering

Ya! This was one of the oldest trick to hack… Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintenance. This won't work now since most of the users are now aware about the SCAM… But this Social Engineering concept is must for you to have to convince victim for many reasons…!!!

PandaSecurity.com: Why do people still fall for online scams?

social engineering, one oldest, oldest trick, trick hack, try convince, convince user, user legitimate, legitimate person, person system, system needs

Social Engineering: 
Other ways to hack Facebook password 

Mobile Phone Hacking Attack Example

 

Mobile Phone Hacking

Session Hijacking can be often very dangerous on "Mobile Phone" if you are accessing Facebook on a HTTP (non-secure) connection. In a Session Hijacking attack, a hacker steals the victims' browser cookie which is used to authenticate the user on a website, and use it to access the victim's account. Session hijacking is widely used on LAN, and Free Wi-Fi connections.

mobile phone, phone hacking, session hijacking, hijacking often, often very, very dangerous, dangerous mobile, phone accessing, accessing facebook, facebook http

Social Engineering: 
Other ways to hack Facebook password 




Secret Question Attack Example

 

Secret Question 

According to a survey done by security companies, it is found that  rather than helping the legitimate users, the security questions are more useful to the hackers like social engineering… So if you know the victim well, try this.


social engineering, attack fake, fake login, secret question, according survey, survey security, security companies, companies found, found rather, rather helping

Social Engineering: 
Other ways to hack Facebook password 

BSP Working into Data Breaches Involving BDO and UnionBank

unionbank bsp, hacked accounts, bdo uniobank, facebook group, anti-money laundering


The BSP statement said it has finished the validation concerning the incident that started from a compromised online web security service and involved unapproved authority of BDO inventories and transactions for the most part to UnionBank inventories.

“Have confidence that we proceed to work together and draw in partners to guarantee the protection, security and integrity of the financial system, as well as the insurance of financial consumers.”

benjamin diokno, twitter, tweets, unionbank bsp, hacked accounts, bdo uniobank, facebook group, anti-money laundering

Some BDO members have posted via Facebook odd exercises including their bank records, with one person supposedly losing as much as Fifty Thousand Pesos (P50K) in the unapproved transaction. This BDO member supposedly sent out P10,000 to a UnionBank member alias "Mark".

The Financial Board requested sanctions on BDO & UnionBank over attacks on hacked accounts last year December 2021, as indicated by the BSP. A few clients of BDO took to social media to gripe about unapproved transactions from their records to made-up accounts at UnionBank.

In the meantime, have been looking for review in a public Facebook group named "Virtual Assistant Jobs Philippines". The Facebook group has over 150,000+ members as of now.


In January, the NBI captured 3 Filipinos and 2 Nigerians who were supposedly associated with the hacking attacks.

In any case, the BSP gave no insights concerning the discipline for the 2 banks, just saying that the authorizations were forced to stress the significance of consistently upgrading risk management frameworks implying cybersecurity protection, anti-fraud, and anti-money laundering, and fighting criminals.

Edwin R. Bautista, CEO of UnionBank said the BSP didn't force financial punishments.

Nestor V. Tan, CEO of BDO, said the bank would follow the BSP's approvals on Viber “We will work with the BSP to ensure a more secure banking environment,” he added.

In deciding on sanctions, the BSP said it took into consideration the corrective actions implemented by both banks related to the cyber incident, including BDO’s move to reimburse the funds of its affected clients.

The sanctions forced accentuate the significance of ceaselessly improving gamble the executive's systems including internet safety, hostile to tax evasion or anti-money laundering, and fighting illegal intimidation and multiplication support.

The sanctions also support the requirement for banks to take a proactive position in it and are sufficiently safeguarded to guarantee that their investors.


Trojan Horse Attack

 Trojan Horses

Trojan horses, which are attached to other programs, are the leading cause of all break-ins, When a user downloads and activates a Trojan horse, the software can take the full control over the system, and you can remotely control the whole system… Great..!!! They are also referred as RATs (Remote Administration tools - see also RSATs).

