<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7152608155290614106</id><updated>2024-12-19T08:58:07.413+05:30</updated><category term="Security"/><category term="Cyber Security"/><category term="Computer Security"/><category term="Cyber Crime"/><category term="Computer Forensics"/><category term="Application Security"/><category term="Hacking news"/><category term="Mobile Hacking"/><category term="Android Hacking"/><category term="Malware Analysis"/><category term="Browser Forensics"/><category term="Google"/><category term="Server"/><category term="Mobile Security"/><category term="Penetration Testing"/><category term="Certification and License"/><category term="Cyber Attacks"/><category term="Network"/><category term="Network Forensics"/><category term="News"/><category term="Vulnerability Management"/><category term="Web Server Hacking"/><category term="Active Defense"/><category term="Compliance"/><category term="Computer Virus"/><category term="Cyber Threat Detection"/><category term="DNS Security"/><category term="Digital Forensic Law"/><category term="Email Investigations"/><category term="Evidence Acquisition"/><category term="Evidence Analysis"/><category term="Firewall"/><category term="Forensic Analysis"/><category term="Hacking Tools"/><category term="Hardware Security"/><category term="Incident Response"/><category term="Information Security"/><category term="Internet Security"/><category term="Internet of things"/><category term="Log Management"/><category term="MAC OS"/><category term="Memory Analysis"/><category term="Network Security"/><category term="Password protection"/><category term="Phishing Detection"/><category term="Post Exploitation"/><category term="Protocol Analysis"/><category term="Ransomware"/><category term="Reverse Engineering"/><category term="Risk"/><category term="Security Research"/><category term="Social media security"/><category term="Web Application Security"/><category term="Whatsapp"/><category term="Advanced Persistent Threat"/><category term="Backdoors"/><category term="Big Data"/><category term="Cloud Computing"/><category term="Cyber Incident Forensics"/><category term="Cyber Kill Chain"/><category term="Cyber Law"/><category term="Cybersquatting"/><category term="DDOS Attacks"/><category term="Data Protection"/><category term="Digital Forensics"/><category term="E-mail Security"/><category term="Encryption"/><category term="Human Factor"/><category term="ISO 27001 Lead Auditor"/><category term="Identity Access Management"/><category term="Intrusion Detection"/><category term="Password"/><category term="Phishing Attack"/><category term="Privacy Policies"/><category term="Risk Management"/><category term="Rootkits"/><category term="Safety Tips"/><category term="Security Audits"/><category term="Security Awareness Training"/><category term="Security Certifications"/><category term="Security Training"/><category term="TCP/IP"/><category term="Trojans"/><category term="Virus"/><category term="Vulnerability Assessment"/><category term="Worms"/><category term="iphone"/><title type='text'>REDBACK COUNCIL - RISC </title><subtitle type='html'>Redback Conseil international de cybersécurité</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default?start-index=26&amp;max-results=25'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>141</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-7126360623383208054</id><published>2020-03-02T12:13:00.001+05:30</published><updated>2020-03-02T12:20:32.458+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Application Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="iphone"/><category scheme="http://www.blogger.com/atom/ns#" term="MAC OS"/><title type='text'>Android Phones Now Harder To Hack Than iPhones | RISC </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;While governments and law enforcement agencies continue to push device makers to create backdoors, there is always a workaround that lets them crack open devices on there own in the name of investigation.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiITe4qmRD71g1dMEnnlyDtZRFHc4gTRKj2OId_VzZz0DMgq0P5e57PoMtD-n9tHC-XWsW2CZwUnGI_HiplN-lWqm0X3aDhlhcHcgvzSOr_z_cEW8qufZvTyqsQ9wOTBt9CYAp-09k-YQwZ/s1600/blogge.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiITe4qmRD71g1dMEnnlyDtZRFHc4gTRKj2OId_VzZz0DMgq0P5e57PoMtD-n9tHC-XWsW2CZwUnGI_HiplN-lWqm0X3aDhlhcHcgvzSOr_z_cEW8qufZvTyqsQ9wOTBt9CYAp-09k-YQwZ/s640/blogge.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;In this regard, companies like Cellebrite and Greyshift have turned out to be very helpful, as they provide solutions to break into almost any device.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Back in 2016, we saw a major controversy involving Apple and the FBI when Apple refused to unlock the iPhone of the shooter involved in the San Bernardino case.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;It’s a different story that recently Apple faced criticism for not encrypting iPhone backup data on iCloud, thereby leaving scope for government access.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;iPhone more hackable than Android&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Anyway, when it comes to cracking smartphones, iPhones are assumed to be superior to Android in terms of privacy and security.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;However, the story has taken a u-turn, and Android phones have become harder to crack than iPhones. That’s according to a forensic detective Rex Kiser who works with the Fort Worth Police Department.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;“Right now, we’re getting into iPhones. A year ago we couldn’t get into iPhones, but we could get into all the Androids. Now we can’t get into a lot of the Androids,” Kiser told Vice.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Kiser suggests that it has now become tougher to extract data from newer operating systems. Probably, they are “trying to make it harder for law enforcement to get data from these phones, under the guise of consumer privacy.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;During a test conducted by NIST, Cellebrite’s UFED InFeild Kiosk tool couldn’t efficiently harvest browsing activity, GPS data, or app data from social media apps like Facebook, Instagram, Twitter, etc., when trying to get inside Google Pixel 2 and Galaxy S9.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Surprisingly, the tool returned empty-handed in the case of Huawei P20 Pro. As per the test report, the tool (version v7.5.0.875) supports over 15,000 types of devices on paper, including Android, iOS, and feature phones.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;On the other hand, the UFED tool could suck in a lot more when tested on iPhone X.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Overall, it’s evident that OEM encryption backdoors could be helpful, but law enforcement agencies aren’t relying on them entirely. Instead, they’re trying to create backdoors on their own by reverse engineering.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;So, technically, it’s possible to get inside a smartphone as new as iPhone 11 Pro Max; it will just take time, patience, and resources.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;However, one thing to note here is that breaking a smartphone’s encryption isn’t the end of the road, according to former FBI agent Bob Osgood.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Beyond that, forensic detectives need to decipher millions of lines code inside apps containing complex data structures that constantly change with software updates. That’s where companies like Greyshift, Cellebrite, and MSAB jump into the game with their magic wands.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/7126360623383208054/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2020/03/android-phones-now-harder-to-hack-than.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/7126360623383208054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/7126360623383208054'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2020/03/android-phones-now-harder-to-hack-than.html' title='Android Phones Now Harder To Hack Than iPhones | RISC '/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiITe4qmRD71g1dMEnnlyDtZRFHc4gTRKj2OId_VzZz0DMgq0P5e57PoMtD-n9tHC-XWsW2CZwUnGI_HiplN-lWqm0X3aDhlhcHcgvzSOr_z_cEW8qufZvTyqsQ9wOTBt9CYAp-09k-YQwZ/s72-c/blogge.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-4112966555309279574</id><published>2020-02-29T13:20:00.001+05:30</published><updated>2020-02-29T13:21:17.901+05:30</updated><title type='text'>Why 2020 is a turning point for Cyber Security | Redback Cyber Security Council - RISC </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The world is more connected than ever. We are becoming more technologically advanced, markets are stronger, and central technologies that encompass our daily actions are constantly emerging.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-ZsEepXrlkTyo8vS7Oxn0sVbAwXPwB6VWFhlisEc0ykNjyAkhQU7_OL1DCn9QbCb2d7ueQLQaPLZwU49A-rZnfX0CFBJcp5AOW3qoHBHueYVYDNMBZPypP6li8G0J9cK6xWh7mEG-9AyO/s1600/CyberSecurity_LearningPath.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1035&quot; data-original-width=&quot;800&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-ZsEepXrlkTyo8vS7Oxn0sVbAwXPwB6VWFhlisEc0ykNjyAkhQU7_OL1DCn9QbCb2d7ueQLQaPLZwU49A-rZnfX0CFBJcp5AOW3qoHBHueYVYDNMBZPypP6li8G0J9cK6xWh7mEG-9AyO/s640/CyberSecurity_LearningPath.jpg&quot; width=&quot;494&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
These technological advances are based on seamless connectivity. As our digital transformation continues, we continue to build a more cohesive and connected society. Our data is now shared and used by more platforms than ever – in the datacentre, on the cloud and event on internet of things (IoT) devices, for example - and this trend will only increase. But this huge benefit comes with a cost. The more connected we become, the more vulnerable our data is.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
By looking at security developments over the past couple of years, it is possible to forecast what is likely to happen in the cyber landscape over the next 12 months. Forewarned is forearmed. These are what I believe will be the main trends of cybersecurity in 2020:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;1) The ‘cyber cold war’ intensifies&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
A new cyber &#39;cold war&#39; is taking place online as Western and Eastern powers increasingly separate their technologies and intelligence. The ongoing trade feud between the US and China, and the decoupling of these two huge economies, is a clear sign. Cyberattacks will increasingly be used as proxy conflicts between smaller countries, funded and enabled by larger nations looking to consolidate and extend their respective spheres of influence.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;2) The rise of artificial intelligence (AI)&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The US elections in 2016 saw the beginning of AI-based propagation of fake news. Political campaigns devoted resources to creating special teams that orchestrated and spread false stories to undermine their opponents. As we prepare for major elections worldwide in 2020, we can expect to see these activities in full effect once again.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
As AI continues to be used as a proxy for crime, it will also be used to accelerate security responses. Most security solutions are based on detection engines built on human-made logic, but keeping this up-to-date against the latest threats and across new technologies and devices is impossible to do manually. AI dramatically accelerates the identification of new threats and responses to them, helping to block attacks before they can spread widely. However, cybercriminals are also starting to take advantage of the same techniques to help them probe networks, find vulnerabilities and develop more evasive malware.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;3) Our means of communication will become more weaponized&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The notion that connectivity creates new combat landscapes is proven by the developing spheres of today’s and tomorrow’s cyberattacks. In the first half of 2019 we saw a 50% increase in mobile banking malware compared with last year, which means that our payment data, credentials and funds are handed over to cyberattackers in the innocent click of a button on our mobile devices. The attempts of cybercriminals to trick consumers to hand out their personal data through their most common means of communications will intensify and will range from email to SMS texting attacks, social media posts and gaming platforms. Whatever we use most frequently can become a more popular attack surface.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;4) 5G development and adoption of IoT devices increase vulnerability&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
As 5G networks roll out, the use of connected IoT devices will accelerate dramatically, massively increasing networks’ vulnerability to large scale, multi-vector 5th generation cyberattacks. IoT devices and their connections to networks and clouds are still a weak link in security. This ever-growing volume of personal data will need securing against breaches and theft. We need a more holistic approach to IoT security, combining traditional and new controls to protect these ever-growing networks across all industry and business sectors.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;5) Enterprises will rethink their cloud approach&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Detection is no longer enough to ensure protection, and prevention is now the key to being secure.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Organizations already run a majority of their workloads in the cloud, but the level of understanding about security in the cloud remains low; in fact it is often an afterthought in cloud deployments. Security solutions need to evolve to new, flexible, cloud-based architectures that deliver scalable protection at speed.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Understanding what is coming towards us will help us to better prepare. Some paradigms will need to shift. The enormous spread of technologies and solutions will force all of us to think about how to consolidate. In 2020 more than ever, cyber-attacks are no longer a question of if, but of how and when. This is a concern that applies to us all.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/4112966555309279574/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2020/02/these-will-be-main-cybersecurity-trends.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4112966555309279574'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4112966555309279574'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2020/02/these-will-be-main-cybersecurity-trends.html' title='Why 2020 is a turning point for Cyber Security | Redback Cyber Security Council - RISC '/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-ZsEepXrlkTyo8vS7Oxn0sVbAwXPwB6VWFhlisEc0ykNjyAkhQU7_OL1DCn9QbCb2d7ueQLQaPLZwU49A-rZnfX0CFBJcp5AOW3qoHBHueYVYDNMBZPypP6li8G0J9cK6xWh7mEG-9AyO/s72-c/CyberSecurity_LearningPath.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-6568192727221261312</id><published>2020-02-28T17:25:00.000+05:30</published><updated>2020-02-28T17:25:27.713+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Whatsapp"/><title type='text'>Private WhatsApp Groups Exposed On Google Search, But It’s A Feature [Update] </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: PT Sans;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Don&#39;t share WhatsApp Group invite links on public platforms.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiATRuzmWgMPK9jAoUeVwEHocZwMbizJcp2OWwmP9MuBgoYQ1wjRL8Hxur8VgNindjZPHyTIyu3BImrW3jgU5dwv8mkOQ8q5plofK8dAvLQ3OT8YgfMEZ9F9xxNiBDj0p9jRPTmp27TZ_Zw/s1600/1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;367&quot; data-original-width=&quot;640&quot; height=&quot;366&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiATRuzmWgMPK9jAoUeVwEHocZwMbizJcp2OWwmP9MuBgoYQ1wjRL8Hxur8VgNindjZPHyTIyu3BImrW3jgU5dwv8mkOQ8q5plofK8dAvLQ3OT8YgfMEZ9F9xxNiBDj0p9jRPTmp27TZ_Zw/s640/1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: PT Sans;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: PT Sans;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Update (24/02/2020, 7:00 PM IST): Initially, it seemed that WhatsApp didn’t give users even a single ray of hope after their private chats ended up on Google Search and on other search engines as well.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5vEJg8OJgBBBbRGj6LuGl-LEIq3Wdfd-1biUOw1U0NLQmTm6JZlPzVZHWJe-bGpShXlM8tJreIixHKHNMpeZm961iL28TZyZKd9FxkHLi_BNU8o2qbxk0Vy1P57Pp1tAhdFs8jzc0xiha/s1600/2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;421&quot; data-original-width=&quot;457&quot; height=&quot;588&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5vEJg8OJgBBBbRGj6LuGl-LEIq3Wdfd-1biUOw1U0NLQmTm6JZlPzVZHWJe-bGpShXlM8tJreIixHKHNMpeZm961iL28TZyZKd9FxkHLi_BNU8o2qbxk0Vy1P57Pp1tAhdFs8jzc0xiha/s640/2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
