<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3907977938761037823</atom:id><lastBuildDate>Sun, 29 Mar 2026 16:34:06 +0000</lastBuildDate><category>cybercrime</category><category>Cyber Security</category><category>stay safe</category><category>cyber crime</category><category>security awareness</category><category>Cyber Bullying</category><category>cybersafety</category><category>India</category><category>Personal Data Privacy</category><category>cyber safety</category><category>Cyber Harrassment</category><category>Information Security</category><category>cyber ethics</category><category>child online safety</category><category>internet safety for kids</category><category>facebook security and privacy</category><category>Corporate Espionage</category><category>cybersecurity</category><category>identity theft</category><category>keep kids safe online</category><category>malware</category><category>staysafe cybercitizens</category><category>strong passwords</category><category>data security</category><category>computer hackers</category><category>staysafe</category><category>Data Privacy</category><category>hackers</category><category>safe use of social networks</category><category>lucius lobo</category><category>Pornography</category><category>advanced fee scam</category><category>cyber education</category><category>email scam</category><category>Espionage</category><category>WikiLeaks</category><category>cyberlaws</category><category>data protection</category><category>employee security awareness</category><category>terrorists</category><category>419 fraud</category><category>Hacking</category><category>Porn Surfing</category><category>be safe online</category><category>detecting email frauds</category><category>email scams</category><category>hacktivism</category><category>keep children safe</category><category>online scams</category><category>security blog</category><category>stay safe online</category><category>Phishing</category><category>government hacks</category><category>security breaches</category><category>ATM Fraud</category><category>Pedophiles</category><category>Privacy</category><category>Security</category><category>Spam</category><category>cyber laws</category><category>cyberwar</category><category>sexting</category><category>social engineering</category><category>spying</category><category>Social Networks</category><category>facebook</category><category>Bank Fraud</category><category>Cloud security</category><category>Cyber trolls</category><category>Spycams</category><category>anonymous</category><category>computer security</category><category>detecting email scams</category><category>monitoring</category><category>objectionable internet content</category><category>Blackmail</category><category>Confidentiality Laws</category><category>Cyber Protest</category><category>Governments</category><category>business continuity</category><category>censorship</category><category>cybercriminals</category><category>defamation</category><category>email frauds</category><category>internet security</category><category>lottery scam</category><category>twitter</category><category>Best of the Web Cyber Safety Videos</category><category>CCTV</category><category>Government Security</category><category>Mobile Spyware</category><category>Security policy</category><category>authentication</category><category>cell phone</category><category>cellphone spyware</category><category>credit cards</category><category>criminal gangs</category><category>cyberpolice</category><category>disgruntled employees</category><category>eavesdropping</category><category>government regulation</category><category>hacked social network accounts</category><category>hacked twitter</category><category>hazards of social networking</category><category>honey traps</category><category>national security</category><category>nigeria</category><category>paedophiles</category><category>pedophiles; Porn Surfing</category><category>phone tapping</category><category>physical surveillance</category><category>report fake profiles</category><category>secure software</category><category>DLP</category><category>Defense Security</category><category>IT ACT</category><category>Insider Fraud</category><category>National cyber security awareness week</category><category>PRISM</category><category>children</category><category>cloud security alliance</category><category>crime</category><category>cyber criminals</category><category>data leaks</category><category>denial of service</category><category>entrapment</category><category>fake lottery scams</category><category>free speech</category><category>hate posts</category><category>impersonation</category><category>internet trolls</category><category>lulzsec</category><category>military secrets</category><category>online activism</category><category>passphrases</category><category>piracy</category><category>spamsters</category><category>stuxnet</category><category>vulnerabilities</category><category>ATM Skimmers</category><category>ATM heist</category><category>Access Management</category><category>Banks</category><category>Burkina faso</category><category>CSA</category><category>Edward Snowden</category><category>Extortion</category><category>Firesheep</category><category>Google Transperancy Report</category><category>IT security</category><category>Microsoft security breach</category><category>Mobile</category><category>Section 66 A</category><category>WIFI</category><category>abusive posts</category><category>amanda todd</category><category>bot</category><category>celebrity&#39;s</category><category>child pornography</category><category>chinese espionage</category><category>computer security news</category><category>cyber attacks</category><category>databreaches</category><category>disaster preparedness</category><category>egovernance</category><category>fake matrimonial profile</category><category>hacked facebook</category><category>kids safety</category><category>loss of personal devices</category><category>matrimonial scams</category><category>natural calamity</category><category>petty crime</category><category>physical security</category><category>police</category><category>ransomware</category><category>scams</category><category>security consultants</category><category>sexual digital content</category><category>sexual harassment</category><category>surveillance</category><category>targeted attack</category><category>#NCSAM</category><category>Android security flaws</category><category>Ashley madison</category><category>CISO</category><category>CLOUDSEC</category><category>Celebrities</category><category>Copyright infringement</category><category>Data erasure</category><category>Facebook security breach</category><category>Global Economic Crime Survey</category><category>Global Risk 2012</category><category>Google</category><category>IT professionals and security</category><category>Identity Management</category><category>India cyber security policy</category><category>Jennifer Lawrence</category><category>NSA</category><category>Nicholas Sarkozy</category><category>Nudity</category><category>Ram Raiding</category><category>SOPA</category><category>SSL</category><category>Segregation of Duty</category><category>Skimming</category><category>Spyware</category><category>Telemarketer</category><category>UID</category><category>WEF</category><category>aadhar</category><category>africa</category><category>anti espionage</category><category>australia</category><category>best cybersecurity blog</category><category>best security blog</category><category>bugs</category><category>celebrity nude pictures</category><category>cloud contracts</category><category>cloudsourcing</category><category>compliance</category><category>cyberbullies</category><category>cyberlaws. cyber bullying</category><category>data breaches</category><category>data theft</category><category>data wiping</category><category>defence</category><category>disaster</category><category>do not feed the trolls</category><category>efrauds</category><category>elliot recce</category><category>facebook privacy</category><category>facial recognition</category><category>fake helpdesk scams</category><category>fraudsters</category><category>ideology</category><category>indian cyber crime</category><category>internet of everything</category><category>job recruitment scam</category><category>kate upton</category><category>key loggers</category><category>keyloggers</category><category>lawful intrusion</category><category>loss of laptops</category><category>mutating malware</category><category>obscene content</category><category>one time tokens</category><category>online shopping</category><category>remove abusive content</category><category>reputation</category><category>revenge porn</category><category>sarah palin</category><category>secret question</category><category>security audit</category><category>security backdoors</category><category>security guidelines</category><category>security strip</category><category>smart phones</category><category>smses</category><category>social media</category><category>stolen phones</category><category>tailgating</category><category>temptation</category><category>terror threats</category><category>tracking</category><category>trust</category><category>uknowkids</category><category>verification of profiles</category><category>viruses</category><category>webmail hack</category><category>whistleblower</category><category>2FA</category><category>3d Secure</category><category>9/11</category><category>ARCOT</category><category>Airport</category><category>Al Qaeda</category><category>Al Qaeda fake passports</category><category>Aramco</category><category>BASH</category><category>BBC</category><category>Bill Gates</category><category>Business Email Compromise</category><category>CA</category><category>CERT</category><category>CERT-IN</category><category>CIQ</category><category>CISO Top 100</category><category>CNBC Telecast</category><category>CWG</category><category>Cashers</category><category>Computer Fraud and Abuse Act</category><category>Cutting Sword of Justice</category><category>Cybercrooks</category><category>DND</category><category>DSCI</category><category>Delhi</category><category>Do not Disturb</category><category>EFF</category><category>ETCISO</category><category>Flame</category><category>GRC</category><category>ICICI bank</category><category>IRS scams</category><category>ISIS</category><category>ISIS propaganda</category><category>ISP</category><category>IT ACT 2000</category><category>Imperva</category><category>Indian blogger awards</category><category>Indian matrimonial</category><category>Iran</category><category>JP Morgan data breach</category><category>Kapil Sibal</category><category>LOIC</category><category>Lady Gaga</category><category>London 2012 Olympics</category><category>MHA</category><category>Mark Zuckerberg</category><category>Mata Hari</category><category>McAfee</category><category>Microsoft scams</category><category>Middle Eastern Banks</category><category>Mole</category><category>Most pirated software</category><category>NASA Data Loss</category><category>NCSAM</category><category>NOTW</category><category>National Awareness Week</category><category>No Delete</category><category>Not Very Well Hung Hangers Of Silicon Valley</category><category>OTP</category><category>Paris Hilton</category><category>Proposal</category><category>RIP trolls</category><category>SOD</category><category>Safe Online Schooling</category><category>Safety Tips for 7 year olds</category><category>Safety Tips for 8 year olds</category><category>Safety tips for 3rd Grade</category><category>Safety tips for 4th Grade</category><category>Safety tips for 9 year olds</category><category>Sales</category><category>Secret SMS Replicator</category><category>Security Roundup</category><category>Shell Shock</category><category>South Korea</category><category>Sport</category><category>Stop online piracy act</category><category>Street View</category><category>Swiss banks</category><category>Symantec</category><category>Symantec Endpoint Protection</category><category>Symantec Intelligence Quarterly</category><category>TRAI</category><category>Target data breach</category><category>The Lord of Dharmaraja</category><category>Top 100 CISO</category><category>Top 50 InfoSec blogs</category><category>Top ten pirated TV shows</category><category>Top ten pirated games</category><category>Top ten pirated movies</category><category>Trend Micro</category><category>UNIX vulnerability</category><category>USB Drives</category><category>VeriSign</category><category>WEP</category><category>WPA</category><category>XVALA</category><category>Yahoo Millionaires</category><category>Yama</category><category>adulteration</category><category>aircraft</category><category>angel rehtaeh</category><category>anti-terror</category><category>antivirus</category><category>application security</category><category>arab spring</category><category>arranged marriage scams</category><category>assange</category><category>background checks</category><category>bcp</category><category>best infosec blog</category><category>betting syndicates</category><category>billion dollar scams</category><category>biometrics</category><category>blog</category><category>blogging</category><category>bug bounty</category><category>call fraud</category><category>car recall</category><category>carding</category><category>celebgate</category><category>child safety</category><category>clone</category><category>cloud</category><category>cloud audit</category><category>cloud sec summit 2014</category><category>cloudburst</category><category>comment spam</category><category>company board</category><category>compromised passwords</category><category>content filtering</category><category>copyright</category><category>core infrastructure vulnerability</category><category>corruption</category><category>creating strong password</category><category>credit card. online fraud</category><category>creepshots</category><category>customer experience</category><category>cyber</category><category>cyber bullyng</category><category>cyber cafe</category><category>cyber criminals; cyber crime</category><category>cyber relationship addiction</category><category>cyber resilience</category><category>cyber risk</category><category>cyber war</category><category>cyberparenting</category><category>cybersex addiction</category><category>cybersquatting</category><category>cyver security</category><category>ddos</category><category>deat threats</category><category>dictionary attacks</category><category>digital trash</category><category>drones</category><category>economic fraud</category><category>egovernment</category><category>email theft</category><category>fake appointments</category><category>fake apps</category><category>fake emails</category><category>fake jobs</category><category>fake news</category><category>fake passport bust kanpur</category><category>fake passport scams</category><category>fake passports</category><category>fappening</category><category>filesharing</category><category>finding a lost phone</category><category>floods</category><category>forgery</category><category>fraud</category><category>fraud management</category><category>fraud.