Fortinet explained: Trojan Horse and Malware

trojan horse, trojan horses, explained trojan, horses attached, attached other, other programs, programs leading, leading cause

Whaling Attack Example

 

Whaling Attack Example

Whaling hacker is a method gets you the password of the accounts which are used by the hackers to receive the passwords. So, you just have to hack one ID, which is the simplest method (easy then hacking any other account, will tell you how in coming posts...) and you will have loads of passwords and so loads of accounts at your mercy...!!!


whaling attack, attack example, whaling hacker, hacker method, method gets, gets password, password, accounts, accounts hackers

Sidejacking Attack with Firesheep Hacking Example

No hack is easier to accomplish than a fake wireless access point (WAP). Anyone using a bit of software and a wireless network card can advertise their computer as an available WAP that is then connected to the real, legitimate WAP in a public location.


wireless network, wireless access, hack easier, easier accomplish, accomplish fake, fake wireless, access point, point wap


Sidejacking with Firesheep


Think of all the times you or your users have gone to the restaurant shop, mall, or public gathering place and connected to the "free wireless" network. Hackers at Starbucks who call their fake WAP "Starbucks Wireless Network" or at the SM Megamall call it "SM Free Wi-Fi" have all sorts of people connecting to their computer in minutes. The hackers can then sniff unprotected data from the data streams sent between the unwitting victims and their intended remote hosts. You'd be surprised how much data, even passwords, are still set in clear text. The more nefarious hackers will as their victims to create a new access account to use their WAP. These users will more than likely use a common log-on name or one of their email addresses, along with a password they use elsewhere.

The WAP hacker can then try using the same log-on credentials on popular websites -- Facebook, Twitter, Instagram, and so on -- and the victims will never know how it happened. Lesson: You can't trust public wireless access points. Always protect confidential information sent over a wireless network. Consider using a VPN connection, which protects all your communications, and don't recycle passwords between public and private sites.


Data Breach of Cebuana Lhuillier




Weeks ago after the supposed data breach including personal ID, it's presently Cebuana Lhuillier with a declaration of an information break influencing 900,000 accounts.

In an email to a bulletin, Cebuana Lhuillier expressed: "We are writing to illuminate you regarding a security episode which might have impacted your own information put away in one of our email showcasing device servers. On January 15, 2019, we identified endeavors to involve one of our email servers as a hand-off to convey spam to different spaces. A Follow-up examination brought about the disclosure of unapproved downloading of contact records utilized as beneficiaries for email crusades. These unapproved downloads occurred on August 5, 8, and 12, 2018."

cebuana lhuillier, information break, data breach, one email, lhuillier data, national privacy, privacy commission, data protection

The organization likewise said that it has gone to preventive lengths to relieve the dangers to impacted accounts. "Upon revelation, healing moves were made to diminish the mischief. The server was promptly detached from the organization after affirmation of the break. The episode was in like manner answered to the National Privacy Commission," the email proceeded.

In a different authority proclamation, the P.J. Lhuillier Group of Companies uncovered that around 900,000 accounts were impacted. Information that was spilled during the break included birthday celebrations, locations, and types of revenue.

"Exchange subtleties or data were not compromised. The organization's principal servers stay protected and safeguarded," the organization added.

Cebuana Lhuillier, Data Breach, Data Protection

Data Breach of Cebuana Lhuillier


Albeit no exchange records were spilled, Cebuana Lhuillier actually encourages its accounts to change their passwords and try not to utilize similar secret keys on various sites. On the off chance that you believe you're impacted by this information break, you can contact Cebuana Lhuillier's Data Protection Officer.


In the interim, the National Privacy Commission has sent off an examination of the Cebuana Lhuillier information break. NPC Commissioner Raymund E. Liboro met with agents of Cebuana Lhuillier, who looked for help in regard to the information break.

"At the gathering, they resolved to present a more nitty-gritty report in regard to the information break. Cebuana Lhuillier informed us that it has drawn in the administrations of an outsider data security specialist organization to deal with their moderation and reaction to this episode," Liboro said.

The NPC said that Cebuana Lhuillier has as long as 72 hours from the disclosure of the break to report the subtleties and the impacted information subjects to the commission.

Cebuana Lhuillier is one of the Philippines' biggest non-bank monetary administration suppliers with interests in pawning, settlement, and micro insurance. The organization works in excess of 2,500 branches all around the country.


The SQL Injection

 

SQL Injection

Structured Query Language (SQL) is a database language to control data in a database. Since its inception, SQL has steadily found its way into many open source databases. SQL injection (SQLi) is a type of cybersecurity attack that targets these databases using crafted SQL statements to hack the systems into doing unexpected or unpredictable things.

A successful attacker may compromise the target include:
  • Bypassing login
  • Exfiltrating/stealing data
  • Modifying or corrupting data
  • Deleting data
  • Running arbitrary code

Botnets Attack Example

Botnets Attack Example

Botnets "USB" hacking are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carrying more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is the same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus. If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the internet browser.

botnet attack, botnet, meaning, botnet attack example