But according to an update posted by Jane Wong, the company was working quietly behind the curtain. Now, making a search for the said private chat invite links on Google brings nothing but an error message. Whatsapp has delisted the invitation links from Google by including the “noindex” meta tag.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
The original post continues from here.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
Google is indexing the invitations to the WhatsApp Group chats, including the links to join private groups as reported by Vice. As a result, the links are available for people all around the globe to join any discoverable group.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguOEVqgYOsbER7swkDBfWwfn2lJAniNTz5nhyphenhyphen9HBjpPW4T7it9VQ67JGdXKoHmiR5SpBdn1_rbCz3vGSfmfbdF9aes_BX8M4KHvMhoh4eAFXd1UI5qw88LNkfNzTdiScxmtBkO9_WudoEg/s1600/3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;295&quot; data-original-width=&quot;679&quot; height=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguOEVqgYOsbER7swkDBfWwfn2lJAniNTz5nhyphenhyphen9HBjpPW4T7it9VQ67JGdXKoHmiR5SpBdn1_rbCz3vGSfmfbdF9aes_BX8M4KHvMhoh4eAFXd1UI5qw88LNkfNzTdiScxmtBkO9_WudoEg/s640/3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
Multimedia journalist Jordan Wildon tweeted and raised a question over WhatsApp’s security. He said that WhatsApp’s ‘Invite to Group via Link’ feature permits Google to index groups, which then become available all over the internet for everyone to join.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
Vice discovered several private groups with the help of specific search queries. The result page consisted of a lot of groups meant for porn sharing. Once anyone joins the group, they have permission to view all the participants and their phone numbers.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
Popular reverse engineering enthusiast Jane Manchun Wong said in her tweet that a misconfiguration from WhatsApp is allowing Google to index group invite links. She suggested that there are ways to deindex the invite links from Search.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJMCv8enDLDN8Z2KVfZ5gMn1eZhNm_rs-iWrSqnN_9q1fTMJvQHZULioSDoMnRXjSy3V_RtGu7OnNk2Cfg8hLj_aYu83R9n4SEPBi0mpDVued-9WygPs32CcWAADU6nxvKAgc36K7Kq3Px/s1600/4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;295&quot; data-original-width=&quot;679&quot; height=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJMCv8enDLDN8Z2KVfZ5gMn1eZhNm_rs-iWrSqnN_9q1fTMJvQHZULioSDoMnRXjSy3V_RtGu7OnNk2Cfg8hLj_aYu83R9n4SEPBi0mpDVued-9WygPs32CcWAADU6nxvKAgc36K7Kq3Px/s640/4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
A WhatsApp spokesperson said that group admins can invite any user to join their group by sharing the invite link. Like all other content available on the open web, invite links posted on public platforms are also searchable. He concluded his statement by saying that admins should make sure that they share the group link with trusted people only.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;b&gt;Google’s Take&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
Google refused to comment on the scenario going on. However, Google official Danny Sullivan tweeted that search engines like Google index pages from the open web. The same thing happened in the case of invite links to WhatsApp groups.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
He concluded by saying that WhatsApp as a website has allowed listing the invite links publically. Sullivan also added a link in his tweet, which redirected people to the Help Center to block content to be displayed from the Google search results.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
So, it seems that things are designed this way, even if they pose a threat to users’ privacy. Users are advised not to share personal WhatsApp group links on public platforms until WhatsApp announces any under-the-hood changes.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/6568192727221261312/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2020/02/private-whatsapp-groups-exposed-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/6568192727221261312'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/6568192727221261312'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2020/02/private-whatsapp-groups-exposed-on.html' title='Private WhatsApp Groups Exposed On Google Search, But It’s A Feature [Update] '/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiATRuzmWgMPK9jAoUeVwEHocZwMbizJcp2OWwmP9MuBgoYQ1wjRL8Hxur8VgNindjZPHyTIyu3BImrW3jgU5dwv8mkOQ8q5plofK8dAvLQ3OT8YgfMEZ9F9xxNiBDj0p9jRPTmp27TZ_Zw/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-2951215782528638468</id><published>2018-04-23T15:43:00.002+05:30</published><updated>2018-04-23T15:44:20.577+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><title type='text'>10 Tips for Mitigating Cyber Risk in the Manufacturing Industry</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This is in terms of financing, labor, industry regulation and numerous other factors. However, the growing reliance on information technology including machine learning, robotics, the Internet of Things and big data, has made cybersecurity one of the industry’s biggest risk factors.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbTgknpm8KvwxUaetE19TCDErtE0ZqMzbBBsKGzUn_0UEW2KIafUsezkdtZ5Z_o3ad5dvh7PMH4viMXfdEBN0n4oG_ln30n2TRCEOApUukycW6TS_1gIvdOWq25svLxXC80E8gHPEfKCMp/s1600/cyber+secu.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;349&quot; data-original-width=&quot;620&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbTgknpm8KvwxUaetE19TCDErtE0ZqMzbBBsKGzUn_0UEW2KIafUsezkdtZ5Z_o3ad5dvh7PMH4viMXfdEBN0n4oG_ln30n2TRCEOApUukycW6TS_1gIvdOWq25svLxXC80E8gHPEfKCMp/s640/cyber+secu.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The motivation for cyberattacks on manufacturers are varied. They range from financial fraud to industrial espionage (an example of espionage would be the theft of detailed product or equipment plans to be fed to a pressure die casting machine).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The following tips can help manufacturers reduce the likelihood of a successful attack.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;1. Start at the Top&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Like any other company initiative, successful cybersecurity is dependent on management buy-in. If the people at the top of the organization do not set the right tone in word and deed, it becomes harder to motivate staff lower down the hierarchy to do the right thing.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Cybersecurity cannot be left to the CIO or the technology department alone. In fact, communication on cyber matters should occasionally come from the CEO’s office. That will get employees to see the seriousness of the issue and align their behavior accordingly.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;2. Perform a Broad Risk Assessment&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Conduct an exhaustive cyber risk assessment that covers the industrial control systems, ERP systems and any standalone systems. The assessment should be done at least once every six months in order to capture vulnerabilities that have been introduced by changes to the operating environment.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The risk assessment should not only cover traditional cyber risks like password management and firewall configuration but should delve into more manufacturing-related risks such as IP protection.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;3. Circulate Cyber Risk Reports&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;A cyber risk assessment report is of no use if it all it does is gather dust on an office shelf. Instead, enterprise risk reports including remedial action roadmaps should be shared with the board and executive leadership.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;There should be a high level discussion of the key sticking points with a view to demonstrating impact and identifying areas of priority in resource allocation. Decisions can then be made that take cognizance of the manufacturer’s risk posture and risk tolerance goals.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;4. Built-in Security&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;All new manufacturing equipment, software and connected products must be evaluated for compliance and coherence with the company’s cyber risk program. Since the acquisition and deployment of major equipment and software will usually be done by a special project team, always confirm that there’s the requisite cyber security talent in this team.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;This will ensure security considerations are a decisive factor in the acquisition from the get go.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;5. Recognize Data as an Asset&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The importance of cyber security can be harder to sell to the management of manufacturing companies than to leaders of service-oriented industries such as banking. Manufacturers are used to dealing with a tangible product built by tangible equipment and may thus not readily see data as a critical business asset.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Yet, treating data as an indispensable asset is at the heart of any successful enterprise-wide cyber security campaign. Making sure management and staff see the business value of data and why it needs to be protected will inform the adoption of best practice on where the data is stored, how it is accessed and who can access or modify it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;6. Assess Third-Party Risk&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;The success of a manufacturing operation is dependent on the reliable partners including suppliers and service providers. In order to do business seamlessly, such third parties will sometimes need access to enterprise systems or facilities. This introduces a potential loophole for a data leak.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Manufacturers must perform thorough background checks on the third parties they work with and clearly define the rules of engagement including outlining what is off limits. Third parties should be given physical access only to the areas of the facility that they need to do their work.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;7. Vigilant Monitoring&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Good organizational policies, procedures and action plans are only as good as their implementation. Create checklists, reporting procedures and escalation mechanisms that ensure existing and emerging cyber threats are caught before they spiral out of control.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Regular scheduled monitoring creates an avenue for identifying loopholes that had fallen through the cracks and amend policies and procedures to mitigate against these risks.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;8. Recovery Planning&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Some of the companies that have suffered massive cyberattacks were doing the right thing and checking all the right cyber risk boxes at the time. A robust cyber security plan is no guarantee that an attack will not occur or that systems will not fail.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;A detailed recovery plan is required that includes what actions to take in the event that a cyberattack is suspected to have taken place. Manufacturers can increase their resiliency through war-gaming or table top simulations that envisage the worst case scenario.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;9. Clarify Responsibilities&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Many organization problems can be attributed to the absence of a specific person assuming full responsibility for a process. It should be clear who is tasked with each component of the cyber risk program including at department level.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Ideally, there should be a cybersecurity champion within each department who’ll ask all the important questions whenever a new project or product is planned.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;b&gt;10. Drive Awareness&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;Most cybersecurity breaches are less to do with technology failures and more to do with deliberate or accidental human actions. Employees must be regularly sensitized on what their individual responsibilities are in mitigating non-technical cyber risks such as social engineering, phishing and identity theft.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;They should also be provided with a clear reporting path whenever they notice suspicious or unusual activity.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;&quot;&gt;These tips can help manufacturers deeply embed cyber risk management, identify areas of improvement and chart a road map towards a more vigilant, secure and resilient work environment.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/2951215782528638468/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2018/04/10-tips-for-mitigating-cyber-risk-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/2951215782528638468'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/2951215782528638468'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2018/04/10-tips-for-mitigating-cyber-risk-in.html' title='10 Tips for Mitigating Cyber Risk in the Manufacturing Industry'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbTgknpm8KvwxUaetE19TCDErtE0ZqMzbBBsKGzUn_0UEW2KIafUsezkdtZ5Z_o3ad5dvh7PMH4viMXfdEBN0n4oG_ln30n2TRCEOApUukycW6TS_1gIvdOWq25svLxXC80E8gHPEfKCMp/s72-c/cyber+secu.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-7404843287317484621</id><published>2018-01-12T21:35:00.000+05:30</published><updated>2018-01-12T21:39:30.806+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability Management"/><category scheme="http://www.blogger.com/atom/ns#" term="Whatsapp"/><title type='text'>Are Your WhatsApp Encrypted Group Chats Exposed To Strangers?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;A team of security researchers from the Ruhr University of Bochum, Germany has revealed a series of vulnerabilities in the popular instant messaging app WhatsApp.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5apNCWPupEFf_9xgwr05KqJq6KyhKEENlzxiTBB0DcPb649XdtJSDOFDIwaRsykdyiLt5_FBtwTvRv3RfFNTTYDwSEJfZ15EbIFZBplWLLYU9M1mEdOuomPHYhbXpNGGNoAtaUGrpe4mZ/s1600/whatsapp.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;344&quot; data-original-width=&quot;630&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5apNCWPupEFf_9xgwr05KqJq6KyhKEENlzxiTBB0DcPb649XdtJSDOFDIwaRsykdyiLt5_FBtwTvRv3RfFNTTYDwSEJfZ15EbIFZBplWLLYU9M1mEdOuomPHYhbXpNGGNoAtaUGrpe4mZ/s640/whatsapp.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;According to a Wired report, the flaws allow a person with the control of WhatsApp’s servers to add anyone to a WhatsApp group without admin permission.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Once added to a group, the respective encryption keys of all the group members get shared automatically with the new user. So, a newly added eavesdropper can easily read all the new end-to-end encrypted messages exchanged between the members. But not the older messages and the ones for which the stranger doesn’t have the end-to-end encryption key.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The report was quick to ring the bell at the house of WhatsApp’s daddy Facebook. Its chief security officer Alex Stamos made multiple tweets as a response to Wired’s report.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;“Read the Wired article today about WhatsApp – scary headline! But there is no a secret way into WhatsApp groups chats. The article makes a few key points.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;“Everyone in the group would see a message that a new member had joined,” he argued. But should that be considered as a safety measure, relying on the alertness of the members to make sure some eavesdropper has not entered their WhatsApp group?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;“WhatsApp is built so group messages cannot be send to hidden users and provides multiple ways for users to confirm who receives a message prior to it being sent.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Stamos said that WhatsApp has seen the researchers’ findings. But preventing a possible attack would require to let go of a popular feature called “group invite links” which allows anyone with a link to join a WhatsApp group. “There may be a way to provide this functionality with more protections, but it’s not clear cut.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Even if such an attack could be performed, how many people would have access to WhatsApp’s servers except their employees and governments wanting to conduct surveillance? An experienced hacker would first have to compromise the servers before adding an eavesdropper to the group.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;According to Maxie Marlinspike, who developed the Signal protocol, it’s not possible to suppress the alerts sent when someone joins the group, contrary to the researchers’ claim. It turns out, it’s not possible for someone to snoop into group chats and hacking the servers is not that easy.