</category><category>free antivirus</category><category>google glass</category><category>google play</category><category>hacked cars</category><category>icloud security risk</category><category>indian</category><category>information security forum ISF</category><category>internet addiction</category><category>internet of things</category><category>ipr</category><category>istalks</category><category>julian assange</category><category>lagos</category><category>large sporting events</category><category>legal</category><category>loss of iphone</category><category>low orbit ion cannon</category><category>lucius</category><category>luciusonsecurity youtube</category><category>make billions</category><category>malicious insider</category><category>malware on phone</category><category>megan meier</category><category>missed call scam</category><category>national crime records bureau</category><category>national cyber security policy</category><category>natural disasters</category><category>news of the world</category><category>nifty</category><category>one ring scam</category><category>onli</category><category>online etiquette</category><category>online gaming addiction</category><category>online piracy</category><category>online relationships</category><category>online safety</category><category>panic over leaked data</category><category>paper shredding</category><category>password theft</category><category>passwords</category><category>peeping toms</category><category>pen testing</category><category>personal devices</category><category>perverts</category><category>perverts. cybertrolls</category><category>petrol pump tampering</category><category>pilot</category><category>planes</category><category>ponzi</category><category>posting anti national content</category><category>prank</category><category>prankster</category><category>premium rate numbers</category><category>privacy policy of matrimonial sites</category><category>prosecution</category><category>radical</category><category>ransom</category><category>recover a lost phone</category><category>regulatory</category><category>rehtaeh parsons</category><category>reputation loss</category><category>road safety</category><category>romania</category><category>sabotage</category><category>scareware</category><category>school shooting</category><category>security campaigns</category><category>security controls</category><category>security organisation</category><category>security professionals</category><category>security researchers</category><category>security testing</category><category>smart product hacks</category><category>sms</category><category>social network risks</category><category>spamfilter</category><category>spies</category><category>sponsored ads</category><category>spurious messages</category><category>stalker apps</category><category>steubenville rape</category><category>stock market</category><category>stop think connect</category><category>stranger danger</category><category>stratfor</category><category>swatting</category><category>swiss bank revelations</category><category>tax evasion</category><category>terror indoctrination</category><category>terrorist</category><category>texting and driving</category><category>thumb Drives</category><category>toll fraud</category><category>top security blog</category><category>trolls</category><category>tweet</category><category>tweet  responsibly</category><category>tweet safely</category><category>tweets that get you jailed</category><category>tweets that get your fired</category><category>twins</category><category>twitter crackdowns</category><category>twitter hack</category><category>unencrypted link</category><category>unmanned drones</category><category>unstructured Data</category><category>verifying offer letters</category><category>vishing</category><category>voice mail hacks</category><category>voyeurs</category><category>whitecollar crimes</category><category>zeus</category><category>zoom bombing</category><title>Lucius on Security</title><description>Expert advice on cybersecurity, cybersafety and cybercrime. Using real incidents, I explain why cyber risks occur, what form they take, and how they affect cybercitizens as individuals, employees, citizens and parents. Opinions expressed in this blog represent my personal views</description><link>http://luciusonsecurity.blogspot.com/</link><managingEditor>noreply@blogger.com (Lucius on Security)</managingEditor><generator>Blogger</generator><openSearch:totalResults>290</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-4267980033361848888</guid><pubDate>Sun, 05 Dec 2021 16:26:00 +0000</pubDate><atom:updated>2021-12-05T21:56:52.228+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">fake jobs</category><category domain="http://www.blogger.com/atom/ns#">job recruitment scam</category><category domain="http://www.blogger.com/atom/ns#">online scams</category><category domain="http://www.blogger.com/atom/ns#">verifying offer letters</category><title>Six clues to check if my Job opportunity is FAKE?</title><description>&lt;p&gt;A source of income is a prerequisite to sustain a family or livelihood. There is no dearth of job seekers as young adults continuously enter the workforce. Bagging the first job after graduation or a downsizing is challenging. The scramble by anxious job aspirants for limited opportunities is actively exploited by fraudsters posing as company officials or job consultants. Fraudsters target unsuspecting job aspirants looking for lucrative jobs overseas or jobs which offer greater job security, such as with the Government. Job scams affect companies or sectors with large scale recruitment such as banks, Information Technologies, Call Centers, Retail and Government.&lt;/p&gt;&lt;p&gt;The modus operandi of the scam runs deep from first contact, to fake interviews, fake training, and finally a fake offer letter.&amp;nbsp; Along the way a sum of money is taken on one or more pretexts. The fraudster gets in touch, when a prospective job seeker responds to spam emails or a fake job advertisement. Once the job seeker, makes contact the fraudsters pose as company officials or job consultants using fake ids and spoofed letter heads. The documents appear legitimate and may include a job description, salary, and benefit details. During the entire process personal data such as identity verification, certificates, past employment letters and bank statements are sought allegedly to process the job offer and obtain visas. The jobseeker finds out about the scam only when they turn up at the company premises on the joining date or they fail to receive a joining intimation. By then the fraudster is long gone. The job seekers only resort is to intimate the company and file a complaint with the cyber police to try and recover the amount. For the police, acting on several such minor complaints is a tedious task, and the prospective employer rarely can pursue any investigation on its own as the company is not party to the fraud. The net effect is that scammer makes money and the scammed job aspirant bears the loss.&lt;/p&gt;&lt;p&gt;The only way to stay safe is to avoid the scam in the first place, by recognizing red flags which help smell a rat in the process.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Listed below are six such flags for job recruitment scams:&lt;/p&gt;&lt;p&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Recognize a jobseeker’s vulnerability:&lt;/b&gt;&amp;nbsp; A pressing need for a stable job is the precise vulnerability fraudsters exploit in job recruitment scams. The desire to not lose a good opportunity lowers the victim’s guards and is used by fraudsters to create a sense of urgency to force victims to make quick decisions without adequate research or consultation. It vital to realize that frauds are played on multiple people using a well-oiled template designed to win trust. It’s a big business and the victim is not a random target. For many, so pressing is the need for a good job, that even if warned that the job opportunity probably was a fraud, the advice would be a brushed off with the self-assurance that a response to an email would not hurt. In effect, it the step that sets the fraud rolling.&lt;/p&gt;&lt;p&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Verify, Verify and Verify Again:&lt;/b&gt; Before you respond to the email, there are vital clues in the initial correspondence to verify its authenticity.&amp;nbsp;&lt;/p&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;&quot;&gt;&lt;p&gt;a.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Source of the email or job posting:&lt;/b&gt;&amp;nbsp; Check if the email was from the company or a reputed job portal? To do so, match the received email domain (@thecompany.com) with the email domain from the portal or company. if it’s the same, then the mail is probably genuine, if not a misspelled email id is a sure sign that it’s a phishing site set-up for a recruitment scam.&amp;nbsp; &amp;nbsp;If the email comes from an unidentified source either because the consultant was not known or the client wants to keep the job confidential, a website search helps to verify the consultants background and reputation. Studying the site would probably give you an insight into how reliable the company is.&lt;/p&gt;&lt;p&gt;b.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Check if the job exists:&lt;/b&gt; In some cases, it’s easy to check if the job you are applying for exists.&amp;nbsp; Some companies especially the Government advertises all their vacancies on their website.&amp;nbsp;&lt;/p&gt;&lt;p&gt;c.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Check for the company’s recruitment procedure:&lt;/b&gt; The career pages of the company website often explains the recruitment procedure. Most companies which are targets for recruitment scams have a warning put up on their website. If the procedure you are asked to follow deviates from the one on the website, you know it’s a scam.&lt;/p&gt;&lt;p&gt;d.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Confirm Recruiter email address:&lt;/b&gt;&amp;nbsp; Confirm if the recruiter has a genuine company email id which would be @thecompany.com, where “the company” is the prospective employer. If not, it’s probably a scam.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Never pay for a job:&lt;/b&gt; A request for payment for training or visa processing or any other services is a sure shot red flag that the job is fictious.&amp;nbsp; Many a time the ask for money is repetitive – small amounts for application, training, uniform, and the appointment letter. Most companies clearly state on their website that they do not request payment for selection. One could confirm directly with the company if they request payment for any step in their selection process before a payment is made.&lt;/p&gt;&lt;p&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Review what documents are requested:&lt;/b&gt; There are types of document that are not usually requested during the interview process. These include bank statement, tax documents, credit card details and other financial statements.&amp;nbsp;&lt;/p&gt;&lt;p&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;No job without interview:&lt;/b&gt; Every job selection process will have an interview whether offline or online.&amp;nbsp; If the job does not have an interview, then it’s probably fake or there is something illegal in the offer process. if called for an interview, the id tags, interview location, and questions you ask may give provide a sense of the genuineness of the process.&amp;nbsp;&lt;/p&gt;&lt;p&gt;6.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Verify the offer letter:&lt;/b&gt; Try to check if the offer letter is genuine. Some companies offer the facility of verifying the offer letter online on their career portal, using information provided in the letter.&amp;nbsp; Other clues to fake offer letters are receiving offer letters on WhatsApp or any social networking sites and poor grammar. Offer letters from large companies are normally very well written and grammatically correct and sent from official company email ids.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Picking up these Red Flags may help prevent you from losing money, time, and personal information while in search of a job. Don’t shy away from asking questions!&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Stay smart, Stay Safe.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://luciusonsecurity.blogspot.com/2021/12/six-clues-to-check-if-my-job.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-6994119455669600616</guid><pubDate>Wed, 23 Dec 2020 04:08:00 +0000</pubDate><atom:updated>2020-12-23T09:38:45.921+05:30</atom:updated><title>Stay Safe  !  Merry Christmas and a Happy New Year</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuCPclrA_wD3LPdrGfjl77ZX3iiyaWcbp-COqRCZsM8BTbR_A-nSmZU8gUl6ssJyg-woM44veMw9Nz7sfrrFpfYNepU4cYH3d6avwdFulUDecfEdGWYHgXlRVZvNYmWJCjlnx_6Ml88qor/s1280/Merry+XMAS.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuCPclrA_wD3LPdrGfjl77ZX3iiyaWcbp-COqRCZsM8BTbR_A-nSmZU8gUl6ssJyg-woM44veMw9Nz7sfrrFpfYNepU4cYH3d6avwdFulUDecfEdGWYHgXlRVZvNYmWJCjlnx_6Ml88qor/w640-h360/Merry+XMAS.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://luciusonsecurity.blogspot.com/2020/12/stay-safe-merry-christmas-and-happy-new.html</link><author>noreply@blogger.com (Lucius on Security)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuCPclrA_wD3LPdrGfjl77ZX3iiyaWcbp-COqRCZsM8BTbR_A-nSmZU8gUl6ssJyg-woM44veMw9Nz7sfrrFpfYNepU4cYH3d6avwdFulUDecfEdGWYHgXlRVZvNYmWJCjlnx_6Ml88qor/s72-w640-h360-c/Merry+XMAS.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-6871348637144086618</guid><pubDate>Fri, 18 Dec 2020 04:01:00 +0000</pubDate><atom:updated>2020-12-18T10:04:03.788+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">be safe online</category><category domain="http://www.blogger.com/atom/ns#">defamation</category><category domain="http://www.blogger.com/atom/ns#">online etiquette</category><category domain="http://www.blogger.com/atom/ns#">tweets that get you jailed</category><category domain="http://www.blogger.com/atom/ns#">tweets that get your fired</category><title>How to avoid seven types of tweets and posts that can get you jailed or fired?</title><description>&lt;p&gt;Instances of people being fired from their job or jailed because of offensive, inappropriate or indiscreet tweets are plentiful!&amp;nbsp;&lt;/p&gt;&lt;p&gt;Once a tweet or post is online, it is not possible to control who views it. Even without many follower’s tweets go viral.&amp;nbsp; Intelligence and Police forces constantly analyze tweets and posts in the public domain to pick up information on potential suicides, terror threats and drugs.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Thinking before you post can save a lot of personal distress. Avoiding the seven types of posts and tweets illustrated below will improve your online image and prevent actions such as being fired, jailed, defamed or from lost opportunity and friends.&lt;/p&gt;&lt;p&gt;&lt;b&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Posting personal tweets on corporate accounts&lt;/b&gt;&lt;/p&gt;&lt;p&gt;OOPs! I got fired because I sent a personal crib on my corporate account instead of my group of buddies.&amp;nbsp; Quick thumbs are to blame but the damage cannot be redeemed. Once online on your company’s corporate accounts, it’s their reputation that’s at stake. What is posted on a corporate account represents the companies view and recovering from the mistake is usually a sack because that is what stakeholders expect. Even if you boss sympathized with you, your sack could not be prevented. Had you posted on your personal account representing your official position, it would have a similar outcome.