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Commenting on the report, Mike said that the article is a better example of the problems associated with security industry and how research is done today. “I think the lesson to anyone watching is clear: don’t build security into your products, because that makes you a target for researchers, even if you make the right decisions,” he wrote.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/7404843287317484621/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2018/01/are-your-whatsapp-encrypted-group-chats.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/7404843287317484621'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/7404843287317484621'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2018/01/are-your-whatsapp-encrypted-group-chats.html' title='Are Your WhatsApp Encrypted Group Chats Exposed To Strangers?'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5apNCWPupEFf_9xgwr05KqJq6KyhKEENlzxiTBB0DcPb649XdtJSDOFDIwaRsykdyiLt5_FBtwTvRv3RfFNTTYDwSEJfZ15EbIFZBplWLLYU9M1mEdOuomPHYhbXpNGGNoAtaUGrpe4mZ/s72-c/whatsapp.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-5819339979793255033</id><published>2017-08-08T21:25:00.004+05:30</published><updated>2017-08-08T21:26:38.545+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Application Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Server Hacking"/><title type='text'>“There Is Basically No Dark Web. It’s Only A Few Webpages” — Tor Co-founder</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Talking at the DEF CON convention in Las Vegas, the Tor Project co-founder Roger Dingledine said that the dark web doesn’t exist and it’s just a few web pages. He added that media has wrongly labeled it as a heaven for illegal activities. Also, only 3% of Tor users connect to a hidden .onion website.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRtCGljUSSJFyfnvvEkXQb4oDBDDTGuW9olU2Q6JU-yUvci7ktmG_Ik23TnvWt8BsV4jCa5XvU_hfe46xDpD1qf_pGipDGHAVhp4Fp3mzBQAaCdL6_sNp-3EP2dkhLP7Hf2AEzkH0_GkP5/s1600/dark+web.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;360&quot; data-original-width=&quot;640&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRtCGljUSSJFyfnvvEkXQb4oDBDDTGuW9olU2Q6JU-yUvci7ktmG_Ik23TnvWt8BsV4jCa5XvU_hfe46xDpD1qf_pGipDGHAVhp4Fp3mzBQAaCdL6_sNp-3EP2dkhLP7Hf2AEzkH0_GkP5/s640/dark+web.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;You might have come across numerous articles outlining the massive size of dark web and how it’s used by criminals to perform illegal activities and trade. However, who’d know the dark web in a better manner than a Tor co-founder?&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;At the DEF CON convention in Las Vegas, on Friday, Roger Dingledine, one of the three Tor Project founders, said that there are tons of misconceptions about the same. According to The Register, Dingledine bashed the journalists for giving a bad name to the Tor network by calling it a heaven for pedophiles and terrorists.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;“There is basically no dark web. It doesn’t exist. It’s only a very few webpages,” he told.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;If you’re interested in numbers, only 3% of Tor users connect to a hidden .onion website, said Dingledine. This means that majority of users are using it for simply analyzing their activities on the indexed web. They are, most probably, using it for stopping the website owners from tracking them.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;According to his data, surprisingly, Facebook is the most popular website visited by Tor users. Today, more than a million people visit Facebook using Tor browser, thanks to the network’s hidden service launched in 2014.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Dingledine also made attempts to calm down those who feared that different intelligence agencies have already cracked Tor and compromised the integrity. “Intelligence agencies didn’t need to set up their own stepping-stone nodes he said, since they could – if they wanted to – just monitor those who did run them,” as reported by The Register.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/5819339979793255033/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2017/08/there-is-basically-no-dark-web-its-only.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/5819339979793255033'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/5819339979793255033'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2017/08/there-is-basically-no-dark-web-its-only.html' title='“There Is Basically No Dark Web. It’s Only A Few Webpages” — Tor Co-founder'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRtCGljUSSJFyfnvvEkXQb4oDBDDTGuW9olU2Q6JU-yUvci7ktmG_Ik23TnvWt8BsV4jCa5XvU_hfe46xDpD1qf_pGipDGHAVhp4Fp3mzBQAaCdL6_sNp-3EP2dkhLP7Hf2AEzkH0_GkP5/s72-c/dark+web.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-3331098261515453792</id><published>2017-07-27T20:48:00.001+05:30</published><updated>2017-07-27T20:49:22.935+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><title type='text'>7 Worst Cyberattacks in Recent History</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;Malware and hacking tactics are becoming more advanced, and users need to be prepared against attack&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;It’s one thing to click the wrong link and accidentally download some annoying adware on your personal 7 Worst Cyberattacks in Recent Historydevice. It’s another thing to watch as hospitals, train stations, nuclear power plants, and private businesses fall victim to a devastating cyber attack that obliterates their networks and decimates their data.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnqVhl9shu1g1tFB44dOVTMNIz1URjbxy0C5Nq1OAKXMgfIbp0NqTvsyz38ayNfzBYG7E5E6frKNwg_ySM-EpYMYeXkO4UED4DpU7RhYaNcMVOh-WxaMpHHFCCPqyRku0iUkBVkcjRavd2/s1600/cyber+attacks.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;405&quot; data-original-width=&quot;720&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnqVhl9shu1g1tFB44dOVTMNIz1URjbxy0C5Nq1OAKXMgfIbp0NqTvsyz38ayNfzBYG7E5E6frKNwg_ySM-EpYMYeXkO4UED4DpU7RhYaNcMVOh-WxaMpHHFCCPqyRku0iUkBVkcjRavd2/s640/cyber+attacks.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;While viruses and worms of the ‘90s and early ‘00s might be memorable, the malware of the past few years have been unbelievably destructive. Because the internet is everywhere these days, hackers are finding it easier than ever to spread malicious software and gain access to highly sensitive information. If you need more proof that recent cyber attacks are some of the worst in history, the following devastating attacks should be evidence enough.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;WannaCry&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;While a spate of similar malware programs has spread in its wake, WannaCry is certainly the most talked-about attack this year. Using a vulnerability developed by none-other than the U.S. National Security Agency, WannaCry was able to infiltrate computer networks running outdated operating systems, taking them and their data hostage. As a result, more than 230,000 machines in more than 150 countries fell victim to the attack, including dozens of hospitals and care centers in the U.K., a train system in Germany, and a telecommunications provider in Spain. Fortunately, most home users can stay safe from WannaCry by updating their software whenever there is an update and by installing strong internet security software.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;Shamoon or Disttrack&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;A computer virus that targeted devices linked to the energy sector, Shamoon was developed in 2012 by a hacker group known as “Cutting Swords of Justice.” The group’s goal was to destabilize Saudi Amarco Company, an energy giant in the Middle East – and it was somewhat successful. More than 30,000 workstations were impacted by the virus, which prevented machines from connecting to the web and communicating with each other. Also affected were Qatari RasGas Company and LNG Company, though it’s unknown whether they were additional targets of the attack.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;Operation Olympic Games or Stuxnet&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;At the end of President Bush’s administration, the U.S. government attempted to disrupt and sabotage Iranian nuclear facilities with a concentrated cyberattack. Working in conjunction with Israel, the U.S. developed a worm, named Stuxnet, that could take command of devices and use them to control machinery connected to them. Stuxnet was ruthless in its attack, incapacitating over 1,000 centrifuges in just one Iranian nuclear plant; it is a powerful digital weapon, and security experts believe it is being traded around black hat hacker circles – which means the most physically damaging cyber attack is likely on the horizon.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;Operation Shady RAT&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;Operation Shady RATAs you read, a cyber attack is being waged. In 2008, a cybersecurity professional uncovered a series of similar attacks, which he dubbed Operation Shady RAT, launched against government institutions and private agencies in 14 different countries. Though investigations have yet to determine the source of the extensive attack, many analysts believe the operation is sponsored by the Chinese government.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;Titan Rain&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;In the early 2000s, American computer systems experienced an onslaught of epic proportions. Contractors working with the Department of Defense, to include dozens of private businesses like Lockheed Martin and Redstone Arsenal, lost an inordinate amount of sensitive information to attackers, who most security professionals believe were working for China. The attacks continued for three full years before cybersecurity received enough funding to build proper digital defenses. The British Ministry of Defense endured similar attacks, though on a smaller scale.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;OpIsrael&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;Beginning on Holocaust Remembrance Day in 2013, a series of cyber attacks coordinated by anti-Israeli groups and individuals began taking down Israeli websites. The hacks ranged from annoying defacements to disruptive database hijacking and devastating leaks. Unfortunately, the attack debilitated schools, newspapers, small businesses, nonprofit groups, and banks – many of which were not Israeli in origin, effectively working counter to the attackers’ main goal of showing discontent with Israel.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;b&gt;July 2009 Cyberattacks&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;-webkit-text-stroke-width: 0px; color: black; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: medium; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: justify; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;Though they still lack a flashy name, these attacks propagated against South Korea and the U.S. affected more than 100,000 computers. It seems that attackers targeted governmental websites, including the South Korean National Assembly, the White House, and the Pentagon, as well as a handful of media outlets. To this day, the source and intention of the attacks are unknown, though many experts believe the North Korean telecommunications ministry is to blame..&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/3331098261515453792/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2017/07/7-worst-cyberattacks-in-recent-history.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/3331098261515453792'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/3331098261515453792'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2017/07/7-worst-cyberattacks-in-recent-history.html' title='7 Worst Cyberattacks in Recent History'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnqVhl9shu1g1tFB44dOVTMNIz1URjbxy0C5Nq1OAKXMgfIbp0NqTvsyz38ayNfzBYG7E5E6frKNwg_ySM-EpYMYeXkO4UED4DpU7RhYaNcMVOh-WxaMpHHFCCPqyRku0iUkBVkcjRavd2/s72-c/cyber+attacks.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-6220650169674425944</id><published>2017-07-11T23:41:00.001+05:30</published><updated>2017-07-11T23:44:13.067+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Application Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Browser Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Forensics"/><title type='text'>What is Tabnapping? Protection &amp; Prevention Techniques</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The word ‘Tab Napping’ comes from the combination of ‘tab’ and ‘kidnapping’ used by clever phishers, scammers, and hackers. Tabnapping is an interesting, tricky, clever, and smart hacking technique for phishing and scamming.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNxVJUreTceMpZfT1O02BIg24vcmcq6_4XfE8J-ML7dqiGcKWu7NhJUXL-NPDQ-MtwPAgt4kkdHmV2olsOYS1Zi2xzk8bM-XtUhlO5DJDMJqk26I7D03KQyAZiAl1zBKu6hIDnCK6T6Es4/s1600/tab.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;567&quot; data-original-width=&quot;973&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNxVJUreTceMpZfT1O02BIg24vcmcq6_4XfE8J-ML7dqiGcKWu7NhJUXL-NPDQ-MtwPAgt4kkdHmV2olsOYS1Zi2xzk8bM-XtUhlO5DJDMJqk26I7D03KQyAZiAl1zBKu6hIDnCK6T6Es4/s640/tab.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Through this, attackers take advantage and control a victim’s unattended browser tabs by hijacking and redirecting him to malicious URLs where they can perform a phishing attack and execute scripts and data URIS.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;For example:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;You are already logged in to your Facebook account and suddenly you see an interesting post with a web link. After clicking on the link, a new tab opens. Now, you are visiting an interesting post link on the new tab and unknowingly your previous tab will change to a fake Facebook login page. When you go back to the previous tab to log in to Facebook, your login information will be sent to the attacker and your successful login to Facebook because you never logged out.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Protect Yourself From Tab Napping:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Always check the URL in the address bar and ensure that it is using secure protocol HTTPS&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Most web developers use target=”_blank” only to open links in new tab. If you use target=”_blank” only to open links in a new tab, then it is vulnerable to an attacker. When you open a link in a new tab ( target=”_blank” ), the page that opens in a new tab can access the initial tab and change its location using the window.opener property.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;javascript code:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;window.opener.location.replace(malicious URL)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Prevention:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;rel=”nofollow noopener noreferrer”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;i&gt;&quot;Cyber world is hitting by Tabnapping. Many sites like Google and Facebook is affected by Tabnapping. Many of us is unaware about this hacking technique, so hackers are targeting us, using this attack &quot;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Important Note:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;It is just for educational purpose only.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/6220650169674425944/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2017/07/what-is-tabnapping-protection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/6220650169674425944'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/6220650169674425944'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2017/07/what-is-tabnapping-protection.html' title='What is Tabnapping? Protection &amp; Prevention Techniques'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNxVJUreTceMpZfT1O02BIg24vcmcq6_4XfE8J-ML7dqiGcKWu7NhJUXL-NPDQ-MtwPAgt4kkdHmV2olsOYS1Zi2xzk8bM-XtUhlO5DJDMJqk26I7D03KQyAZiAl1zBKu6hIDnCK6T6Es4/s72-c/tab.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-115375286761976677</id><published>2017-01-06T16:25:00.000+05:30</published><updated>2017-01-06T17:07:27.333+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><title type='text'>How to Know if a Cyber Security Engineering Degree is Right for You </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;To get a job in the cyber security field, or more specifically in cyber security engineering, you’re going to need education, likely a cyber security engineering degree, and experience paired with the right skill set.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;This isn’t a field you can just jump into without the right qualifications and skills. So what exactly do you need to get accepted into a master’s program and then consequently work in the field? And how do you know if a career in cyber security engineering is right for you? Read on to find out!&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Your Education and Experience&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;In order to gain the qualifications necessary to land a job as a cyber security engineer, many obtain a master’s degree in the field. A master’s degree is beneficial to those looking to enter or advance in the field of cyber security because it offers a truly specialized approach. But to get accepted into a master’s program it is essential to have a background that has prepared you adequately. That means that you should have an undergraduate degree in engineering or computer science and/or currently work in one of these areas.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipj2ZTSGEUlp85CSaY6jJF3gCyTuEyK8MN4HcmLIEXf0qqIqCcY1kmm1tBEwvXeeZT0G9bPx4y0kgclGJxeTmdRVjRU0dTkLbrvshHoIW8TCsJm5Wj5jcRjN9PkPsMc0seiJZE9NmESEmu/s1600/cyber+sec.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipj2ZTSGEUlp85CSaY6jJF3gCyTuEyK8MN4HcmLIEXf0qqIqCcY1kmm1tBEwvXeeZT0G9bPx4y0kgclGJxeTmdRVjRU0dTkLbrvshHoIW8TCsJm5Wj5jcRjN9PkPsMc0seiJZE9NmESEmu/s640/cyber+sec.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;It is important for cyber security engineers to have a technical background (including areas such as configuration and testing) and a deep breadth of knowledge around the different concepts and tools used to fight cyber crime. In order to design and innovate new security solutions as well as troubleshoot current systems, this knowledge and understanding is essential.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Your Strengths and Skills&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Engineers design, invent and innovate. In order to be successful in the field these are passions you must possess. As Fred Kerby instructor at the SANS Institute and formerly an information assurance manager at the Naval Surface Warfare Center said in an article by The Business of Federal Technology, “You have to have a passion for what you’re doing. You have to have that natural sense of curiosity about how things work. It’s not something you can just get a certificate for and check that box on your resume.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Most successful cyber security engineers share the following traits and skills:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;A natural curiosity about the way things work&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;A desire to break things down, getting to the nuts and bolts of something&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Mathematical and science minded&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Detail oriented&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Methodical&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Collaborative&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Ability to handle stress and fluid situations&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Willingness to work on-call 24hrs/day&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Does this sound like you? If so, cyber security engineering may be a great career path for you. And your timing couldn’t be any better to enter the field, as cyber security workers are now commanding a 9% salary premium over other IT workers and cyber security job postings have grown 91% from 2010-2014, according to Burning Glass Technologies.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;How to Choose a Program&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;There are a few different paths available to you if you feel that cyber security engineering is a good fit and you meet the above criteria in experience, education and skill strengths. Depending on your specific goals combined with your background and financial situation you can decide which option is best for you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Most of the time, the best choice for those who know they want to work in the field of cyber security engineering is to obtain a Master’s Degree in Cyber Security Engineering. An advanced degree in this field is highly sought and frequently required. By getting a degree in cyber security engineering you are gaining a holistic and focused education in a specialized field, which is looked upon very favorably by employers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;If you are comparing master’s programs be sure to evaluate the strength of the curriculum, the organization of the program, the faculty make-up and how well the program format lends itself to working professionals. Beware of computer science master degree programs with a specialization in cyber security. Unless you want a broad computer science degree, this option typically only gives you a few classes in cyber security and is not nearly as focused as a degree in cyber security engineering.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;If you aren’t yet ready for a master’s degree there are a plethora of certifications you can rack up while you determine if a degree program is right for you. Certifications can really enhance your resume and are a great way to keep current and hone your skills.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;There is currently a huge shortage of talent in the cyber security field, which has created an enormous opportunity for those looking to enter or advance their careers in this discipline.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;At USD we offer a Master of Science in Cyber Security Engineering that focuses on the engineering aspects of software and hardware security and can be completed in as little as 20 months. To learn more about our nationally accredited program visit the program page.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/115375286761976677/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2017/01/how-to-know-if-cyber-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/115375286761976677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/115375286761976677'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2017/01/how-to-know-if-cyber-security.html' title='How to Know if a Cyber Security Engineering Degree is Right for You '/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipj2ZTSGEUlp85CSaY6jJF3gCyTuEyK8MN4HcmLIEXf0qqIqCcY1kmm1tBEwvXeeZT0G9bPx4y0kgclGJxeTmdRVjRU0dTkLbrvshHoIW8TCsJm5Wj5jcRjN9PkPsMc0seiJZE9NmESEmu/s72-c/cyber+sec.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-243785121341651385</id><published>2016-09-15T15:13:00.003+05:30</published><updated>2017-07-14T12:03:03.167+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Browser Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy Policies"/><title type='text'>Stratgies to Stay Safe from Cyber Attacks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;background: rgb(255, 255, 255); border: 0px; color: #464241; font-family: &amp;quot;Open Sans&amp;quot;; font-size: 16px; line-height: 24px; margin-bottom: 5px; outline: 0px; padding: 5px 0px; vertical-align: baseline;&quot;&gt;
Cyber security is vital&amp;nbsp;for businesses, especially small and medium sized ones. Why? Because&amp;nbsp;they often don’t have the cyber security infrastructure or&amp;nbsp;staff that large companies have&amp;nbsp;to ensure that files and bank accounts aren’t left susceptible to being&amp;nbsp;compromised.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsDIRCFwCOTqUtXPiSPtFKGAJqE8oQybyCq_iKDXdYIoYMwykyNwx4SP12T2r8IxCjK_pESDw1HNYErgKsKwPJPyY8Q80MFJOoH8qP7tfURtO05w5W8rTEbapL17EUz3uClsH0kVSaSlx/s1600/cyber+sec.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsDIRCFwCOTqUtXPiSPtFKGAJqE8oQybyCq_iKDXdYIoYMwykyNwx4SP12T2r8IxCjK_pESDw1HNYErgKsKwPJPyY8Q80MFJOoH8qP7tfURtO05w5W8rTEbapL17EUz3uClsH0kVSaSlx/s640/cyber+sec.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background: rgb(255, 255, 255); border: 0px; color: #464241; font-family: &amp;quot;Open Sans&amp;quot;; font-size: 16px; line-height: 24px; margin-bottom: 5px; outline: 0px; padding: 5px 0px; vertical-align: baseline;&quot;&gt;
At first, for anyone, cyber security can feel very complex – and it is! But to make is easier, here are three proven strategies that companies of all sizes can implement to make sure they are keeping themselves safe from cyber-attacks.&lt;/div&gt;
&lt;div style=&quot;background: rgb(255, 255, 255); border: 0px; color: #464241; font-family: &amp;quot;Open Sans&amp;quot;; font-size: 16px; line-height: 24px; margin-bottom: 5px; outline: 0px; padding: 5px 0px; vertical-align: baseline;&quot;&gt;
Use these tips to educate yourself and others on what is necessary to stay safe and, for some businesses, compliant with regulation, with sensitive information.&lt;/div&gt;
&lt;ol style=&quot;background: rgb(255, 255, 255); border: 0px; color: #464241; font-family: &amp;quot;Open Sans&amp;quot;; font-size: 16px; line-height: 24px; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Use a&lt;strong style=&quot;background: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&amp;nbsp;layered defensive security&lt;/strong&gt;&amp;nbsp;approach.&lt;ul style=&quot;background: transparent; border: 0px; list-style: disc; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Using software or other solutions at different points in and around a given network.&lt;/li&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Layered defenses are important because they can often (depending on the amount of layers) prevent a breach from happening at all.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Train employees&lt;/strong&gt;&amp;nbsp;(not just lower level employees, but employers and management as well).&lt;ul style=&quot;background: transparent; border: 0px; list-style: disc; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Employees are most often the weakest link in any business’ security.&lt;/li&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;This is the easiest way for attackers to bypass many or all of the technical procedures put in place.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Monitor and maintain&lt;/strong&gt;&amp;nbsp;network security all the time (24/7).&lt;ul style=&quot;background: transparent; border: 0px; list-style: disc; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;background: transparent; border: 0px; margin: 0px 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Trouble never sleeps, and there is always someone in the world who will want to attack your company or personal information.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/243785121341651385/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/09/stratgies-to-stay-safe-from-cyber.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/243785121341651385'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/243785121341651385'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/09/stratgies-to-stay-safe-from-cyber.html' title='Stratgies to Stay Safe from Cyber Attacks'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsDIRCFwCOTqUtXPiSPtFKGAJqE8oQybyCq_iKDXdYIoYMwykyNwx4SP12T2r8IxCjK_pESDw1HNYErgKsKwPJPyY8Q80MFJOoH8qP7tfURtO05w5W8rTEbapL17EUz3uClsH0kVSaSlx/s72-c/cyber+sec.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-1498994534402845416</id><published>2016-07-19T15:30:00.000+05:30</published><updated>2016-07-19T15:33:36.671+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="MAC OS"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware Analysis"/><title type='text'>New Malware Allows Full Access to Mac Systems</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Recently the internet security software company Bitdefender found that Apple computer systems, Mac OS X, faces a new threat that allows attackers to take full control of the system imperceptibly and collect all the sensitive information from the infected computers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjykhQekbuDl2EbVxUH4aLOb03yYBxB6p46lD-xVfhH8ufFGQ5ABheVvn-nQHNnkUeBVCi8uJd4q16PmIwmRAhNz-z9yseDEgmc1uR18-wKVYJw6MxGW2nzuV8wvhua9LAMU6BNCooSaUr9/s1600/new+malware.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjykhQekbuDl2EbVxUH4aLOb03yYBxB6p46lD-xVfhH8ufFGQ5ABheVvn-nQHNnkUeBVCi8uJd4q16PmIwmRAhNz-z9yseDEgmc1uR18-wKVYJw6MxGW2nzuV8wvhua9LAMU6BNCooSaUr9/s640/new+malware.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;New Malware Allows Full Access to Mac Systems&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Recently Bitdefender found a new malware that installs backdoors into the Mac operating system which grants attackers full access to Mac Systems. The malware has been called “Backdoor.MAC.Elanor” and has been discovered by researchers at Bitdefender security.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;As we have already mentioned that we are dedicated to installing backdoors in the operating system so that the attackers may have full access, including user data or can take control of the webcam, execute arbitrary code and much more.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9_zg2DwX0p1N908RPkH2Idu_CDBTZGB_JlG9aejAH_ArauRLPvQvQy9dIEQLyA_3mhKbeHzaHgHz_9WEIOPTlsqBALlQWujxssLTYvPfArtIS0dEBi_OxV4yqEnDlIW_387v8vaBCL7B0/s1600/new+mal.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;416&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9_zg2DwX0p1N908RPkH2Idu_CDBTZGB_JlG9aejAH_ArauRLPvQvQy9dIEQLyA_3mhKbeHzaHgHz_9WEIOPTlsqBALlQWujxssLTYvPfArtIS0dEBi_OxV4yqEnDlIW_387v8vaBCL7B0/s640/new+mal.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;As a means of distribution used a false file conversion application known as EasyDoc Converter.app, which can be found in places widely used by Mac users when seeking applications to install, according to the Bitdefender security.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Initially, the researchers found it difficult to accurately determine the means by which infection occurs. Most likely, the backdoor is distributed via spam messages, but it can also get on the system through applications downloaded from untrusted sources. As explained by the experts, one of the loader components distributed via ZIP-file.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;As the ZIP-file contains the executable file in the Mach-O format, which disguised as a text or JPEG-file. However, at the end of the expansion, there is a space, when you double click on the “ZIP-file” the file opens it in the Terminal, and not in TextEdit or Preview as regular files. Since the Finder file manager identifies the icon of the executable file as a JPEG or TXT, the user is unlikely to suspect that something was wrong and are likely to open it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The backdoor, packed with a modified version of the UPX, seeking persistence on the system, setting PLIST-file in the “/Library/LaunchAgents/(if available superuser) or $ USER” and “/Library/ LaunchAgents/ (without root access)”. The Icloudsyncd executable file is stored in the “Library/Application Support/com.apple.iCloud.sync.daemon directory”.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;However, the Mac have an increased security step known as &lt;b&gt;“Gatekeeper”&lt;/b&gt;, which is located in the System Preferences under Security &amp;amp; Privacy. By default, it prevents running any unsigned applications from the unidentified sources or developers. So, if you download an unsigned application from any unidentified source then the Mac App Store will try to run it, but, ultimately you will get a message that “stating the application cannot be opened”. Hence, the Gatekeeper would have blocked the malware, if it is enabled.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/1498994534402845416/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/07/new-malware-allows-full-access-to-mac.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1498994534402845416'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1498994534402845416'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/07/new-malware-allows-full-access-to-mac.html' title='New Malware Allows Full Access to Mac Systems'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjykhQekbuDl2EbVxUH4aLOb03yYBxB6p46lD-xVfhH8ufFGQ5ABheVvn-nQHNnkUeBVCi8uJd4q16PmIwmRAhNz-z9yseDEgmc1uR18-wKVYJw6MxGW2nzuV8wvhua9LAMU6BNCooSaUr9/s72-c/new+malware.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-2670860289114222487</id><published>2016-06-16T17:53:00.000+05:30</published><updated>2016-06-16T17:53:53.584+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Active Defense"/><category scheme="http://www.blogger.com/atom/ns#" term="Application Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Security"/><title type='text'>Hackers Show How To Hack Anyone’s Facebook Account Just By Knowing Phone Number</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;By exploiting the SS7 flaw, a hacker can hack someone’s Facebook account just by knowing the associated phone number. This flaw allows a hacker to divert the OTP code to his/her own phone and use it to access the victim’s Facebook account. The security researchers, who have explained the hack in a video, advise the users to avoid adding their phone numbers to the public services.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglrs_9WslJYDMi8_4440tuThQ8sOo3mRol4IkezyX3lkejkPSDr0Uqkxsh9LMFbp9vhyphenhyphen1nkHNFo4sz6RVmWG6rooA_DrWOoEK0rNPOkYqtQYbAbSxq-atcN9LemVhDjcN87s6DXM53y3XH/s1600/fb+hacking+phone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Facebook hacking is also one of the most commonly searched terms on the internet. However, very often people become a victim of malware while searching for Facebook hacking tools.