&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Posting offensive Jokes&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;We must keep in mind that what you post online is taken at face value, it is not interpreted in the same way as the people who know you would. Online, you reach an audience with widely differing ideologies and perspectives. Your version of the joke may be interpreted as being racist or sexist. A close analogy is to pick on a childhood memory where you did something that you thought was fun, but your parent or teachers chided you for it. They had a different perspective. Even in the adult world, there is lots to learn from the perspectives of others much like our childhood days. The net result is usually self-defamation, loss of friends and opportunity.&amp;nbsp; Jokes on co-workers may results in HR warnings or action.&lt;/p&gt;&lt;p&gt;&lt;b&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Using Threat Words - Bomb, Kill, Suicide, Rape&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Words like these irrespective of intent would be interpreted as a call to action by police or anyone who viewed your post or tweet for that matter. I can assure you that even if the actions were a prank the arm of the law is not lenient. Many times, because of ideological reason we may use these words in a figurative way against a person of authority, “Kill the President” for instance which may result in severe consequences&lt;/p&gt;&lt;p&gt;&lt;b&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Making Threats&lt;/b&gt;&lt;/p&gt;&lt;p&gt;When you make a threat online, it can be used as evidence in a court of law. Threats can be made in a fit of rage, with actual intent or even to delay a social function or plane. Once a threat is made with intent, however prankful or in a fit of emotion, it will be dealt with very severely by law.&lt;/p&gt;&lt;p&gt;&lt;b&gt;5.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Content which contains violence, porn, or is racist or sexist in nature&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Companies are not tolerant of executives who post such type of content, if it does not get you fired it would hurt your job search prospects or rise in the organization. Companies expect their employees to be good corporate citizens, in the same way as we are expected to keep our political and religious views personal, and function in a neutral or secular way in the office. Obviously, pedophilic content will mean a jail sentence&lt;/p&gt;&lt;p&gt;&lt;b&gt;6.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Silly or Careless Comments&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Many people generate their own version of events, spread half truth or deliberate lies. Posting these online can get you in serious harm. When these tweets or posts are made against people of authority, the law enforcement agencies quickly act on their complaints. Visits to the police station and the legal action that follows would be a harassment that would best be avoided. Most often the sentence results in a red-faced public apology. Sometimes, what we believe to be true is fake news or a narrative spread deliberately for political or business interests, we should keep this in mind when we compose online messages&lt;/p&gt;&lt;p&gt;&lt;b&gt;7.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Retweeting or Liking&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Yes, retweeting or liking some types of post may be viewed as support to a campaign of hate or disinformation. In times of COVID, or civil unrest, malicious rumors are often circulated to stir the pot or for political interests. We must ensure that in these times we maintain calm and avoid spreading these rumors&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://luciusonsecurity.blogspot.com/2020/12/how-to-avoid-seven-types-of-tweets-and.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-1486471546164782809</guid><pubDate>Wed, 16 Dec 2020 12:09:00 +0000</pubDate><atom:updated>2020-12-16T17:39:22.283+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">online safety</category><category domain="http://www.blogger.com/atom/ns#">social media</category><category domain="http://www.blogger.com/atom/ns#">twitter hack</category><category domain="http://www.blogger.com/atom/ns#">zoom bombing</category><title>Twitter, Facebook, Zoom, LinkedIn, Instagram, Microsoft Teams, Gmail, Hotmail are they safe to use?</title><description>&lt;p&gt;&amp;nbsp;This was a question that deeply interested me for two primary reasons. The first was that even if they were unsafe, people would continue to use them because not to, meant that societal and business connections would be hampered. Afterall, most of the world’s population have signed up on these social media and collaboration platforms creating a gigantic network and data repository.&amp;nbsp; The second is simpler, its hard to tell if these platforms are unsafe until there is a public news outbreak, and at that time exit possibilities are limited.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The reality hit me, when a few large security companies continued to use a collaboration platform where several vulnerabilities had been publicly identified. Ideally one would think such an act would be counterproductive to their type of business and they should have shifted to a competitor.&lt;/p&gt;&lt;p&gt;Let us closely examine the dilemma. We have to sign up blindly to a popular platform assuming it to be safe and to keep private personal data.&amp;nbsp;&lt;/p&gt;&lt;p&gt;With all the news on security and privacy breaches, it is obvious that there is no platform that is 100% safe. Even platforms that spend billions are not. The big players however are committed to improving their customer trust and protecting their brand and investments, but the need for profits and the speed to bring new features may hamper their efforts to improve security and privacy. The commercial relationship between a user and a free to use platform is still evolving. Money can only be made through the analysis or sale of its content. That content has been crowdsourced without the clear specification of how it will be used or processed. Sadly, there is no fixed line between what’s right or wrong, it’s a tug of war between the platforms business interest, regulators, governments and its user community. All four must happily coexist to ensure the success of the ecosystem.&lt;/p&gt;&lt;p&gt;Each user of the platform has to secure their interests using means at their disposal. Written below are five tips that could help improve security and privacy:&lt;/p&gt;&lt;p&gt;a)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Set Security and Privacy Settings Appropriately:&lt;/b&gt; All&amp;nbsp; platforms have privacy and security settings. Reviewing these settings and tailoring them to your requirement&amp;nbsp; ensures personal information is retained within an approved set of people. Security and Privacy settings are important to ensure that your account is not hijacked, personal data is not visible to the public, to set limits for its use and to avoid ad spam.&lt;/p&gt;&lt;p&gt;b)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Keep a look out for security alerts:&lt;/b&gt; Simply, GOOGLE the “platform name + breach” and the results will clearly show that large platforms are not immune to severe security problems. The bigger they are the bigger the target they become. Once a breach has been detected, the platform would send out an email intimation of the breach, listing the data stolen, its potential impact and mitigation measures. Stolen data may be misused to send phishing or spam emails. Do read and implement the recommendations&lt;/p&gt;&lt;p&gt;c)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Keep a look out for privacy alerts:&lt;/b&gt;&amp;nbsp;Platform companies have been sued by regulators or face government hearing because of the data they collect, use and share. While, most of the information is post fact, once penalized they do put in measures to ensure better compliance in the future.&lt;/p&gt;&lt;p&gt;d)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Think before you Post: &lt;/b&gt;Ensure that you assess the personal value of what you post online and the risk or consequence for its loss. Do not post anything that may have consequences that you cannot accept. Remember what goes online stays online.&amp;nbsp;&lt;/p&gt;&lt;p&gt;e)&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;&lt;b&gt;Join platforms with a reputation to lose:&lt;/b&gt; Platforms with a reputation to lose will fight to preserve it by making business changes, working with regulators and investing to improve safeguards. Having been penalized or breached does not make a platform good or bad, its the post actions that tell the tale.&lt;/p&gt;&lt;p&gt;I trust these tips will help make your experience online safer.&amp;nbsp;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://luciusonsecurity.blogspot.com/2020/12/twitter-facebook-zoom-linkedin.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-434310371704844158</guid><pubDate>Mon, 14 Dec 2020 04:46:00 +0000</pubDate><atom:updated>2020-12-16T17:42:40.528+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Safe Online Schooling</category><category domain="http://www.blogger.com/atom/ns#">Safety tips for 3rd Grade</category><category domain="http://www.blogger.com/atom/ns#">Safety tips for 4th Grade</category><category domain="http://www.blogger.com/atom/ns#">Safety Tips for 7 year olds</category><category domain="http://www.blogger.com/atom/ns#">Safety Tips for 8 year olds</category><category domain="http://www.blogger.com/atom/ns#">Safety tips for 9 year olds</category><title>Online Safety Tips to keep 3rd and 4th Grade kids safe while Online Schooling and Surfing</title><description>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;font-family: arial;&quot;&gt;The coronavirus pandemic has forced children to spend a large part of their working day on the computer and online.&amp;nbsp; Our young kids are embracing the Internet at an accelerated pace.&amp;nbsp; Today’s essentials like online schooling and virtual friends’ meetings cannot be regulated based on the screen time norms of the past. The one- or two-hour screen time limit rule has fallen apart, as children are on the Internet for almost 6-8 hours a day.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;At the age of 7 to 9, logic and critical reasoning are still in the formative stages.&amp;nbsp; It becomes difficult to explain to kids what Internet risks are and how to avoid them. While instructions and advice must be given, and continually reinforced, it would be unwise to believe that your child would be safe all the time, simply based on the instructions you once gave.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;At this age, a child is usually not on social media or email or uses a personal mobile phone. This is a good thing because it avoids your child becoming a target for pedophiles who normally target children after viewing their online photos and videos, and trolls or surprisingly even jealous colleagues and their parents, for what they post online.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;What the child is a master off is the use of collaboration technology (video and chat) like Zoom, playing online games like Minecraft and surfing the Internet. At this age an interested child has already mastered how to learn from online instructional videos on YouTube or to research the Internet for topics of Interest.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Cyber risk must be assessed based on how the child uses the Internet. The child digital assets normally are a computer and an email id. The child may not use the email id, but it is usually needed to access online portals, such as for schoolwork.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The three main risks faced by children in these grades are from:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Malware:&lt;/span&gt; Cyber criminals embed malware in pirated or specifically prepared copies of games or software or images that children download. The malware would exfiltrate data such as pictures or files from the computer drive, and passwords for online accounts. Compromise of online account passwords would allow a cyber criminal to send emails using your id or use other types of service accounts. If multiple family members share the computer, then there is a risk of their accounts being compromised.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Content Exposure:&amp;nbsp; &lt;/span&gt;Surfing online would expose a child to objectionable content. Objectionable content is available easily if the right search words are entered. It may be unlikely that your child deliberates searches for such content but there is a high possibility that they may stumble on it.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Online Strangers: &lt;/span&gt;When children use YouTube tutorials to learn how to do things, for example to play games, they come across links and game servers for multi-player gaming. Children are adept at understanding how to click on these links which may have malicious content or to connect to game servers which may expose the child to other players with harmful intent.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Three Sets of Countermeasures to protect you child from online Harm&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Prevention from Internet Risks requires a combination of security countermeasures. All these together form the basis of a secure experience. There are three main set of security controls:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Secure the Computer&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Secure User Environment&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Parental Involvement&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Secure the Computer&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Each computer must be protected from security risks that it is exposed to when connected to external networks and through it use&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Use a supported version of Windows:&amp;nbsp;&lt;/span&gt; Win 10, 1909 is the least version supported for Home, Pro, Pro Education, and Pro for Workstations editions until May 2021. To check the Windows Version Select the Start button &amp;gt; Settings &amp;gt; System &amp;gt; About&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Use an Antivirus Plus Product:&lt;/span&gt; Installing an antivirus plus product offers different types of protection by scanning files for malware and adware, restricting (firewalling) risky network connections and avoiding risky websites.&amp;nbsp; Besides these, there are other features which would be useful for older children or adults.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Use Automatic Updates to ensure that your software is always patched&lt;/span&gt;: When a new vulnerability has been discovered, software companies release a patch. It’s simpler to set the Auto Update feature to ensure that computer software is always patched to the latest version. By using Automatic Updates, you do not have to visit the software vendors Update Web site to scan for updates. Instead, the software automatically delivers them to your computer. You should check the patch status regularly to ensure that the auto update mechanism works perfectly.