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;As we continue to deploy new safety measures to secure our online accounts, hackers and security researchers continue to find new ways to control Facebook accounts.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Recently, we told you how an Indian security researcher spotted a bug in the Facebook website and got $15,000 bug bounty.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Today, we are going to tell you how hackers can hack any Facebook account just by knowing the associated phone number and exploiting an issue with SS7 network.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;For those who don’t know, SS7 network (Signalling System Number 7) is a communication protocol that’s used worldwide by the cellphone carriers.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Using a flaw in SS7, hackers can divert the text messages and calls to their own devices. This hacking technique has been shared as a proof-of-concept video by the security researchers from Positive Technologies.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;How To &amp;nbsp;Facebook Account By Knowing Phone Number (Video):&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;This flaw affects all Facebook users who have associated a phone number with their Facebook accounts.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtodmbpLgkEOaASNeuRQ9Ly2FA2w9MNV2cAKRG2WUJrVJJo40CFDHPBrtwLIxTahL5sjyIeR8YijIOsA86IA7ZZeLmBXE-VvVOfxAJUGyuJNLJkGHzq08hThZQeX68KWd7xgg5GP3cOFxl/s1600/fb+hacking+phone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;356&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtodmbpLgkEOaASNeuRQ9Ly2FA2w9MNV2cAKRG2WUJrVJJo40CFDHPBrtwLIxTahL5sjyIeR8YijIOsA86IA7ZZeLmBXE-VvVOfxAJUGyuJNLJkGHzq08hThZQeX68KWd7xgg5GP3cOFxl/s640/fb+hacking+phone.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=wc72mmsR6bM&quot;&gt;https://www.youtube.com/watch?v=wc72mmsR6bM&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;In the demonstration video, the security researchers show that as the first step of the hack, the attacker needs to click on the “Forgot account?” button on Facebook.com website’s homepage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When Facebook prompts the hacker to enter an email address or phone number, he/she should enter the correct number associated with the account.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;By exploiting the SS7 flaw, the hacker is able to divert the OTP message from Facebook to his/her own computer and use it to login to the victim’s Facebook.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The researchers list some measures that a user can take to secure his/her Facebook account. They advise people to avoid adding their phone numbers to public services and rely on email for recovery purposes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The users are also advised to use 2-factor authentication methods that don’t use SMS texts for sending OTP.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/2670860289114222487/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/06/hackers-show-how-to-hack-anyones.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/2670860289114222487'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/2670860289114222487'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/06/hackers-show-how-to-hack-anyones.html' title='Hackers Show How To Hack Anyone’s Facebook Account Just By Knowing Phone Number'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtodmbpLgkEOaASNeuRQ9Ly2FA2w9MNV2cAKRG2WUJrVJJo40CFDHPBrtwLIxTahL5sjyIeR8YijIOsA86IA7ZZeLmBXE-VvVOfxAJUGyuJNLJkGHzq08hThZQeX68KWd7xgg5GP3cOFxl/s72-c/fb+hacking+phone.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-1733829341354246385</id><published>2016-05-23T09:44:00.001+05:30</published><updated>2016-05-23T09:44:37.642+05:30</updated><title type='text'>Ethical Hacking Course in Vellore</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;header class=&quot;entry-header&quot; style=&quot;background-color: white; box-sizing: border-box; color: #444444; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 15px; line-height: 27px;&quot;&gt;&lt;h1 class=&quot;entry-title&quot; style=&quot;border: 0px; box-sizing: border-box; clear: both; color: #666666; font-family: Lato, sans-serif; font-size: 30px; font-style: inherit; font-weight: 300; line-height: 1.2; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Ethical Hacking Course in Vellore | Kanchipuram | Gudiyatham&lt;/h1&gt;
&lt;/header&gt;&lt;div class=&quot;entry-content&quot; style=&quot;background-color: white; border: 0px; box-sizing: border-box; color: #444444; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 15px; line-height: 27px; margin: 15px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;a href=&quot;http://ethicalhackingcourse.in/wp-content/uploads/2015/05/ethical-hacking-course-in-chennai.png&quot; style=&quot;border-bottom-style: none !important; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; box-sizing: border-box; color: #01aefd; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease-in-out; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;hacking course in Chennai&quot; class=&quot; size-medium wp-image-94 alignleft&quot; height=&quot;215&quot; sizes=&quot;(max-width: 300px) 100vw, 300px&quot; src=&quot;http://ethicalhackingcourse.in/wp-content/uploads/2015/05/ethical-hacking-course-in-chennai-300x215.png&quot; srcset=&quot;http://ethicalhackingcourse.in/wp-content/uploads/2015/05/ethical-hacking-course-in-chennai-300x215.png 300w, http://ethicalhackingcourse.in/wp-content/uploads/2015/05/ethical-hacking-course-in-chennai.png 469w&quot; style=&quot;border: 0px; box-sizing: border-box; display: inline; float: left; height: auto; margin-right: 15px; max-width: 100%;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Ethical Hacking! An action performed by a hacker to malfunction a system or an entire network with an intention to interrupt or crash the framework bypassing all the security issues such as a strong password set by the owner of the Network. Whereas a company look into this technique in a different way i.e; the companies uses these strategies in order to increase their security in a hacker point of view. This is what you will be learning at our&amp;nbsp;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ethical hacking course in Vellore.&amp;nbsp;&lt;/strong&gt;The training offered here will make you face the obstacles that are posted in the real time hacking industries.&lt;/div&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
According to an old saying “Be a roman, when you are in roman”, to become an ethical hacker you should turn in to one. The demand for ethical hacker is increasing worldwide, though it is the highest paid job in India as well as abroad. Unhappily there are less number of ethical hackers are available to fill out the opened positions in leading companies in the world. Our&amp;nbsp;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;ethical hacking course&lt;/strong&gt;&amp;nbsp;would act as a gateway for you to enter in to a reputed concern. For this all you have to do is to join&amp;nbsp;&lt;a href=&quot;http://www.redbackacademy.com/&quot; style=&quot;border-bottom-style: none !important; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; box-sizing: border-box; color: #01aefd; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease-in-out; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Redback Academy&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;and pursue your ethical hacking training.&lt;/div&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Our procedure lies in training our students in all the perspective that a professional hacker would thick. Since our trainers are present employees of foremost hacking companies, they would give you real time training on how to hack tiny network. Through which you will be gaining the knowledge of how to face an actual work environment. This includes, understanding the tools required for hacking and pace of environment where all the action will be held. These are our talent that we are implementing in teaching&amp;nbsp;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;hacking course in Vellore&lt;/strong&gt;&amp;nbsp;for a long time.&lt;/div&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Our teaching would be completely a practical one, with minimal number of theory classes. Students are allowed to take advantage of our Lab facility at the time we are opened. We do provide an International certification to our students on successful completion of the training and that would be from&amp;nbsp;&lt;a href=&quot;http://www.eccouncil.org/&quot; style=&quot;border-bottom-style: none !important; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; box-sizing: border-box; color: #01aefd; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease-in-out; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;EC council&lt;/strong&gt;&lt;/a&gt;. You can contact us at any time for a free demo class to get an in depth knowledge about the course that you are about to learn. We are ready to help you with all our effort to make you a ethical hacker as soon as possible. Don’t just wait anymore, call us now to enroll for the course.&lt;/div&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ethical Hacking Course Syllabus:&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; list-style: none !important; margin: 0px !important; outline: 0px; padding: 0px !important; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Introduction to Ethical Hacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Footprinting and Reconnaissance&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Scanning Networks&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Enumeration&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;System Hacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Trojans and Backdoors&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Viruses and Worms&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Sniffers&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Social Engineering&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Denial of Service&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Session Hijacking&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Hacking Webservers&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Hacking Web Applications&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;SQL Injection&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Hacking Wireless Networks&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Hacking Mobile Platforms&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Evading IDS, Firewalls, and Honeypots&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Buffer Overflow&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Cryptography&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Penetration Testing&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Why Ethical Hacking Course in Vellore at Redbakacademy?&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; list-style: none !important; margin: 0px !important; outline: 0px; padding: 0px !important; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;We provide innovative and practical teaching methods in attempt to make learning more interactive.&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;We are open 7 days a week. You can enjoy the flexibility of weekday and weekend schedules based on your convenience.&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;At the end of the course, each student will be assigned with mini project. In addition, we also give the opportunity of working in real time projects based on their ability.&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Our training institute is facilitated with high-end infrastructure and lab facility.&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;Intensive training through certified by ethical hackers working in leading MNCs&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;In depth subject coverage and excellent training&lt;/li&gt;
&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px !important; outline: 0px; padding: 0px !important; vertical-align: baseline;&quot;&gt;We also offer 100% placement assistance to our students to make impressive presence in reputed web design industries.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
Looking for best Ethical Hacking Training Course in Chennai? Enroll in FITA. Get Trained by&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Certified_Ethical_Hacker&quot; style=&quot;border-bottom-style: none !important; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; box-sizing: border-box; color: #01aefd; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease-in-out; vertical-align: baseline;&quot;&gt;Certified Ethical Hacker&lt;/a&gt;&amp;nbsp;and become one!&lt;/div&gt;
&lt;div style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 20px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Related search terms:&lt;/strong&gt;&amp;nbsp;Ethical hacking course in Vellore, kanchipuram, Chittor, Gudiyatham, Chennai, Ethical hacking course,&amp;nbsp;Hacking course in Vellore, kanchipuram, Chittor, Gudiyatham,&amp;nbsp;&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai, Ethical hacker course in&amp;nbsp;&lt;/span&gt;Vellore, kanchipuram, Chittor, Gudiyatham,&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai, Ethical hacking training in Chennai, Ethical hacker training in Chennai, Ethical hacking course in&amp;nbsp;&lt;/span&gt;Vellore, kanchipuram, Chittor, Gudiyatham,&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai, Best ethical hacking institute in&amp;nbsp;&lt;/span&gt;Vellore,kanchipuram, Chittor, Gudiyatham,&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai, Ethical hacking training center in&amp;nbsp;&lt;/span&gt;Vellore, kanchipuram,Chittor, Gudiyatham,&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai, Ethical hacking training institutes in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Vellore,kanchipuram,Chittor,Gudiyatham,&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai, Ethical Hacking Course in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Vellore,kanchipuram,Chittor,Gudiyatham,&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-style: inherit; font-weight: inherit;&quot;&gt;Chennai,&amp;nbsp;Ethical Hacking Course in Chennai,&amp;nbsp;Ethical Hacking Course in vellore.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/1733829341354246385/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/05/ethical-hacking-course-in-vellore.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1733829341354246385'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1733829341354246385'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/05/ethical-hacking-course-in-vellore.html' title='Ethical Hacking Course in Vellore'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-8870418413654449967</id><published>2016-05-11T19:22:00.002+05:30</published><updated>2016-05-11T19:22:39.114+05:30</updated><title type='text'>Learn Hacking</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqw9goOZ1F0BiS6bIpp7AOe7k3zs76iqGfY4oSyO3a2WJuuoyGM9VGk9UlG8nRuMauLQL76X6getgB7h0nGbnTonmN_8j-y_F-AQ2v92rieSwEVR9hThZUDxkaJTDhyphenhyphen19MNjFlYzLHLZnS/s1600/Ethical-Hacking-training.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;420&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqw9goOZ1F0BiS6bIpp7AOe7k3zs76iqGfY4oSyO3a2WJuuoyGM9VGk9UlG8nRuMauLQL76X6getgB7h0nGbnTonmN_8j-y_F-AQ2v92rieSwEVR9hThZUDxkaJTDhyphenhyphen19MNjFlYzLHLZnS/s640/Ethical-Hacking-training.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt; line-height: 107%;&quot;&gt;www.redbackacademy.com |
www.redbackcouncil.org&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/8870418413654449967/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/05/learn-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/8870418413654449967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/8870418413654449967'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/05/learn-hacking.html' title='Learn Hacking'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqw9goOZ1F0BiS6bIpp7AOe7k3zs76iqGfY4oSyO3a2WJuuoyGM9VGk9UlG8nRuMauLQL76X6getgB7h0nGbnTonmN_8j-y_F-AQ2v92rieSwEVR9hThZUDxkaJTDhyphenhyphen19MNjFlYzLHLZnS/s72-c/Ethical-Hacking-training.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-496360062058359170</id><published>2016-05-05T12:30:00.003+05:30</published><updated>2016-05-05T13:22:43.458+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Application Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><category scheme="http://www.blogger.com/atom/ns#" term="Web Server Hacking"/><title type='text'>IRCTC website hacked, information of lakhs feared stolen.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The website of the Indian Railways Catering and Tourism Corporation (IRCTC) was hacked and the personal information of around 1 crore users is feared to be leaked, said reports on Thursday. The official website of the Indian Railways, IRCTC is the biggest travel e commerce website in India and lakhs of transactions are conducted by the site everyday. With the reported leak, safety and security questions about the customers’ personal information like PAN card numbers and other details have arisen.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The hacking occurred late on Tuesday night and the site has now been brought under control. But the fears of personal information of thousands of customers being misused still remain. A high-level meeting took place in Delhi regarding the hacking. Senior IRCTC officials discussed what measures could be taken to ascertain how far the hackers had gone. Speaking to Mumbai Mirror, &amp;nbsp;AK Manocha, Managing Director of IRCTC revealed that so far, there has been no complaint from any customer, but Delhi police’s cyber cell has been informed.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;330&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjKvM39gxYbIRGxdJD9eTH8Cs_81YKz-Gumh9fXZX7JlejmpVO9IWJxnKRcvhWNIOXjcOrD2SPpgOi5DVCEtefwTIx6wonP-hU6aHnUxQqaViF8wsJhfzDQu2iqbYKhNk4UxSwKpf-TAOr/s640/Screenshot+2016-05-05+12.26.42.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Customers have to fill in important information for online reservations and when stolen, the same can be used by miscreants to create forged documents. ”The data is a valuable asset and can be sold to corporations who may use it for targeting potential consumers,” an IRCTC source was quoted as saying by TOI. Personal data of the users like email ids and mobile numbers which are also filled in, while making online bookings, can be used by telemarketers for promoting their respective products or services and spamming the customers with unwanted messages.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;However, sources said that it was unlikely that bank details or credit card details are leaked since the website, since the payment gateway takes the customer out of the website during the online payment. Once the user is directed to the bank site, there are less chances of information getting leaked as these have better security. The hacking occurred even after the Railways reportedly spent Rs. 100 crores last year, for the upgrading of the website.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Source:&amp;nbsp;&lt;a href=&quot;http://timesofindia.indiatimes.com/tech/tech-news/IRCTC-website-hacked-information-of-lakhs-feared-stolen/articleshow/52116516.cms?&quot;&gt;http://timesofindia.indiatimes.com/tech/tech-news/IRCTC-website-hacked-information-of-lakhs-feared-stolen/articleshow/52116516.cms?&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;a href=&quot;http://indianexpress.com/article/india/india-news-india/irctc-hack-data-theft-2785213/&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;http://indianexpress.com/article/india/india-news-india/irctc-hack-data-theft-2785213/&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;a href=&quot;http://www.hindustantimes.com/tech/irctc-website-hacked-data-of-1-crore-customers-stolen/story-9CXRiwPMkPgcDZVpNZd6aP.html&quot;&gt;http://www.hindustantimes.com/tech/irctc-website-hacked-data-of-1-crore-customers-stolen/story-9CXRiwPMkPgcDZVpNZd6aP.html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;a href=&quot;http://www.india.com/news/india/irctc-website-hacked-personal-information-pan-card-mobile-numbers-1-crore-customers-feared-leaked-1160460/&quot;&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;http://www.india.com/news/india/irctc-website-hacked-personal-information-pan-card-mobile-numbers-1-crore-customers-feared-leaked-1160460/&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/496360062058359170/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/05/irctc-website-hacked-information-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/496360062058359170'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/496360062058359170'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/05/irctc-website-hacked-information-of.html' title='IRCTC website hacked, information of lakhs feared stolen.'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjKvM39gxYbIRGxdJD9eTH8Cs_81YKz-Gumh9fXZX7JlejmpVO9IWJxnKRcvhWNIOXjcOrD2SPpgOi5DVCEtefwTIx6wonP-hU6aHnUxQqaViF8wsJhfzDQu2iqbYKhNk4UxSwKpf-TAOr/s72-c/Screenshot+2016-05-05+12.26.42.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-8291537706367156539</id><published>2016-04-26T13:14:00.000+05:30</published><updated>2016-04-26T13:16:40.407+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Certification and License"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>How to Become an Ethical Hacker</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: 1pt none windowtext; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt; padding: 0in;&quot;&gt;Cyber-security&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;&amp;nbsp;is
one of the major concerns of online users these days and hackers are an
inevitable part of this discussion. Every part of our cyber world is influenced
by hackers and they exploit the vulnerabilities of systems to gain unauthorized
access. While numerous people are confused between the terms hackers and
cyber-criminals, many of you are willing to know more about hackers and how to
become one.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgph3kfLdFMtWEzE7Wyn_5BKNYKACCe_eXy3Vdgy_P89jGVnOCxffzxOZ1eOuEWgbMw8CpAyI4p_46J4cyj2lF5quy0wOExoHsB2-jswCNYO461pOy7rgreM9w9RxYAiLj6Xx-Jfq_3_WBr/s1600/How-to-become-a-hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgph3kfLdFMtWEzE7Wyn_5BKNYKACCe_eXy3Vdgy_P89jGVnOCxffzxOZ1eOuEWgbMw8CpAyI4p_46J4cyj2lF5quy0wOExoHsB2-jswCNYO461pOy7rgreM9w9RxYAiLj6Xx-Jfq_3_WBr/s640/How-to-become-a-hacker.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Have you ever considered hacking as a career?
There are few things that should be considered to figure out if hacking is the
right job for you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;As I’ve discussed in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;border: 1pt none windowtext; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt; padding: 0in;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;my earlier article&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;, there is great confusion among people when it comes to things
like cyber criminals, hackers, ethical hacking, black hat hacking, white hat
hacking and more. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 10.5pt; mso-line-height-alt: 15.6pt; mso-outline-level: 2; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 25.5pt; letter-spacing: -.55pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Who is an ethical
hacker?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: 12.0pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Ethical hacker performs hacking to help an individual or company
and identifies the potential risks. An ethical hacker is a good guy and
sometimes the term is used synonymously White Hats. They work to improve the
overall internet security and search for weak points that could be exploited by
the black hats – the bad guys.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: 12.0pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Take a look at these points and you will understand what
constitutes ethical hacking! These are “guidelines” that an ethical hacker must
follow!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 46.5pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;1.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Respect an individual’s
or company’s privacy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 46.5pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;2.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Having a permission
(expressed – often written) to break into a network and look for the loopholes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 46.5pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;3.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;After finding the
vulnerabilities, you tell your employer about the unknown flaws.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 46.5pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;4.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;After finishing the
work, you must not anything open for later exploitation by you or someone else.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 46.5pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;5.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Do not take any kind of
advantage of the permission and access granted to you.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 13.5pt;&quot;&gt;Now, take a look ,&amp;nbsp;It’s a very well
represented career path. For choosing this career as an ethical hacker, you can
start by becoming an Information Security analyst or by becoming a computer
programmer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;Learn more about this
career path in the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: 18px; line-height: 28.8px;&quot;&gt;info-graphic&lt;/span&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;&amp;nbsp;given below:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg300vudgiEB8-1LyGw0JuxtCZALzQbngTDYcqYqjgRyzDVhJpM8y2WsOk7u3u9ZwSLBsGvdmhD5Z122XHZ5-EOv8P3Cq4fSpPwotm2_ykqo4U-wmA4uN408G9ntJCHCD9ZdWSrKHdhURfP/s1600/hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg300vudgiEB8-1LyGw0JuxtCZALzQbngTDYcqYqjgRyzDVhJpM8y2WsOk7u3u9ZwSLBsGvdmhD5Z122XHZ5-EOv8P3Cq4fSpPwotm2_ykqo4U-wmA4uN408G9ntJCHCD9ZdWSrKHdhURfP/s1600/hacker.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;To Build a best Career as Security Professional :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;Contact :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;Redback IT Academy&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;#AL 24, TNHB , PHASE III,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;Sathuvacheri,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;Near Vallalar Water Tank ,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 13.5pt; line-height: 21.6pt;&quot;&gt;Vellore.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Call us @ : 8189985551&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/8291537706367156539/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/04/how-to-become-ethical-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/8291537706367156539'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/8291537706367156539'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/04/how-to-become-ethical-hacker.html' title='How to Become an Ethical Hacker'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgph3kfLdFMtWEzE7Wyn_5BKNYKACCe_eXy3Vdgy_P89jGVnOCxffzxOZ1eOuEWgbMw8CpAyI4p_46J4cyj2lF5quy0wOExoHsB2-jswCNYO461pOy7rgreM9w9RxYAiLj6Xx-Jfq_3_WBr/s72-c/How-to-become-a-hacker.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-7974227578195206599</id><published>2016-04-23T12:02:00.002+05:30</published><updated>2016-05-05T12:31:27.931+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>The 7 Most Wanted Iranian Hackers By the FBI</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The Federal Bureau of Investigation (FBI) has lengthened its&amp;nbsp;&lt;span style=&quot;border: none windowtext 1.0pt; color: windowtext; mso-border-alt: none windowtext 0in; padding: 0in; text-decoration: none; text-underline: none;&quot;&gt;Most Wanted List&lt;/span&gt;&amp;nbsp;by adding seven Iranian hackers who are
accused of attacking a range of US banks and a New York dam.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizU4ciMlvhyphenhyphenNvOVtn4XURY2QCjnQ2ZonALuVHwOvs3ApL9dgZC-pUwFuTUVRcD9llfFXZGVl7QmJyH8TpBxwSnOtjBA5pU7mVaPUjqU4XAJbDxFtVIw2ZxXjMRqdlQiSWzuWrYpMtetH4H/s1600/most+wanted.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;334&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizU4ciMlvhyphenhyphenNvOVtn4XURY2QCjnQ2ZonALuVHwOvs3ApL9dgZC-pUwFuTUVRcD9llfFXZGVl7QmJyH8TpBxwSnOtjBA5pU7mVaPUjqU4XAJbDxFtVIw2ZxXjMRqdlQiSWzuWrYpMtetH4H/s640/most+wanted.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The United States Department of Justice (DoJ) charged&amp;nbsp;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; mso-border-alt: none windowtext 0in; padding: 0in;&quot;&gt;seven Iranian hackers&lt;/span&gt;&lt;/b&gt;&amp;nbsp;with a slew of computer
hacking offences for breaking into computer systems of dozens of US banks,
causing Millions of dollars in damages, and tried to shut down a New York dam.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The individual hackers, who allegedly worked for computer
security companies linked to the Iranian government, were indicted for an
&quot;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; mso-border-alt: none windowtext 0in; padding: 0in;&quot;&gt;extensive campaign&lt;/span&gt;&lt;/b&gt;&quot; of cyber-attacks against the
US financial sector.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;All the seven hackers have been&amp;nbsp;&lt;span style=&quot;border: none windowtext 1.0pt; color: windowtext; mso-border-alt: none windowtext 0in; padding: 0in; text-decoration: none; text-underline: none;&quot;&gt;added&lt;/span&gt;&amp;nbsp;to the&amp;nbsp;&lt;span style=&quot;border: none windowtext 1.0pt; color: windowtext; mso-border-alt: none windowtext 0in; padding: 0in; text-decoration: none; text-underline: none;&quot;&gt;FBI&#39;s Most Wanted&lt;/span&gt;&amp;nbsp;list, and their names are:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;1.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Ahmad Fathi&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;, 37&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;2.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Hamid Firoozi&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;, 34&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;3.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Amin Shokohi&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;, 25&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;4.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Sadegh Ahmadzadegan&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;(aka Nitr0jen26), 23&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;5.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Omid Ghaffarinia&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;(aka PLuS), 25&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;6.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Sina Keissar&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;, 25&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 26.25pt; margin-right: 15.0pt; margin-top: 0in; mso-list: l0 level1 lfo1; tab-stops: list .5in; text-align: justify; text-indent: -.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Open Sans&amp;quot;;&quot;&gt;7.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Nader Saedi&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;(aka Turk Server), 26&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;All the hackers have been charged with conducting numerous
Distributed Denial-of-Service (DDoS) attacks on major U.S. banks, with Firoozi
separately gaining unauthorized access to a New York dam&#39;s industrial
automation control (SCADA) system in August and September of 2013.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: #FDFDFD; line-height: 21.0pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&quot;This
unauthorized access allowed [Firoozi] to repeatedly obtain information
regarding the status and operation of the dam, including information about the
water levels, temperature, and status of the sluice gate, which is responsible
for controlling water levels and flow rates,&quot; a DoJ&amp;nbsp;statement reads.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Luckily, the sluice gate had already been manually
disconnected for the purpose of maintenance at the time Firoozi attacked.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The hackers&#39; work allegedly involved&amp;nbsp;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; mso-border-alt: none windowtext 0in; padding: 0in;&quot;&gt;Botnets&amp;nbsp;&lt;/span&gt;&lt;/b&gt;– networks of compromised machines – that
hit major American banks, including Bank of America and J.P. Morgan Chase, as
well as the Nasdaq stock exchange with floods of traffics measuring&amp;nbsp;&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; mso-border-alt: none windowtext 0in; padding: 0in;&quot;&gt;up to 140Gbps&lt;/span&gt;&lt;/b&gt;&amp;nbsp;and knocked them offline.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The Iranian hackers targeted more than 46 financial
institutions and financial sector companies, costing them &quot;&lt;i&gt;&lt;span style=&quot;border: none windowtext 1.0pt; mso-border-alt: none windowtext 0in; padding: 0in;&quot;&gt;tens of Millions of dollars in remediation costs&lt;/span&gt;&lt;/i&gt;&quot;
in preventing the attacks in various incidents spanning 2011 to 2013.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: .0001pt; margin-bottom: 0in; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.0pt; margin-bottom: 7.5pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;All
the seven hackers will face up to 10 years in prison on computer hacking
charges while Firoozi faces an additional 5-year prison sentence for breaking