&amp;nbsp; All software needs to be patched whether it is the operating system, collaboration software like ZOOM or tools provided by the school.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;To check for the Window Update Setting - select the Start &amp;gt;Windows logo Start button, and then go to Settings (Gear-shaped Settings icon) &amp;gt; Update &amp;amp; Security &amp;gt; Windows Update&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Secure User Environment&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Computer software configuration must tailor user security controls for the child’s use.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Create an Independent Child Account on Windows:&lt;/span&gt;&amp;nbsp; Microsoft allows the creation of a family account. The family account enables the linking and control of multiple profiles.&amp;nbsp; A child profile allows a parent the following benefits:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Set Screen time&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Require parent permission before buying stuff or downloading applications&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Filter content (applicable for only Microsoft Products)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Get reports of online activity&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Monitor Activity on the Computer&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Parent Supervised Downloads&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;Set Parental Controls&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Use PIN not Password:&lt;/span&gt; Windows Hello in Windows 10 enables users to sign in to their device using a PIN. A numeric PIN is easy for a child to remember without writing it down. A Hello PIN is tied to the specific device on which it was set up. That PIN is useless to anyone without physical access to the computer. If the PIN was shared with anyone else, they would not be able to sign in to any account from anywhere.&amp;nbsp; When you create your child account, you would first have to create a password. This password can be written down and stored safely. You child does not need to know or use it once a PIN has been set-up.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Create a Child Email Account:&lt;/span&gt; Parents should set-up an independent email id for their children rather than use their own.&amp;nbsp; Children would not normally use email. However, all online applications require an email account to sign in. Parents should keep the password secret and operate the account.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Set Parental controls:&lt;/span&gt;&amp;nbsp; Most antivirus software’s and browsers have parental controls. Parents need to research how to set age restrictions on browsers and the operating systems.&amp;nbsp; It is important to note that you would need to set controls on every browser you use and the operating system. Parental controls allow restriction on screen time, buying online, surfing age appropriate sites, blocking or explicitly allowing certain applications to run on the computer, and usage reporting&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Parental Involvement&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;The role of parents is largely to curate and keep safe the experience the child has on the Internet. It is similar to the physical world where a parent ensures that their child is not harmed or bullied on the playground. Parents provide advice on Internet safety and etiquettes and help children understand their online experiences and interactions. Children of this age seek clarifications from their parents as they learn or are excited to talk about their online discoveries. These conversations must be encouraged for the valuable insights they provide on a child’s online behavior and experience.&amp;nbsp; More so because parents are often unfamiliar with the games played or applications used by their children.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Protecting Children from Strangers:&lt;/span&gt;&amp;nbsp; To protect children from meeting strangers online, it is important to know where children can meet with and chat with strangers.&amp;nbsp; Normally, the opportunity would arise on social media or multiplayer gaming. It is therefore important for a parent to evaluate the stranger meeting potential for every online interaction your child has. All children should use an anonymous profile which should not give away their age, sex, real name, and location. You child should be made aware that they should never share real life information online. Children love play acting and if you successfully convinced them to play the role of “ShootDragon60” they will easily make up a play character of their own.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Protecting you Child from Age Inappropriate Content:&lt;/span&gt; The parental settings on the search engine or antivirus suite or Microsoft family account will help restrict adult sites.&amp;nbsp; This is a must. It will prevent your child from visiting inappropriate sites. However, despite content filtering there may be content that may be borderline and allowed. For example, if your child loved to read the Percy Jackson series based on Greek Mythology, and later proceeds to research the topic online, it is likely that the Greek God images would be depicted as nude or seminude sculptures.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;At this age, we teach our children how to cover up to protect them from child abuse and the sight of these images pique their curiosity as they are contrary to their parents instructions.&amp;nbsp; Another example are advertisements targeting children for lingerie and make-up products shown on channels which children watch. Parents need to explain or reason out these topics with a child, otherwise they may form their own narrative.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Following these risk mitigation tips would ensure that the Internet risks to your 7-9-year-olds would reduce and their Internet experiences are safe ones&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://luciusonsecurity.blogspot.com/2020/12/online-safety-tips-to-keep-3rd-and-4th.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-456783736050996152</guid><pubDate>Sat, 12 Dec 2020 09:03:00 +0000</pubDate><atom:updated>2020-12-12T21:35:32.441+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Business Email Compromise</category><category domain="http://www.blogger.com/atom/ns#">email scams</category><category domain="http://www.blogger.com/atom/ns#">Phishing</category><title>There is a 100% chance that you will click on a Phishing Email!</title><description>&lt;p&gt;&amp;nbsp;Astounding isn’t it! I am sure that you will question the audacity of the statistic. I can tell you with confidence that even a security expert is not immune to falling prey to phishing emails. That is why even the most mature security companies are hacked.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Any human will click on an email whose content appeals to a human emotion that is strongly felt.&amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;There is a phishing bullet with everyone’s name on it. To illustrate the point, let us study two examples.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The first is related to the COVID pandemic. You receive a phone call from an unknown caller. The caller requests for your personal details and telephone number to register you for the immunization program. There is a fee to paid, for which a link would be sent via SMS.&amp;nbsp; Now ask yourself, would you give your personal details to the caller.&amp;nbsp; Most probably not, and certainly not before you asked several clarifying questions to verify the program and the identity of the caller or institution.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;But, would you do the same if the information was requested via email. Most people who are eager to receive the vaccine would fill up the information and await further instruction. This would be step two, if the scamster intended to scam you for money. In some cases, the scamster would be satisfied with just your personal details.&lt;/p&gt;&lt;p&gt;The second example is called business email compromise. Cybercriminals earned 26 billion US$ from this type of fraud over the last four years. There are many different variations, but the first step is to identify a willing employee who would respond to an email with a specifically crafted instruction from a senior.&amp;nbsp; If you are working in a company, and your CEO or CFO sent you an email, how would you react. I guess instantly.&amp;nbsp; The catch here is that while the email alias was correct, the address was off another user on a public email account like Hotmail or Google. Therefore, if your CEO was Lucius Lobo, then the address would look like Lucius Lobo &amp;lt;jynx234@hotmail.com&amp;gt;.&amp;nbsp; The pressure to respond quickly to the CEO or any senior executive may simply short circuit the basic validation an employee would normally make. Which in this case was to understand that the actual email id is not the company id or as the example indicates, is in no way connected to even the alias.&lt;/p&gt;&lt;p&gt;&lt;b&gt;If human emotion compels us to drop the extra validation that we would normally do, then trying to restore this habit when it comes to responding to emails would keep us safe.&amp;nbsp;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;If you wish to reply to unsolicited emails then try and question the veracity of the contents of the email, as you would have done if the same request was made telephonically. Bear in mind that any unsolicited email is high risk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Here are four quick tips, for common scams:&lt;/p&gt;&lt;p&gt;1.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;If the unsolicited email is promising a free lottery, job or anything return, it’s probably fake. There is nothing free in life&lt;/p&gt;&lt;p&gt;2.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;If the unsolicited email is promising something extraordinary like a high rate of return or payoff, then avoid it. It is fake or a scam.&lt;/p&gt;&lt;p&gt;3.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;If the unsolicited email is asking for personal information, its likely that is a scam. May not be one that causes you to lose money, but more often than not fills your inbox with junk emails.&lt;/p&gt;&lt;p&gt;4.&lt;span style=&quot;white-space: pre;&quot;&gt;	&lt;/span&gt;If the alias of the email is of someone you know, but the email id is different, it’s a scam email specifically designed to avoid spam filters.&lt;/p&gt;&lt;p&gt;Keep these tips in mind as you read your next unsolicited email. In my next blog we will examine how to avoid being scammed from a genuine but hacked email id.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://luciusonsecurity.blogspot.com/2020/12/there-is-100-chance-that-you-will-click.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-6263459515320506309</guid><pubDate>Wed, 26 Jul 2017 11:51:00 +0000</pubDate><atom:updated>2017-07-26T17:21:42.408+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Bullying</category><category domain="http://www.blogger.com/atom/ns#">cyber crime</category><category domain="http://www.blogger.com/atom/ns#">Cyber Harrassment</category><category domain="http://www.blogger.com/atom/ns#">cybercrime</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">defamation</category><category domain="http://www.blogger.com/atom/ns#">fake news</category><category domain="http://www.blogger.com/atom/ns#">sexting</category><category domain="http://www.blogger.com/atom/ns#">sexual harassment</category><title>STOP FAKE NEWS – PAUSE, EVALUATE and FORWARD</title><description>

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The potential
for fake news to turn viral using social media is quite real. There have been
several instances where rumors have incited mob violence between rival
communities. The consequence got out of hand when illiterate tribals in a remote
Indian district received a Whatsapp message which claimed that children could
be kidnapped by a gang and their body parts sold. The message went viral in
these villages and mobs of upto 500 people pounced on strangers who they
suspected to the child kidnappers, in all there were two incidents where 7
people were lynched.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;It is quite
apparent to every cybercitizen that fake or distorted news is on the rise.
Social media allows every individual a platform to disseminate such news or
information. Fake news is routinely posted for vested interest such as
political distortion, defamation, mischief, inciting trouble and to settle
personal problems. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;As aptly illustrated in the case above, when
fake news goes viral the ill effects escalate to a point where they can cause
physical damage, loss of life or long-term animosity between sections of society.
Purposely-crafted fake/distorted news introduced over periods of time by vested
interests can distort perspectives and social harmony. Such news is effectively
used for ideological indoctrination.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Creation of
fake news is extremely simple. Listed below are six commonly used methods&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;margin: 0in 0in 0pt 0.25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Individuals
concoct their own stories&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Marketers
release competitive advertisements based on unproven data&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Groups
with vested interests manipulate the volume and narrative of news. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Photographs
are morphed&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin: 0in 0in 0pt 0.25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Old
photographs are used to depict recent events&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;margin: 0in 0in 8pt 0.25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -0.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font: 7pt/normal &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Real
photographs are used to defame&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Obviously, it
is also quite easy to catch the perpetrator. A few years back, a twitter hoax
was dealt with by a strong reprimand, but not today. Fake news, hoaxes, rumours
or any other type of content that results in incitement or defamation attract
stronger penalties and jail terms. Police are more aware and vigilant.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Most cybercitizens
unwitting help fake news go viral by recirculating it. It creates a sense of
belief that it must be true because the other person must have validated the
news before sending it. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 12pt; line-height: 107%; mso-bidi-font-size: 11.0pt;&quot;&gt;Pause before forwarding, Evaluate veracity and then Forward.