into a dam in Bowman Avenue Dam in Rye Brook, New York.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://redbackacademy.blogspot.in/&quot;&gt;&amp;nbsp;To know more ..&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/7974227578195206599/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/04/the-7-most-wanted-iranian-hackers-by-fbi.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/7974227578195206599'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/7974227578195206599'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/04/the-7-most-wanted-iranian-hackers-by-fbi.html' title='The 7 Most Wanted Iranian Hackers By the FBI'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizU4ciMlvhyphenhyphenNvOVtn4XURY2QCjnQ2ZonALuVHwOvs3ApL9dgZC-pUwFuTUVRcD9llfFXZGVl7QmJyH8TpBxwSnOtjBA5pU7mVaPUjqU4XAJbDxFtVIw2ZxXjMRqdlQiSWzuWrYpMtetH4H/s72-c/most+wanted.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-277600464751121851</id><published>2016-04-06T13:18:00.000+05:30</published><updated>2016-04-06T13:18:52.686+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Security"/><title type='text'>WhatsApp’s end-to-end encryption: How to enable and what it means.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;WhatsApp is now end-to-end encrypted at all times. This will ensure that a user’s messages, videos, photos sent over WhatsApp, can’t be read by anyone else; not WhatsApp, not cyber-criminals, not law-enforcement agencies. Even calls and group chats will be encrypted.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfwPrJglrZYdCbMGGQ65PwvnuJ74x0D5kgWa3fk-HyriFa-VByXb1jjeazPe2z7Clsg56qtQyAl_I2F4Tyenbv-PyBOYajKDflWX3h54zyg1iOvppuUka8Si3oQ3z1R1sEO-kytucmT34O/s1600/whatsapp.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;354&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfwPrJglrZYdCbMGGQ65PwvnuJ74x0D5kgWa3fk-HyriFa-VByXb1jjeazPe2z7Clsg56qtQyAl_I2F4Tyenbv-PyBOYajKDflWX3h54zyg1iOvppuUka8Si3oQ3z1R1sEO-kytucmT34O/s640/whatsapp.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;WhatsApp co-founder Jan Koum announced the update on his Facebook page, stating that the company has been working on the feature for the last two years.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;Koum&lt;/b&gt; wrote, &lt;i&gt;“We’ve been working for the past two years to give people better security over their conversations on WhatsApp… People deserve security. It makes it possible for us to connect with our loved ones. It gives us the confidence to speak our minds. It allows us to communicate sensitive information with colleagues, friends, and others. We’re glad to do our part in keeping people’s information out of the hands of hackers and cyber-criminals&lt;/i&gt;.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;So what is end-to-end encryption and how exactly does it work in WhatsApp?&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;WhatsApp is using “The Signal Protocol”, designed by Open Whisper Systems, for its encryption.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;In its White Paper, explaining the technical details of the end-to-end encryption, WhatsApp says that “once the session is established, clients do not need to rebuild a new session with each other until the existing session state is lost through an external event such as an app reinstall or device change.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The post explains how messages are encrypted as well. It reads, “clients exchange messages that are protected with a &lt;b&gt;Message Key using AES256 in CBC&lt;/b&gt; mode for encryption and &lt;b&gt;HMAC-SHA256 for authentication&lt;/b&gt;. The Message Key changes for each message transmitted, and is ephemeral, such that the Message Key used to encrypt a message cannot be reconstructed from the session.” It also says that calls, large file attachments are end-to-end encrypted as well.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Note the ever-changing message key can mean a delay in some messages getting delivered, according to the paper. It should be noted that feature is enabled by default in WhatsApp, which means that if you and your friends are on the latest version of the app, all chats will be end-to-end encrypted. Unlike say Telegram where users have to start a secret chat to enable the feature, WhatsApp has the feature on at all times. Users don’t have the option of switching off end-to-end encryption.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheLDaiopU3fkZhHbR1RxPq-z1if5ARrxtT3SkJg4ZvYiv8e8M5gUEUtSdFYmWW6Qg6bccbd7XNgcorMW2Ea8GrUC8ufznAUMwWLSU9WzEW4w98l7vMZwZ-rwUq_W5skilq-GSkGGefuiAB/s1600/encry.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheLDaiopU3fkZhHbR1RxPq-z1if5ARrxtT3SkJg4ZvYiv8e8M5gUEUtSdFYmWW6Qg6bccbd7XNgcorMW2Ea8GrUC8ufznAUMwWLSU9WzEW4w98l7vMZwZ-rwUq_W5skilq-GSkGGefuiAB/s400/encry.jpeg&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Users need to be on the same versions of WhatsApp to ensure that their chats get end-to-end encrypted. If you’ve recently updated the app, and you start a chat with someone else (also on the new version) you are likely to see a message saying, “Messages you send to this chat and calls are now secured with end-to-end encryption.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Once you tap on the message, WhatsApp has a pop-up menu explaining what end-to-end encryption means. Users can verify if the encryption is working as well. If a user taps on verify, they will taken to a page with a QR code, followed by a string of 60 numbers. If your friend is nearby, take their phone scan the code from your phone (the option is there at the bottom of the same page) and if the QR code matches, then the chat is encrypted. When the codes match, a green tick appears; when it doesn’t there’s an exclamation mark in red alerting a user that the chat is not secure. So does the end-to-end encryption work all the time? &amp;nbsp; We tried verifying some chats that had the message saying encryption was enabled. In some cases, the verification failed for us. In the first case, we tried to verify a chat between an Android and iPhone 6s device (running iOS 9.3.1), and the QR codes didn’t match. We also tried matching QR codes on an two Android phones, and once again we got the red alert indicating no end-to-end encryption&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Android phones are on the latest version of the app from the Google Play Store. However a verification between a chat on two iOS devices, (iPhone 6s, iPhone 5s) worked for us and showed the green tick. We’re not sure why the verification failed, even though the chat says it is end-to-end encrypted. We might have to wait for another app update that could fix this issue.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/277600464751121851/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/04/whatsapps-end-to-end-encryption-how-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/277600464751121851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/277600464751121851'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/04/whatsapps-end-to-end-encryption-how-to.html' title='WhatsApp’s end-to-end encryption: How to enable and what it means.'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfwPrJglrZYdCbMGGQ65PwvnuJ74x0D5kgWa3fk-HyriFa-VByXb1jjeazPe2z7Clsg56qtQyAl_I2F4Tyenbv-PyBOYajKDflWX3h54zyg1iOvppuUka8Si3oQ3z1R1sEO-kytucmT34O/s72-c/whatsapp.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-4917921802387985795</id><published>2016-03-14T09:09:00.001+05:30</published><updated>2016-03-14T09:09:31.633+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Penetration testing for your organization has never been easier.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_mRlCjx41giLupwYFNbgYu3N60GFc-v341Ek9gqWtmLjHQC09E9BUS-ICy5-voFboBGMk1Lane4AAc4GgIeTjvyCNnVerCFG0gKvhU9nAEnRue9t4mazDKbXlug8ygmGsdK8XfK0PffX/s1600/career-in-penetration-testing.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;347&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_mRlCjx41giLupwYFNbgYu3N60GFc-v341Ek9gqWtmLjHQC09E9BUS-ICy5-voFboBGMk1Lane4AAc4GgIeTjvyCNnVerCFG0gKvhU9nAEnRue9t4mazDKbXlug8ygmGsdK8XfK0PffX/s640/career-in-penetration-testing.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;Reback council offers a simple, easy-to-understand
suite of penetration testing services to commercial organizations throughout
the India. Reback council is a commercial product offering of Chameleon
Integrated Services, and can demonstrate a strong track record of IT security
systems past performance that includes work for the Indian government and a
diverse group of commercial customers (small and large).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;We make the process of executing the most critical
elements of penetration testing available in an easy to implement and easy to
afford manner. We offer four separate services individually and as a bundle,
that we believe are critical to establishing IT system security for your
organization.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;Our service offerings include:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;Internal Penetration Testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;External Penetration Testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;Wireless Penetration Testing&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;Spear Phishing Campaigns&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;These services can be performed quickly and easily by
our team anywhere in the India. Reback council uses top pen. testing experts
from across the India to implement our security procedures. You can
rest-assured that all work performed will be completed by a verifiable and
accredited IT security expert. Additionally, all of our service offerings
include deliverables and reports following all of our security protocols.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;























&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/4917921802387985795/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/03/penetration-testing-for-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4917921802387985795'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4917921802387985795'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/03/penetration-testing-for-your.html' title='Penetration testing for your organization has never been easier.'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz_mRlCjx41giLupwYFNbgYu3N60GFc-v341Ek9gqWtmLjHQC09E9BUS-ICy5-voFboBGMk1Lane4AAc4GgIeTjvyCNnVerCFG0gKvhU9nAEnRue9t4mazDKbXlug8ygmGsdK8XfK0PffX/s72-c/career-in-penetration-testing.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-1646733802382461265</id><published>2016-03-12T14:30:00.000+05:30</published><updated>2016-03-12T14:32:32.208+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet of things"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Research"/><title type='text'>HORNET is New Tor-like Anonymity Network With Superfast Speeds</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The Deep Web is a place that is hidden from the ordinary world because the browsers used to access the Deep Web, continuously encrypt user data. Due to this constant data encryption, the browsing speeds are slow. Our beloved Tor network has more than 2 million daily users that slow down its performance. To counter this speed issue, five researchers have developed a new Tor-style anonymity network called HORNET: High-Speed Onion Routing at Network Layer. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx5sbBfUSGXt9o8GxX-eb0blSOwV3eKc5osDT5nLX8ar2PPUUdcWOwgBw7yi3pPEco5WMbHAhp3qNFTulz4Xe0z_sW5piqMoSBQEYEP6ftlFxRAs5FVNcPa2vLyAHIOp68RkarljaYOyOW/s1600/hornet.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;350&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx5sbBfUSGXt9o8GxX-eb0blSOwV3eKc5osDT5nLX8ar2PPUUdcWOwgBw7yi3pPEco5WMbHAhp3qNFTulz4Xe0z_sW5piqMoSBQEYEP6ftlFxRAs5FVNcPa2vLyAHIOp68RkarljaYOyOW/s640/hornet.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Compared to anonymity networks like Tor, the HORNET system is more resistant to attacks and it delivers faster node speeds. The researcher team writes, “unlike other onion routing implementations, HORNET routers do not keep per-flow state or perform computationally expensive operations for data forwarding, allowing the system to scale as new clients are added.”&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;This paper “Hornet: High-Speed Onion Routing at Network Layer” was written by researchers Chen Chen of Carnegie Mellon University, along with David Barrera, Enrico Asoni, and Adrian Perrig of Zurich’s Federal Institute of Technology, and George Danezis from University College of London. Here’s the research paper.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;To achieve speeds higher than Tor, HORNET doesn’t encrypt data as often- instead it encrypts just the personal stuff. In Tor, anonymity comes at the price of speed. To provide anonymity, Tor takes data and passes it through series of computers before the final destination. Each time, it passes from one computer to the other, the encryption exists and IP addresses change. Thus, it forms a time-taking multilayer network (hence “The Onion Router”).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;HORNET nodes process the anonymous traffic at more than 93Gb/s speed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;The basic architecture of Tor and HORNET is same(onion routing). HORNET creates an encryption key set along with the routing info (connection state) on your system. Thus, the intermediate nodes don’t need to build this information each time, as these keys and connection state info is carried within packet headers (anonymous header or AHDR).&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;According to the research paper, it makes the whole system more secure as the other intermediate computers don’t waste time playing with the sender’s and receiver’s packets. Thus, the whole process becomes more fast and secure.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;It is worth mentioning that HORNET is not yet tested at a large scale, it’s just these 5 researchers. Thus, extensive peer review is needed to adopt systems like HORNET.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/1646733802382461265/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/03/hornet-is-new-tor-like-anonymity.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1646733802382461265'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1646733802382461265'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/03/hornet-is-new-tor-like-anonymity.html' title='HORNET is New Tor-like Anonymity Network With Superfast Speeds'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhx5sbBfUSGXt9o8GxX-eb0blSOwV3eKc5osDT5nLX8ar2PPUUdcWOwgBw7yi3pPEco5WMbHAhp3qNFTulz4Xe0z_sW5piqMoSBQEYEP6ftlFxRAs5FVNcPa2vLyAHIOp68RkarljaYOyOW/s72-c/hornet.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-4435437986117367400</id><published>2016-03-09T12:23:00.002+05:30</published><updated>2016-03-09T12:24:10.901+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer Virus"/><category scheme="http://www.blogger.com/atom/ns#" term="Safety Tips"/><title type='text'>Top 10 safe computing TIPS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1RX-ya8hu99M092mhyfQB1auPMf7GATP0FOx4slpzAaOkn5O_hn3nTRXucaCwBFi1pm7Xoi9JqSQ9t4U11cUOsB0ezqWVmR8NKcbSB40vISQHRnuwP1rUm2drNKHM2IGxWluAR7mfYzWa/s1600/computer+tips.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1RX-ya8hu99M092mhyfQB1auPMf7GATP0FOx4slpzAaOkn5O_hn3nTRXucaCwBFi1pm7Xoi9JqSQ9t4U11cUOsB0ezqWVmR8NKcbSB40vISQHRnuwP1rUm2drNKHM2IGxWluAR7mfYzWa/s640/computer+tips.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;1.Patch, Patch, PATCH!&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Set up your computer for automatic software and operating system updates. An unpatched machine is more likely to have software vulnerabilities that can be exploited.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;2.Install protective software.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Sophos is available as a free download for Windows, Macintosh, and Linux from IS&amp;amp;T&#39;s software page. When installed, the software should be set to scan your files and update your virus definitions on a regular basis.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;3.Choose strong passwords.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Choose strong passwords with letters, numbers, and special characters to create a mental image or an acronym that is easy for you to remember. Create a different password for each important account, and change passwords regularly.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;4.Backup, Backup, BACKUP!&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Backing up your machine regularly can protect you from the unexpected. Keep a few months&#39; worth of backups and make sure the files can be retrieved if needed. Learn more about TSM and how to backup your system.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;5.Control access to your machine.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Don&#39;t leave your computer in an unsecured area, or unattended and logged on, especially in public places - including Athena clusters and Quickstations. The physical security of your machine is just as important as its technical security.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;6.Use email and the Internet safely.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Ignore unsolicited emails, and be wary of attachments, links and forms in emails that come from people you don&#39;t know, or which seem &quot;phishy.&quot; Avoid untrustworthy (often free) downloads from freeware or shareware sites. Learn more about spam filtering.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;7.Use secure connections.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;When connected to the Internet, your data can be vulnerable while in transit. Use remote connectivity and secure file transfer options when off campus.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;8.Protect sensitive data.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Reduce the risk of identity theft. Securely remove sensitive data files from your hard drive, which is also recommended when recycling or repurposing your computer. Use the encryption tools built into your operating system to protect sensitive files you need to retain.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;9.Use desktop firewalls.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Macintosh and Windows computers have basic desktop firewalls as part of their operating systems. When set up properly, these firewalls protect your computer files from being scanned.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;10.Most importantly, stay informed.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;Stay current with the latest developments for Windows, Macintosh Linux, and Unix systems.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/4435437986117367400/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/03/top-10-safe-computing-tips.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4435437986117367400'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4435437986117367400'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/03/top-10-safe-computing-tips.html' title='Top 10 safe computing TIPS'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1RX-ya8hu99M092mhyfQB1auPMf7GATP0FOx4slpzAaOkn5O_hn3nTRXucaCwBFi1pm7Xoi9JqSQ9t4U11cUOsB0ezqWVmR8NKcbSB40vISQHRnuwP1rUm2drNKHM2IGxWluAR7mfYzWa/s72-c/computer+tips.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-4032360848905662481</id><published>2016-02-27T12:33:00.000+05:30</published><updated>2016-02-27T12:33:51.949+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Application Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer Security"/><title type='text'>6 Statistics that Prove You Need Application Security Training</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;line-height: 150%; margin-bottom: .0001pt; margin: 0in; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;As well as protecting your applications and the sensitive