&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Do not be that link in
the chain responsible for the circulation of Fake News&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Cybercitizens,
do take care when crafting messages on social media – a little mischief may
provide you a few years in government paid accommodation – Jail. Advise your
children to be responsible and do cross check news received over social media
before recirculating or believing in it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


</description><link>http://luciusonsecurity.blogspot.com/2017/07/stop-fake-news-pause-evaluate-and.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-8354295096628433539</guid><pubDate>Wed, 26 Jul 2017 11:46:00 +0000</pubDate><atom:updated>2017-07-26T17:16:03.179+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">best cybersecurity blog</category><category domain="http://www.blogger.com/atom/ns#">cybercrime</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">ETCISO</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">India cyber security policy</category><title>ETCISO a mobile app for Security News in India from the Economic Times</title><description>&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Keeping updated with security news just got simpler with the new ETCISO app. There is a mix of Indian and Global news on security.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA4xfDVJHAACwk1q1sw0KYCyY91DVmk3YwA8LCbqegeiKBKRJSOF-rBYagXo0zckrmjp1dREa26gMPZkjG9NkrhJR7QZFiwoxHDW_FSTIHqXlqdEINPs-KjTqWmA9wiuRbAOhErxs2TjvB/s1600/IMG-20170725-WA0016.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;719&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA4xfDVJHAACwk1q1sw0KYCyY91DVmk3YwA8LCbqegeiKBKRJSOF-rBYagXo0zckrmjp1dREa26gMPZkjG9NkrhJR7QZFiwoxHDW_FSTIHqXlqdEINPs-KjTqWmA9wiuRbAOhErxs2TjvB/s640/IMG-20170725-WA0016.jpg&quot; width=&quot;356&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2017/07/etciso-mobile-app-for-security-news-in.html</link><author>noreply@blogger.com (Lucius on Security)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA4xfDVJHAACwk1q1sw0KYCyY91DVmk3YwA8LCbqegeiKBKRJSOF-rBYagXo0zckrmjp1dREa26gMPZkjG9NkrhJR7QZFiwoxHDW_FSTIHqXlqdEINPs-KjTqWmA9wiuRbAOhErxs2TjvB/s72-c/IMG-20170725-WA0016.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-7327676062891821898</guid><pubDate>Mon, 24 Jul 2017 00:00:00 +0000</pubDate><atom:updated>2017-07-24T05:30:01.038+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber crime</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">Data Privacy</category><category domain="http://www.blogger.com/atom/ns#">data protection</category><category domain="http://www.blogger.com/atom/ns#">Personal Data Privacy</category><title>What is Data Privacy and why is it an important issue?</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;The question of
whether privacy is a fundamental right is being argued before the honorable
Supreme Court of India. It is a topic to which a young India is waking up too.
Privacy is often equated with Liberty, and young Indians wants adequate
protection to express themselves.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Privacy according to Wikipedia&amp;nbsp;is the ability of an individual or group
to seclude themselves, or information about themselves, and thereby&lt;span style=&quot;background: white; color: #222222; font-size: 10.5pt; line-height: 107%;&quot;&gt; express themselves selectively.&lt;/span&gt; There
is little contention over the fact that privacy is an essential element of
Liberty and the voluntary disclosure of private information is both part of
human relationships and a digitized economy.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;The reason for
debating data privacy is due to the inherent potential for surveillance and
disclosure of electronic records which constitute privacy such as sexual
orientation, medical records, credit card information, and email.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Disclosure
could take place due to wrongful use and distribution of the data such as for
marketing, surveillance by governments or outright data theft by cyber
criminals. In each case, a cybercitizens right to disclosure specific information
to specific companies or people, for a specific purpose is violated. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Citizens in
western countries are legally protected through data protection regulation. There
are eight principles designed to prevent unauthorized use of personal data by
government, organizations and individuals&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184; width: 618px;&quot;&gt;
 &lt;tbody&gt;
&lt;tr style=&quot;height: 39.75pt; mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: none; border-top: solid black 1.0pt; height: 39.75pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span lang=&quot;EN-IN&quot; style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Lawfulness, Fairness &amp;amp; Transparency&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid black 1.0pt; border-left: none; border-right: none; border-top: solid black 1.0pt; height: 39.75pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Personal data need to be processed based on the consent
  given by data subjects. Companies have an obligation to tell data subjects
  what their personal data will be used for. Data acquired cannot be sold
  to other entities say marketers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 50.5pt; mso-yfti-irow: 1;&quot;&gt;
  &lt;td style=&quot;background: #E7E7E7; border: none; height: 50.5pt; mso-border-top-alt: solid black 1.0pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Purpose
  limitation&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #E7E7E7; border: none; height: 50.5pt; mso-border-top-alt: solid black 1.0pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Personal data collected for one purpose should not be used
  for a different purpose. If data was collected to deliver an insurance
  service, it cannot be used to market a different product.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 55.15pt; mso-yfti-irow: 2;&quot;&gt;
  &lt;td style=&quot;height: 55.15pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Data
  minimization&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;height: 55.15pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Organizations should restrict collection of personal data
  to only those attributes needed to achieve the purpose for which consent from
  the data subject has been received.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 34.35pt; mso-yfti-irow: 3;&quot;&gt;
  &lt;td style=&quot;background: #E7E7E7; height: 34.35pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Accuracy&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #E7E7E7; height: 34.35pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Data has to be collected, processed and used in a manner
  which ensures that it is accurate. A data subject has to right to inspect and
  even alter the data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 50.5pt; mso-yfti-irow: 4;&quot;&gt;
  &lt;td style=&quot;height: 50.5pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Storage
  limitation&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;height: 50.5pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Personal data should be collected for a specific purpose
  and not be retained for longer than necessary in relation to this purposes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 79.85pt; mso-yfti-irow: 5;&quot;&gt;
  &lt;td style=&quot;background: #E7E7E7; height: 79.85pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Integrity
  and confidentiality&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #E7E7E7; height: 79.85pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Organizations that collect this data are responsible for its
  security against data thefts and data entry/processing errors that may alter
  the integrity of data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 35.2pt; mso-yfti-irow: 6;&quot;&gt;
  &lt;td style=&quot;height: 35.2pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Accountability&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;height: 35.2pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Organizations are accountable for the data in their
  possession&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr style=&quot;height: 39.75pt; mso-yfti-irow: 7; mso-yfti-lastrow: yes;&quot;&gt;
  &lt;td style=&quot;background: #E7E7E7; border-bottom: solid black 1.0pt; border: none; height: 39.75pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 94.25pt;&quot; valign=&quot;top&quot; width=&quot;126&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Cross
  Border Personal information&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Requirements.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;background: #E7E7E7; border-bottom: solid black 1.0pt; border: none; height: 39.75pt; padding: 2.2pt 2.2pt 2.2pt 2.2pt; width: 369.25pt;&quot; valign=&quot;top&quot; width=&quot;492&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Personal
  information must be processed and stored&amp;nbsp;
  in secured environment which must be ensured if the data is processed
  outside the border of the country&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;It is important
for cybercitizens to understand their privacy rights particularly in context of
information that can be misused for financial gain or to cause reputational
damage.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2017/07/what-is-data-privacy-and-why-is-it.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-2055742087842243395</guid><pubDate>Fri, 21 Jul 2017 02:40:00 +0000</pubDate><atom:updated>2017-07-21T08:10:00.174+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blackmail</category><category domain="http://www.blogger.com/atom/ns#">email scams</category><category domain="http://www.blogger.com/atom/ns#">fake lottery scams</category><category domain="http://www.blogger.com/atom/ns#">fake matrimonial profile</category><category domain="http://www.blogger.com/atom/ns#">matrimonial scams</category><category domain="http://www.blogger.com/atom/ns#">sexting</category><category domain="http://www.blogger.com/atom/ns#">sexual harassment</category><title>Looking for love on Matrimonial Sites! Watch out for the Fraudsters</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;On Oct 2014, I
wrote a blog titled “&lt;a href=&quot;http://luciusonsecurity.blogspot.in/2014/10/conmen-use-fake-matrimonial-profiles-to_9.html&quot;&gt;Conmen
use fake matrimonial profiles to scam prospective grooms seeking arranged
marriages”&lt;/a&gt; warning cyber citizens on matrimonial scams. Unfortunately,
since then it appears that these scams have become common and lucrative. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;These scams
earned between 4 lakhs to 1.2 crore rupees (6000 – 200000 USD). Victims were
women in their 30’s who had posted their profiles on matrimonial portals. They
were emotionally blinded and trusted the online relationship. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The scams used
in reported cases in The Times of India, July 20, 2017, were custom harassment,
gift clearance or urgent need of money due to a financial or medical emergency.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoTableGrid&quot; style=&quot;border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-yfti-tbllook: 1184;&quot;&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style=&quot;border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 130.25pt;&quot; valign=&quot;top&quot; width=&quot;174&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&amp;nbsp;31 year old nurse&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 181.4pt;&quot; valign=&quot;top&quot; width=&quot;242&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Conned to accept a
  parcel that apparently was to contain 15000 GBP ( approx. 12 lakhs)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-left: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 155.85pt;&quot; valign=&quot;top&quot; width=&quot;208&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Paid Rs 4.2 Lakhs ( 6000
  USD) to a fake courier company&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 130.25pt;&quot; valign=&quot;top&quot; width=&quot;174&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;40 year woman&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 181.4pt;&quot; valign=&quot;top&quot; width=&quot;242&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Conned to bail her
  suitor out of a sticky payment at the &amp;nbsp;customs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 155.85pt;&quot; valign=&quot;top&quot; width=&quot;208&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Paid 74 lakhs (11000 USD)
  into several accounts&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 130.25pt;&quot; valign=&quot;top&quot; width=&quot;174&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Young Woman&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 181.4pt;&quot; valign=&quot;top&quot; width=&quot;242&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Conned to bail out her
  UK based suitor as custom officials had caught him carrying a lot of pounds&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 155.85pt;&quot; valign=&quot;top&quot; width=&quot;208&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Paid Rs 4.8 Lakhs (7000
  USD)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 130.25pt;&quot; valign=&quot;top&quot; width=&quot;174&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;35 year old woman&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 181.4pt;&quot; valign=&quot;top&quot; width=&quot;242&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Conned into supporting
  an allegedly US based suitor out of his financial difficulties&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 155.85pt;&quot; valign=&quot;top&quot; width=&quot;208&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Paid Rs 1.2 Crore &amp;nbsp;(184000 USD)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;border-top: none; border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 130.25pt;&quot; valign=&quot;top&quot; width=&quot;174&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;40 year old woman&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 181.4pt;&quot; valign=&quot;top&quot; width=&quot;242&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Conned into bailing out
  her UK suitor due to a sticky payment at customs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;border-bottom: solid windowtext 1.0pt; border-left: none; border-right: solid windowtext 1.0pt; border-top: none; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 155.85pt;&quot; valign=&quot;top&quot; width=&quot;208&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Paid Rs 4.65 Lakhs (7000
  USD)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;There will be a
large number of unreported scams as they involve threats of defamation using
explicit photos or video’s shared during the relationship. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;I would again
remind cybercitizens, that conmen actively target you, use social engineering
techniques to gain your trust, and know how to hide themselves on the Internet.
These conmen are often difficult to trace or it is simply too expensive to do
so. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;My
recommendation is to use common sense when in an untrusted and unverified
relationship. Any request for money should sound a loud buzzer in your brain. Do
not also share content of sexual nature which could later be used against you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2017/07/looking-for-love-on-matrimonial-sites.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-5836288086384311856</guid><pubDate>Thu, 20 Jul 2017 11:31:00 +0000</pubDate><atom:updated>2017-07-20T17:01:00.921+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">best cybersecurity blog</category><category domain="http://www.blogger.com/atom/ns#">best infosec blog</category><category domain="http://www.blogger.com/atom/ns#">best security blog</category><category domain="http://www.blogger.com/atom/ns#">cyber crime</category><category domain="http://www.blogger.com/atom/ns#">cybersafety</category><title>LuciusonSecurity ranked among the Top 100 Information Security Blogs for Data Security Professionals</title><description>LuciusonSecurity is privileged to be chosen as one of the&amp;nbsp;&lt;a href=&quot;http://blog.feedspot.com/information_security_blogs/&quot;&gt;Top 100 Information Security Blogs for Data Security Professionals&lt;/a&gt;&amp;nbsp;in 2017 by feedspot.com.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://luciusonsecurity.blogspot.com/2017/07/luciusonsecurity-ranked-among-top-100.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-7884533549085198576</guid><pubDate>Thu, 20 Jul 2017 02:00:00 +0000</pubDate><atom:updated>2017-07-20T07:30:14.183+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Bullying</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">defamation</category><category domain="http://www.blogger.com/atom/ns#">disgruntled employees</category><category domain="http://www.blogger.com/atom/ns#">email scam</category><category domain="http://www.blogger.com/atom/ns#">malicious insider</category><category domain="http://www.blogger.com/atom/ns#">ransom</category><title>Disgruntled Driver asks Share Ride Cab Company OLA  to Pay Ransom for Kidnapped Passenger</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;A doctor called a shared ride cab to drive him to the private hospital
where he worked. The shared ride arrived on time, but instead of taking the
doctor to his destination, the driver threatened the doctor and kidnapped
him.&amp;nbsp; The OLA cab driver, in turn posted
a ransom request of Rs 5 Crore (750,000 USD) to the shared ride company, even
calling up the hospital were the doctor worked to pressurize the company into
paying. The Delhi police, were successful after a 13 day chase to free the
doctor unharmed and nab the kidnapper.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The motive for
the kidnapping was to teach the shared ride company a lesson as they were
miffed due to alleged nonpayment of incentives.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;



&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The incident
simply highlights the damage disgruntled employees can cause, many a times due
to uncontrolled emotions. While the kidnapping seems to be one of a kind,
incidents caused by employees in the workplace is quite common. In the early
days, it used to be sabotage of plan and machinery, but in a digital world it
is the theft of IP, data or even online defamation of the company and its
personnel.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2017/07/disgruntled-driver-asks-share-ride-cab.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-8298862009997563241</guid><pubDate>Wed, 19 Jul 2017 12:06:00 +0000</pubDate><atom:updated>2017-07-19T17:36:29.450+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">billion dollar scams</category><category domain="http://www.blogger.com/atom/ns#">Cybercrooks</category><category domain="http://www.blogger.com/atom/ns#">email scams</category><category domain="http://www.blogger.com/atom/ns#">fake helpdesk scams</category><category domain="http://www.blogger.com/atom/ns#">fake lottery scams</category><category domain="http://www.blogger.com/atom/ns#">make billions</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">ransomware</category><title>Four Easy Ways that make Cybercrooks Billions ! With money you hand them!!!!</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO0dQX-Hl5kB6cDkbpRgR9xm9M1-vPOsnDX6R6xF1rLgkeNiSrs85GN8sv28HNtG7wup1_5F0QUQJGnSVKKs9fyZgMeeUG28273GmCcRArAHPqupuXObn149eo0J6Zx1ygExQxZaOS1yZG/s1600/Scams.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;460&quot; data-original-width=&quot;1002&quot; height=&quot;292&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO0dQX-Hl5kB6cDkbpRgR9xm9M1-vPOsnDX6R6xF1rLgkeNiSrs85GN8sv28HNtG7wup1_5F0QUQJGnSVKKs9fyZgMeeUG28273GmCcRArAHPqupuXObn149eo0J6Zx1ygExQxZaOS1yZG/s640/Scams.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>http://luciusonsecurity.blogspot.com/2017/07/four-easy-ways-that-make-cybercrooks.html</link><author>noreply@blogger.com (Lucius on Security)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhO0dQX-Hl5kB6cDkbpRgR9xm9M1-vPOsnDX6R6xF1rLgkeNiSrs85GN8sv28HNtG7wup1_5F0QUQJGnSVKKs9fyZgMeeUG28273GmCcRArAHPqupuXObn149eo0J6Zx1ygExQxZaOS1yZG/s72-c/Scams.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-1895031747021321413</guid><pubDate>Mon, 17 Jul 2017 13:32:00 +0000</pubDate><atom:updated>2017-07-17T19:02:09.586+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber bullyng</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">cybercrime</category><category domain="http://www.blogger.com/atom/ns#">email scams</category><category domain="http://www.blogger.com/atom/ns#">passwords</category><category domain="http://www.blogger.com/atom/ns#">piracy</category><category domain="http://www.blogger.com/atom/ns#">ransomware</category><category domain="http://www.blogger.com/atom/ns#">Spam</category><title>Twelve Commandments that will never fail to Keep You Cyber Safe Online</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;As the digital
world explodes with a variety of new online services, cyber threats have become more
ingenuous, dangerous, and spawned multiple variants and types. As
each new threat makes the headline, the accompanying set of threat specific security
recommendations confuses cybercitizens. Cybercitizens want a comprehensive list of recommendations that do not change
frequently. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;There are twelve foundational security practices that will help keep you and your family safe.
Practicing them will harden your defenses against cybercrime and also reduce the
negative effects of social media use.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;1)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not use a device with pirated software&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Pirated
software is not patched as it is unlicensed. Unpatched software have security
vulnerabilities which can be easily exploited to steal data and credentials&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;2)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not use a device which is not set for automatic updates of Operating
System patches&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Automatic
patching for personal devices is the best way to ensure that the latest
security patches are applied and security loopholes closed before
cybercriminals can get to them&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;3)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not use a device without updated antimalware (antivirus) software
installed&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Antimalware
software reduces the probability of a malware infection (e.g. ransomware) on
your device. For it to be effective to catch the latest malware variants, it has to be automatically updated with the latest updates.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;4)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shall not download pirated movies, games and other such material&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Something
free may turn out to be expensive, both financially and to your reputation.
Malware is usually bundled with pirated content or applications &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;5)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shall not use a site without trying to verify its authenticity&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Authenticity
of a site can be verified by the Lock Icon and accompanying digital certificate.
While not fool proof, it reduces the possibility of spoofed lookalike sites
designed to steal your credentials&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;6)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shall not ignore inappropriate content on social networks, always report or dislike
it&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Inappropriate
content influences the minds of our children as they stumble upon it online.
Hate content in particular may induce biases which take a long time to reverse.
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;7)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not indulge or encourage cyber bullying online &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;A
parent or teacher has the additional responsibility of guiding children on the
right online behavior. You do not want your children to bully or be bullied&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;8)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not use passwords that can be easily guessed and promise to&amp;nbsp; keep the password a secret&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Try
to choose complex passwords, do not reuse them on multiple sites and always
store them securely. The easiest way to get into your online accounts is by
stealing your passwords&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;9)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not fall be tempted by fraudulent emails promising financial windfalls or
miracle cures or cheap medicines&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Try
to check the authenticity of the email. Electronic communication is easily
manipulated, as it is difficult to verify the authenticity of the sender. Scams
like these can cost you money and affect your health. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;10)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shall not forsake your responsibility of helping your older parents or young
kids to be safe as they use the internet&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Be
a guide and easily available as both old and young learn to use the internet
and face cyber risks. Being available, requires that you can be reached for
instant advice on problems they encounter&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;11)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt never trust a stranger blindly online&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Always
be suspicious when dealing with online strangers. At any point during the
relationship never let down your guard. The identity of an online person cannot
be easily verified. It can however be easily manipulated. Online friends
sometimes have the vilest of intention which can lead to all forms of blackmail,
particularly if they have incriminating pictures and videos. Besides adults,
young children are potential victims&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraph&quot; style=&quot;margin-left: .25in; mso-add-space: auto; mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;12)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; font-weight: normal;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thou
shalt not set a weak password for your mobile phone or keep it unlocked&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;A
stolen phone with an easy to guess password or if unlocked, is a sure
invitation into all your signed in accounts and personal data. A large number
of phones are left unattended or lost each year. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: .5in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2017/07/twelve-commandments-that-will-never.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-7773302945246918543</guid><pubDate>Fri, 10 Feb 2017 06:38:00 +0000</pubDate><atom:updated>2017-02-10T12:10:55.855+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">compromised passwords</category><category domain="http://www.blogger.com/atom/ns#">Cyber Bullying</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">data breaches</category><title>Are my password freely available on the Internet? Four actions that can minimize damage</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Frequently we
hear of large data breaches from email, social networking, news and other types
of websites which we are members off.&amp;nbsp;
Many of us may have been challenged by the site owner to change our
password when the site suffered a breach and would even have received a breach notification
email. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;It would
however be useful to have a service which could tell us if our passwords were
available in plain text online, anytime we wished. The good news is that a
security blogger Troy Hunt has set-up a site &lt;a href=&quot;http://haveibeenpwned.com/&quot;&gt;http://haveibeenpwned.com/ &lt;/a&gt;&amp;nbsp;&amp;nbsp;Here you
could enter your email id (a common login credential) and find out if the
corresponding password was exposed on breached sites.&amp;nbsp; The bad news is that it covers only data breaches
where the hacker has dumped the compromised list of passwords on paste sites
such as PasteBin. This represent a small fraction of the passwords exposed and
in all probability allowed a window of time for the hacker to gain access to
your account before the breach was uncovered. It also allows anyone (friend,
foe, bully, ex-partner, relative, competitor and colleague) who knows your
email id to check for the password, and selectively target you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;My advice to
all Cybercitizens in general but more specifically after you discover that your
password has been exposed is to”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: Arial;&quot;&gt;1.&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;Never
reuse that exposed password and to never reuse password on multiple sites. A
single exposure can have a cascading effect in the compromise of your online
assets. If you have used the same password on multiple sites then quickly
change the password on all of them. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: Arial;&quot;&gt;2.&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;To use
two factor authentication which a large majority of sites offer to limit the
use of disclosed passwords&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: Arial;&quot;&gt;3.&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;To
change your passwords once every 3 months to limit the exposure window. In
large dumps the hacker may take time to target your account and if you have changed
your password by then, you would get lucky&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; mso-fareast-font-family: Arial;&quot;&gt;4.&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;To quickly
change passwords once you are aware that there has been a breach &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2017/02/are-my-password-freely-available-on.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-4722834744338192596</guid><pubDate>Thu, 13 Oct 2016 09:33:00 +0000</pubDate><atom:updated>2016-10-13T15:04:49.013+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">419 fraud</category><category domain="http://www.blogger.com/atom/ns#">impersonation</category><category domain="http://www.blogger.com/atom/ns#">IRS scams</category><title>Catching IRS fraudsters proves the scale and profitability of impersonation cons</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: arial, sans-serif; font-size: 12pt; line-height: 107%;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Fraudsters who
posed as IRS officials threatened hardworking Americans with imprisonments for
the crime of tax default. Their modus operandi was simple; question victims
about defaulting on their tax payments, threaten legal action, arrest,
deportation or suspension of business rights, and finally offer an easy way out
– a chance to close the case without prosecution for a onetime deposit in a
bank account or alternatively getting the bank account details of the victim
which were then wiped clean.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;


&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Incredible as
it may seem, the con was so successful that the kingpin lived a life of 5 star
luxury, with fancy cars and hotel stays. In a short span of two years he
amassed significant wealth and employed over a 700 people in several call centers
across India and the US. Most of these call centers were owned by trusted
associates and employed high school graduates or drop outs who they lured with
high pay and luxurious lifestyles. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Income earned
in dollars was converted into India rupees using illegal money laundering
channels called Hawala. All employees were paid in cash. Call center executives
were offered incentives based on the income they generated from these frauds,
and the ones that performed were even offered a chance to work directly with
the kingpin, in his home city of Ahmedabad, Gujarat while being put up in 3 and
4 star hotels.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Fortunately,
India takes these crimes seriously, and once reported, Mumbai police detectives
over a period of 15 days, went incognito and surveyed these call centers before
busting them and arresting over 50 people. All convicted will be tried under
the Indian IT act and penal code. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;There are
however, several countries that do not take action on these crimes as the
victims are not citizens of their countries.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Cybercitizen’s
are advised to be wary about calls which ask for personal information and money
in some form or the other.&amp;nbsp;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2016/10/catching-irs-fraudsters-proves-scale.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-1758036301315708855</guid><pubDate>Wed, 10 Feb 2016 13:56:00 +0000</pubDate><atom:updated>2016-02-10T19:26:58.043+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">data security</category><category domain="http://www.blogger.com/atom/ns#">fake helpdesk scams</category><category domain="http://www.blogger.com/atom/ns#">Microsoft scams</category><category domain="http://www.blogger.com/atom/ns#">stay safe online</category><title> Will you pay 300$ and allow scamsters remote control to your computer ! child play for this BPO</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Microsoft
customers in Arizona were scammed by a BPO setup by fraudsters who’s executives
represented themselves as Microsoft employees and managed to convince them that
for a 300$ charge they would enhance the performance of their desktop
computers.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Once signed up, the BPO technician logged onto using a remote access
software that provided full remote control over the desktop and proceeded to
delete the trash and cache file, sometimes scanning for personal information.
The unsuspecting customer ended up with a marginal improvement in performance.
After one year of operation, the Indian police nabbed the three men behind the
operation and eleven of their employees. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;There were
several aspects to this case “&lt;/span&gt;&lt;a href=&quot;http://timesofindia.indiatimes.com/city/pune/Pune-BPO-which-cheated-Microsofts-clients-in-US-busted/articleshow/50910652.cms&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Pune BPO which cheated Microsoft Clients
in the US busted&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;” that
I found interesting:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;1)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The
ease with which customers were convinced to part with money and to allow an
unknown third party to take remote control over their computer. With remote
control one can also install malicious files to act as remote backdoor or
spyware making the machine vulnerable. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;2)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The
criminals had in their possession a list of 1 million Microsoft customers with
updated contact information&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: Arial;&quot;&gt;3)&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The
good fortune that the Indian government is unsympathetic to cybercrime both
within and outside their shores which resulted in the arrests. In certain other
countries crimes like these continue unhindered.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -.25in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;b&gt;Cybercitizens
should ensure that they do not surrender remote access to their computers or
install software unless they come from trusted sources. &lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2016/02/will-you-pay-300-and-allow-scamsters.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-7398295163233229033</guid><pubDate>Sat, 06 Feb 2016 07:43:00 +0000</pubDate><atom:updated>2016-02-06T13:13:58.061+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">Data Privacy</category><category domain="http://www.blogger.com/atom/ns#">keep kids safe online</category><category domain="http://www.blogger.com/atom/ns#">security awareness</category><category domain="http://www.blogger.com/atom/ns#">security campaigns</category><title>Three Must Do’s to make a Security Awareness Champion</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEUYCbBUjHrblFpbslyGe1KYKKwa1pz-8fb0snutKzW9fgefo1oTl0xqqOCqmyrcOu8M_j9WX7SC1dhXK0BScwGTFbVzUWDO_gagUvarvtyHcTYHKp5naA8wSyigQ57Mo2IkCmsUHubbaR/s1600/Follow_The_Leader_clip_art_medium.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEUYCbBUjHrblFpbslyGe1KYKKwa1pz-8fb0snutKzW9fgefo1oTl0xqqOCqmyrcOu8M_j9WX7SC1dhXK0BScwGTFbVzUWDO_gagUvarvtyHcTYHKp5naA8wSyigQ57Mo2IkCmsUHubbaR/s640/Follow_The_Leader_clip_art_medium.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Setting an
example is the best way to institutionalize security awareness within a
workplace or at home. Colleagues and children naturally follow examples set by
champions as it makes it easy to mimic rather than spend time to self-learn. I
found three important aspect to championing security awareness.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Be a role model&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Cybercitizens champions
take an active interest in being secure by keeping themselves updated and
implementing security guidelines for the gadgets and services they use at home,
for work and on the Internet. Knowledge on the do and don’ts of security for
workplace system is normally obtained through corporate security awareness
programs but for personal gadgets and services one needs to invest time to read
the security guidelines provided by the service/product provider or on gadget blogs.
Security guidelines provide information on the best practice to be used for secure
configuration of gadgets, use of passwords, malware prevention and methods to
erase data.&amp;nbsp; Besides security issues like
password theft or loss of privacy, there is the possibility of becoming a
victim of fraud when using ecommerce. Most ecommerce sites have a fraud
awareness section to educate customers on the common types of frauds and on
techniques to safeguard against them. Role models take pride in what they do
and this passion becomes a source of motivation to others around them. A
security champion delights on possessing detailed insights on how to use the
best security features in gadgets (say mobile phones) or on recent security
incidents. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Be a security buddy at your home&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Telling people
what to do to keep themselves secure online is difficult, primarily because
security controls lower the user experience; as an example most people may prefer
not to have a password or keep a simple one for ease of use. People tend to
accept risk because they do not fully realize the consequences of a damaged reputation
or the financial impact from the fraudulent use of credit cards until they or
someone close, experiences its effects firsthand. Security champions act as
security buddies at home. They take time to understand how their family members
both young and old, use the Internet and to themselves learn about the safety,
privacy and security issues related to those sites. Buddies perform the role of
coaches, engaging in regular discussions on the use of these sites from a
perspective of avoiding security pitfalls and the avoidance of risky behavior that
may lead to unwanted attention from elements looking to groom children for sex
or terrorism. Highlighting incidents of similar nature helps raise awareness of
the reality of the risk.&lt;b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Display commitment to security at your
workplace&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;Small acts go a
long way in promoting useful security behavior. A small security cartoon
displayed on a work bench can immensely add to the corporate security awareness
effort. Champions bring attention to the importance of security in business by bringing
up security in routine business discussions; for example circulating insights
into recent published security incident within a discussion group (leadership,
business) and popping the security question “what if a customer security or
privacy is affected” during project discussions. &lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;</description><link>http://luciusonsecurity.blogspot.com/2016/02/three-must-dos-to-make-security.html</link><author>noreply@blogger.com (Lucius on Security)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEUYCbBUjHrblFpbslyGe1KYKKwa1pz-8fb0snutKzW9fgefo1oTl0xqqOCqmyrcOu8M_j9WX7SC1dhXK0BScwGTFbVzUWDO_gagUvarvtyHcTYHKp5naA8wSyigQ57Mo2IkCmsUHubbaR/s72-c/Follow_The_Leader_clip_art_medium.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-5467332724803038215</guid><pubDate>Thu, 28 Jan 2016 06:24:00 +0000</pubDate><atom:updated>2016-01-28T11:54:37.108+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-terror</category><category domain="http://www.blogger.com/atom/ns#">keep kids safe online</category><category domain="http://www.blogger.com/atom/ns#">swatting</category><title>Swatting airports helpdesks diverts the attention of anti-terror forces on the Indian Republic Day</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;26th January,
the Indian Republic Day, was targeted by ISIS operatives to stage multiple
terror strikes designed to cause terror and panic in major Indian cities. The
Indian intelligence and police agencies over the last few weeks successfully
nabbed ISIS operatives foiling major terror plots in the run up to the 26th.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;With tensions
running high, and the anti-terror squads under full alert, a mentally disturbed
man swatted airport and railway helpdesks claiming that bombs would go off on
Mumbai-bound flights, and cars stuffed with explosives would blow up at the
airports and the Pune Railway Station.&amp;nbsp;
Wikipedia describes swatting as an act of deceiving an emergency service
(via such means as hoaxing an emergency services dispatcher) into dispatching
an emergency response based on the false report of an ongoing critical
incident.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;The man who was
later apprehended had made four calls made over two days to airports and
railway stations claiming that there was a car packed in the airport vicinity
loaded with explosives or that a person onboard a flight was carrying a bomb in
his hand luggage. This ensured that over 200 policemen were diverted from
deterring real terrorists to comb these routes and flights. One flight was
delayed and another diverted mid-air to the nearest airport for an
anti-sabotage check. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif;&quot;&gt;While swatting
is relatively new in India, it is quite common in the US. Swatting may occur
for pranks, online harassment or even for revenge. Recently Skype introduced a
patch which protected the privacy of a callers IP address, a flaw which could
be exploited to launch swat teams on rival gamers using IP geolocation.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 11pt; line-height: 107%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 11pt; line-height: 107%;&quot;&gt;Such acts are akin to
terrorism&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 11pt; line-height: 107%;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 11pt; line-height: 107%;&quot;&gt;and punishable as a crime
because of&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 11pt; line-height: 107%;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 11pt; line-height: 107%;&quot;&gt;its potential to cause
disruption, waste the time of emergency services, divert attention from real
emergencies and possibly cause injuries and psychological harm to persons
targeted. Cybercitizens are advised not to make prank calls for whatever
reasons as the joke may turn into a long ugly jail term&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2016/01/swatting-airports-helpdesks-diverts.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-8884668967999306656</guid><pubDate>Fri, 22 Jan 2016 06:10:00 +0000</pubDate><atom:updated>2016-01-22T11:40:27.563+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">hazards of social networking</category><category domain="http://www.blogger.com/atom/ns#">ISIS propaganda</category><category domain="http://www.blogger.com/atom/ns#">posting anti national content</category><category domain="http://www.blogger.com/atom/ns#">terror indoctrination</category><title>Cybercitizens, stay away from commenting or liking posts with terror ideologies</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Of current
global concern is the ease at which terror organizations are able to use social
media to spread their ideology and coerce young people living in developed countries
to leave all and fight wars in hostile lands. Their success stems from their
ability to spin doctor content and communicate in a way that is alluring to
young people. &amp;nbsp;The outcome is brainwashed
young people who willing give up their lives, blowing themselves up in crowded
areas killing innocent people. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;As the death
toll mounts so does the pressure on social media companies or online platforms
which have given a voice to these terror organization. I do not think that it
is difficult to draw a line between free speech and hateful ideology, but every
action to sanitize platforms with millions of uploads every minute is bound to
cost. These platforms got away through regulations that did not make them
liable for content, only to remove it. Which they made harder to do, as they decided
to only remove content that violate something obvious like pornography but
others which were more specific like defamation, sullying reputation, hate
speech was subject to a court order. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Individuals suffered
because they had little recourse in erasing sullied reputations online and many
countries with a different cultural ideologies had to impose great Internet
walls to block content that affected their beliefs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;While it
remained a matter of individuals and their sufferings, it scant mattered to the
social media companies but now when lives are being lost, and it is a matter of
huge public interest; they are under tremendous pressure to get their act right
and reduce the ability of these groups from using this platform while still
maintaining the privacy of individual users.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;I was surprised
to see a Davos new headline which stated that &lt;/span&gt;&lt;span style=&quot;background-color: white; color: red; font-family: Arial, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.theguardian.com/technology/2016/jan/20/facebook-davos-isis-sheryl-sandberg&quot;&gt;&lt;span style=&quot;font-family: Calibri, sans-serif; text-decoration: none;&quot;&gt;Facebook&#39;s Sheryl Sandberg: &#39;likes&#39; can help stop Isis
recruiters&lt;/span&gt;&lt;/a&gt;,&lt;/span&gt;&lt;span style=&quot;font-family: Arial, sans-serif;&quot;&gt;&amp;nbsp;was&amp;nbsp;recommending&amp;nbsp;cybercitizens to spread positive messages
(counter&amp;nbsp;propaganda) on terror communication, thus drowning out the hate
chorus. Will that work, or is it an attempt by social networking companies to resist change. Should not
counter propaganda of any sort be organized!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Liking or
commenting on such sites brings you in the eye of law enforcement, may sully
your reputation and could also make you a target. Rather than people, a bot
could do the same work, if the method is effective. &amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;











&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Instead social
media companies should devise technical means to identify and remove harmful
content, sites, messages and any other form of small social communication.
Identifying patterns of indoctrination through algorithms may not be a very
difficult task as the initial indoctrination, I would expect is in plain
speech.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2016/01/cybercitizens-stay-away-from-commenting.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-6011742935229139734</guid><pubDate>Thu, 20 Aug 2015 13:03:00 +0000</pubDate><atom:updated>2015-08-20T18:33:06.513+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Ashley madison</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">panic over leaked data</category><category domain="http://www.blogger.com/atom/ns#">reputation loss</category><title>Should one fret over the leaked Ashley Madison data?</title><description>

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Several news
sites have reported that 15 GB of identity data stolen last month from
AshleyMadison.com online has been made available on the darknet. Three sites
have since sprung up with allows interested parties to query the site to
ascertain the identity of Ashley Madison users.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&amp;nbsp; &lt;/span&gt;AshleyMadison.com allowed married people to
have short extramarital affairs. While the morality of the services provided
may be questionable, and is perhaps best left to judgment of individuals, there
is a serious risk of reputation damage if the data is fake. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;There are
several reasons why it may be. Firstly this is not the first leak to appear
online; there have been several in the span of the last month. Then, there is
the question of the validity of the email address and other details which were
never verified. There is always a probability that a prominent person or an
associate’s identity was used to create a profile. From one analysis, it seems
that 90% of the users were male and most of the female profiles were fake. If this
is true than users subscribed but may not have been able to use the site. Many
users may have subscribed due to curiosity or for fun. Some articles seem to
suggest that once subscribed removing a personal profile from the site was not
easy. Finally, there is a strong suspicion that some of this data may have been
amalgamated from other breaches.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;On the flip
side there seems to be several reports of individuals claiming to verify that
they were users of the site and confirming their email ids in the released
data. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Whatever, may
be the truth, I would like cybercitizens to know that though it seems to be a
sordid affair not to disrupt your personal lives purely by data that cannot be
verified put out on the net.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


</description><link>http://luciusonsecurity.blogspot.com/2015/08/should-one-fret-over-leaked-ashley.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-5870662827520430833</guid><pubDate>Tue, 18 Aug 2015 11:40:00 +0000</pubDate><atom:updated>2015-08-18T17:10:22.264+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">finding a lost phone</category><category domain="http://www.blogger.com/atom/ns#">malware on phone</category><category domain="http://www.blogger.com/atom/ns#">recover a lost phone</category><category domain="http://www.blogger.com/atom/ns#">reputation</category><category domain="http://www.blogger.com/atom/ns#">sexting</category><category domain="http://www.blogger.com/atom/ns#">stolen phones</category><title>8 steps to prevent a stolen phone from ruining you digital life</title><description>

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Smart phones
are lost because they were accidental forgotten at public places or stolen. A
phone today, is a cybercitizens gateway to their digital life. It allows use of
apps for services such as for banking, social networking and taxi booking,
storage for personal pictures and videos, email, instant messaging and
telephony.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Most phones
have an Internet finder program which helps to locate phones connected to the
Internet. The service works well, if the phone is forgotten at places which are
likely to have a lost and found counter like airports and restaurants where the
staff is unlikely to pocket it. More often, the key risk is the loss of battery
life effectively shutting down the phone. Even when a phone is lost and picked
up by a person wanting to return it, a study has shown that most of the people
browse private data like contact and pictures, understandably to locate the owner.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Most thieves
quickly switch off the phone and remove the SIM card to effectively disable the
Internet finder applications. When a phone is stolen or lost there are three
risks that the owner face.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Financial Loss&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Typically, you
lose the value of the phone and the additional cost of calls made from the
phone which obviously, one has to pay for. While there may be insurance that
can be bought to recover part of the cost of the phone; to prevent fraudulent
calls the cellular provider needs to be quickly alerted to deactivate the
number.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Ensuring that the phone is
protected by a strong screen saver password will mitigate the risk of expensive
calls. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Reputation Loss&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Many personal
applications like Facebook, twitter, email or such social media accounts are
logged on and can be accessed without a password allowing personal information
to be read or malicious comments to be written. Such comments may affect
personal reputation or be defamatory which may results in soured relationships
or legal action. Hereto a strong screen saver password can help. If the thief
is unable to crack the password, the simplest action would be to format the
phone, reload the operating system and sell it in the black market&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Privacy Loss&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Privacy can be
lost in two ways. By viewing data stored directly on the phone memory or on
memory cards such as personal pictures, by reading private posts, email and by
looking up the browsing history. Private data such as sexting pictures of other
individuals received and stored on the phone may compromise their privacy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Four steps that
cybercitizens should take to reduce the risks to themselves and the incentive a
thief gets from a stolen phone:-&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt 0.5in; text-indent: -0.5in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;1.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Set
a strong password and short lock screen timeout.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;If your phone provides the option to erase
data after several unsuccessful tries to enter a passcode, typically 10,
activate it. New phones disallow the formatting of the&amp;nbsp;operating system&amp;nbsp;without a password
thereby rendering the phone worthless and reducing the incentive to steal it. A
strong password or passcode has at least 8 characters that include some
combination of letters, numbers, and special characters&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;2.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Try to avoid using external memory
cards unless they are encrypted&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt 0.5in; text-indent: -0.5in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;3.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Update
the phone regularly, to ensure that&amp;nbsp; vulnerabilities which can be exploited to
unlock password protected phones is patched&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;4.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Backup contacts and other data &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Four steps that
cybercitizens should take when the phone has been stolen or lost and returned.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;1.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Use the Internet finder app to locate
the phone and erase data&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;2.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Reset all passwords for apps and
accounts even if the phone has been returned &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt 0.5in; text-indent: -0.5in;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;3.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;If
returned, reformat and reload the operating system to avoid any malware being
surreptitiously loaded. Malware can be used to spy, steal credentials and cause
an even bigger financial loss&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;4.&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;Block you SIM card by calling up your
cellular provider&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin: 0in 0in 0pt;&quot;&gt;

&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2015/08/8-steps-to-prevent-stolen-phone-from.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-4630846667716068178</guid><pubDate>Sat, 15 Aug 2015 04:32:00 +0000</pubDate><atom:updated>2015-08-15T10:02:48.227+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">best security blog</category><category domain="http://www.blogger.com/atom/ns#">Top 50 InfoSec blogs</category><category domain="http://www.blogger.com/atom/ns#">top security blog</category><title>LuciusonSecurity among the Top 50 Infosec Blogs 2015</title><description>

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Digital Guardian
a Gartner Quadrant leader in the Data Protection product market has named this
blog as one of the &lt;a href=&quot;https://digitalguardian.com/blog/top-50-infosec-blogs-you-should-be-reading&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Top 50 Infosec Blogs you should be reading.&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;Thanks you
Digital Guardian&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2015/08/luciusonsecurity-among-top-50-infosec.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-6571357434120565724</guid><pubDate>Fri, 14 Aug 2015 16:25:00 +0000</pubDate><atom:updated>2015-08-14T21:55:09.294+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adulteration</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">petrol pump tampering</category><title>I lost money because my petrol pump was hacked by attendants!</title><description>

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The neighborhood petrol
pump which I occasional use, was in the news for allegedly
tampering with the meter readings. Some of the staffers had hacked the
circuitry to modify the pulser readings which converted the flow volume to the
digital readout. As a consequence, 5% of the bill value was inflated. Hacking
is typically associated with software and remote Internet connections, but all
sort of meter readings can be tampered with to skim small sums of money or
develop glitches that result in inflated bills.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The only way to
tackle such misuse is by surprise calibration checks and stringent penalties.
In the case of the above petrol pump, the ingenious system also had a switch to
toggle back to normal values during a calibration inspection. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif;&quot;&gt;The police
believes that this particular fraud may be widespread, which simply
demonstrates the ease with which the perpetrator of the modified pulser is able
to sell his invention without being caught.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://luciusonsecurity.blogspot.com/2015/08/i-lost-money-because-my-petrol-pump-was.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3907977938761037823.post-8074644259815618383</guid><pubDate>Thu, 13 Aug 2015 16:35:00 +0000</pubDate><atom:updated>2015-08-13T22:05:43.229+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">car recall</category><category domain="http://www.blogger.com/atom/ns#">cyber attacks</category><category domain="http://www.blogger.com/atom/ns#">cyber criminals</category><category domain="http://www.blogger.com/atom/ns#">cyber safety</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">smart product hacks</category><category domain="http://www.blogger.com/atom/ns#">terrorists</category><title>Hacking SMART services in Cars, Homes, and Medical Devices – a cinch!</title><description>

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Businesses are reinventing themselves by transforming traditional services and service
delivery into digital services. Digital services utilize smart products to
provide enhanced service quality, additional features and to collect data that
can be used to improve performance. Smart products can be remotely controlled using
Wi-Fi or cellular connections, software, sensors that makes smart dumb devices,
cloud infrastructure and mobiles.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Examples
of digital products and services are network connected cars, home appliances,
surveillance systems, wearables, medical devices, rifles and so on. Very
recently ethical hackers exploited a software glitch that allowed them to take
control of a Jeep Cherokee while on the road and drive it into a ditch. All
this with the hapless driver at the wheel!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;While
the car hack made headlines and led to the recall of 1.4 m vehicles, it also signaled
the beginning of an era where cyber-attacks or software glitches cause physically
harm to cyber citizens, blurring the lines between safety and security.
Cyber-attacks in the near future will do a lot more damage than destroy reputations,
steal money or spy on intimate moments people would prefer to keep private, it
may maim or kill in a targeted or random fashion and that too in the privacy of
one’s own home. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The
severity of some of the demonstrated exploits by ethical hackers were downplayed
because the attacker required physical access to the vehicle to execute the
attack. I for one, do not know what happens to my vehicle while it is serviced
or valet parked, both ideal opportunities to fiddle with the electronic systems
and even modify the firmware. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 8pt; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;All
smart devices will be connected and updatable over wireless networks. Wireless
updates are ideal opportunities for hackers to obtain access or control over
these devices. However, digital products or services must have built in
defenses not only for over the air hacks but equally on risks from technicians,
mechanics or others that have physical access to the smart infrastructure. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Startups
with limited budgets may struggle to provide adequate security to their new
incubations, allowing ample opportunity for maliciously minded individuals and
cyber criminals to find ways to compromise the service. Investment in smart
product security will be driven by liabilities around safety regulations,
compliance and strict penal provisions. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;


</description><link>http://luciusonsecurity.blogspot.com/2015/08/hacking-smart-services-in-cars-homes.html</link><author>noreply@blogger.com (Lucius on Security)</author><thr:total>0</thr:total></item></channel></rss>