data they contain, improving your application security can save your
organisation a great deal of time and expense.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 150%; margin-bottom: .0001pt; margin: 0in; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicHTZkwRZwlnZyOFiVIHRotl3RWuv-0r2WtUCF6loxYORsOO8nkFJOvFkMGlizJHME4I4xKUxo9qC0cJp6JNbGuUmF3s3J-ghVCIX_Qcsjd-U4lH-kyqLeuWAvpvdEfZM7sXbcMzKFnNqf/s1600/application+security.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;380&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicHTZkwRZwlnZyOFiVIHRotl3RWuv-0r2WtUCF6loxYORsOO8nkFJOvFkMGlizJHME4I4xKUxo9qC0cJp6JNbGuUmF3s3J-ghVCIX_Qcsjd-U4lH-kyqLeuWAvpvdEfZM7sXbcMzKFnNqf/s640/application+security.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 150%; margin-bottom: .0001pt; margin: 0in; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 150%; margin-bottom: .0001pt; margin: 0in; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif;&quot;&gt;Good application security training is a crucial first
step to improving your organisation’s application security.&amp;nbsp;&amp;nbsp;Today,
I’m looking at 6 statistics that demonstrate why application security training
is essential for protecting your organisation and its data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpFirst&quot; style=&quot;background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-outline-level: 2; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;1) At Least 70% of Vulnerabilities Exist in the
Application Layer&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;Gartner has estimated that
70% of all vulnerabilities are caused by poor application security – and other
researchers have estimated the figure to be&amp;nbsp;as high as 90%.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;While many organisations
assume that the network layer of their infrastructure is the primary source of
security vulnerabilities, it’s actually the application layer that poses the
biggest threat.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-outline-level: 2; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;2) Only 1 in 40 Web Applications has a Web Application
Firewall&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;&lt;span style=&quot;color: black; mso-themecolor: text1; text-decoration: none; text-underline: none;&quot;&gt;Web application firewalls&lt;/span&gt;&amp;nbsp;(WAFs) inspect all traffic
flowing to web applications for common attacks, such as&amp;nbsp;&lt;span style=&quot;color: black; mso-themecolor: text1; text-decoration: none; text-underline: none;&quot;&gt;cross-site scripting, SQL injection, and command
injection.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;Despite WAFs being able to
detect many of the most common web application vulnerabilities, on average only
1 in 40 applications in a recent study was found to use a web application
firewall to protect against common attacks.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-outline-level: 2; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;3) 71% of Developers Believe Security is Not Addressed
During the SDLC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;The sooner you catch a
vulnerability during the SDLC,&amp;nbsp;&lt;span style=&quot;color: black; mso-themecolor: text1; text-decoration: none; text-underline: none;&quot;&gt;the easier (and cheaper) it is to fix.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; margin-bottom: 6.75pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 150%;&quot;&gt;Despite the exponentially
growing cost and complexity of fixing application vulnerabilities after
deployment, more than two thirds of developers believe that their organisations
make no efforts to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%; text-decoration: none;&quot;&gt;address security during the development&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;life-cycle&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 150%;&quot;&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-outline-level: 2; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;4) Only 22% of Developers Have Any Role in Testing
Application Security&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;Less than a quarter of
software developers have any active role in testing application security during
the SDLC.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;This is because in most
organisations,&amp;nbsp;&lt;span style=&quot;color: black; mso-themecolor: text1; text-decoration: none; text-underline: none;&quot;&gt;security is a separate department&lt;/span&gt;&amp;nbsp;and
the development team has very little security knowledge, making it harder to identify
and remediate vulnerabilities, and prevent&amp;nbsp;them&amp;nbsp;from making it into
the finished product.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-outline-level: 2; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;5) 47% of Developers Have No Mandate to Fix Vulnerable
Code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;Even worse: once a
vulnerability is detected, almost half of developers lack the authority to fix them.
Instead it is normally passed over to the security team, making the remediation
process longer and allowing more time for the vulnerability to be exploited.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;If security isn’t
prioritised during the SDLC and developers aren’t involved in security testing
for their applications, they will make the same mistakes over and over, and
without mandate to remediate these vulnerabilities, this can cause significant
friction between your development and security teams.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0in; mso-add-space: auto; mso-outline-level: 2; text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;6) 89% of Application Vulnerabilities Are in the Software
Code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; margin-bottom: 6.75pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 150%;&quot;&gt;This is compared with only
11% that are caused by application&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;misconfiguration&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 150%;&quot;&gt;. This highlights the&amp;nbsp;importance of educating your development team in&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%; text-decoration: none;&quot;&gt;secure coding best practices&lt;/span&gt;&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 150%;&quot;&gt;, to guard
against the most common application vulnerabilities such as those listed in the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%; text-decoration: none;&quot;&gt;OWASP Top 10&lt;/span&gt;&lt;span style=&quot;font-family: Open Sans, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 150%;&quot;&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormalCxSpMiddle&quot; style=&quot;background: white; line-height: 150%; margin-bottom: 6.75pt; mso-add-space: auto; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt; line-height: 150%;&quot;&gt;By teaching your developers
defensive coding, your organisation can reduce vulnerabilities at the source,
reducing the number of mistakes and loopholes that make it into the finished
code.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/4032360848905662481/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/6-statistics-that-prove-you-need.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4032360848905662481'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/4032360848905662481'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/6-statistics-that-prove-you-need.html' title='6 Statistics that Prove You Need Application Security Training'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicHTZkwRZwlnZyOFiVIHRotl3RWuv-0r2WtUCF6loxYORsOO8nkFJOvFkMGlizJHME4I4xKUxo9qC0cJp6JNbGuUmF3s3J-ghVCIX_Qcsjd-U4lH-kyqLeuWAvpvdEfZM7sXbcMzKFnNqf/s72-c/application+security.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-5149858366309406452</id><published>2016-02-21T13:24:00.002+05:30</published><updated>2016-02-21T13:24:22.244+05:30</updated><title type='text'>Top 10 Skills Required to Become a Pro-Hacker</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCcKTvBApnEEKDRakQxVg82mC2evBiE6WHgqSoJinc8wgGIaQQ9DeW4d_QvFBIgCTjjeuYJLN3myGc1qKnh1IPFGTkBM9D-mEECsJ7hObG-Q82m1J2XHi-i7BWR3e-Wb-8mrFK7Amnqx7F/s1600/Top-Ten-Skills-Required-to-Become-a-Pro-Hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCcKTvBApnEEKDRakQxVg82mC2evBiE6WHgqSoJinc8wgGIaQQ9DeW4d_QvFBIgCTjjeuYJLN3myGc1qKnh1IPFGTkBM9D-mEECsJ7hObG-Q82m1J2XHi-i7BWR3e-Wb-8mrFK7Amnqx7F/s400/Top-Ten-Skills-Required-to-Become-a-Pro-Hacker.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;td_pull_quote td_pull_center&quot; style=&quot;background-color: white; border-left-style: none; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 17px 0px; padding: 15px 50px; position: relative;&quot;&gt;
&lt;div style=&quot;box-sizing: border-box; font-style: italic; font-weight: 600; margin-bottom: 26px; text-align: center;&quot;&gt;
The term hacker literally means a person who uses computers in order to get unauthorized access to data. Hacking is not crime unless and until you do it to get unauthorized access. In this article, you will see the skills required to become a pro-hacker. Stealing data and hacking into networks are not the only things that hacker does. The skills mentioned below can also help you to tackle with hackers who do hacking to obtain unauthorized access data.&lt;/div&gt;
&lt;div style=&quot;box-sizing: border-box; float: none; margin: 10px 0px; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 28px; font-weight: 400; line-height: 38px; margin: 30px 0px 20px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;Top 10 Skills Required to Become a Pro-Hacker&lt;/strong&gt;&lt;/h2&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 class=&quot;sectionHeadline&quot; style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#1&amp;nbsp;Basic Computer Skills&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22022&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Basic Computer Skills&quot; src=&quot;http://i2.wp.com/techviral.com/wp-content/uploads/2016/02/Basic-Computer-Skills.jpg?resize=300%2C248&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Basic Computer Skills&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
You may laugh at this skill, however it is very necessary for a hacker to get strong hold on the functioning of the computer. Also you must be able to use the command line in Windows and editing the registry and setting own networking parameters.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#2&amp;nbsp;Networking Skills&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22026&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Networking Skills&quot; src=&quot;http://i2.wp.com/techviral.com/wp-content/uploads/2016/02/Networking-Skills.png?resize=300%2C180&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Networking Skills&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
The skills mentioned below will be really helpful for those persons wishing to become hackers as these skills will help them to understand about its functioning.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
DHCP,&amp;nbsp;NAT,&amp;nbsp;Subnetting,&amp;nbsp;IPv4,&amp;nbsp;IPv6,&amp;nbsp;Public v Private IP,&amp;nbsp;DNS,&amp;nbsp;Routers and switches,&amp;nbsp;VLANs,&amp;nbsp;OSI model,&amp;nbsp;MAC addressing,&amp;nbsp;ARP.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#3&amp;nbsp;Linux Skills&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22028&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Linux Skills&quot; src=&quot;http://i1.wp.com/techviral.com/wp-content/uploads/2016/02/Linux-Skills.jpg?resize=300%2C180&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Linux Skills&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
No Doubt, Linux is the most favorite operating system of hackers. Almost all the tools that we use as being as a hacker are developed for Linux. It has more potential that hacker requires but are not available on Windows. That’s why hacker prefer to use Linux Operating System.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#4&amp;nbsp;Wireshark&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22030&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Wireshark&quot; src=&quot;http://i0.wp.com/techviral.com/wp-content/uploads/2016/02/Wireshark.png?resize=300%2C169&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Wireshark&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
Wireshark is open source packet analyzer and available for free. It is particularly used for network troubleshooting, analysis, software and communications protocol development as well as in Education.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#5&amp;nbsp;Virtualization&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22031&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;a class=&quot;ext-link&quot; data-wpel-target=&quot;_blank&quot; href=&quot;http://i1.wp.com/techviral.com/wp-content/uploads/2016/02/Virtualization.gif&quot; rel=&quot;attachment wp-att-22031 external nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #3b5998; text-decoration: none;&quot; title=&quot;&quot;&gt;&lt;img alt=&quot;Virtualization&quot; class=&quot;wp-image-22031 size-medium&quot; data-lazy-loaded=&quot;true&quot; height=&quot;169&quot; src=&quot;http://i1.wp.com/techviral.com/wp-content/uploads/2016/02/Virtualization.gif?resize=300%2C169&quot; style=&quot;border: 0px; box-sizing: border-box; display: block; height: auto; margin-bottom: 0px; max-width: 100%; width: 300px;&quot; width=&quot;300&quot; /&gt;&lt;/a&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;Virtualization&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
It literally means the making of virtual version of something like operating system, server, storage device or network resources. It helps&amp;nbsp;in testing the hack that is going to take place before making your hack go live and it also helps to test and revise the hacks before making it go live.&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; float: none; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 0px;&quot;&gt;
&lt;left style=&quot;box-sizing: border-box;&quot;&gt;&lt;/left&gt;&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#6&amp;nbsp;Security Concepts&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22032&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Security Concept&quot; src=&quot;http://i0.wp.com/techviral.com/wp-content/uploads/2016/02/Security-Concepts.jpg?resize=300%2C200&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Security Concept&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
It is also vital skill in order to understand&amp;nbsp;security concepts as well as technologies. Person having strong hold on security can control the barriers set by security administrators. It is also important for a hacker to learn skills like&amp;nbsp;Public Key Infrastructure (PKI),&amp;nbsp;Secure Sockets Layer (SSL),&amp;nbsp;Intrusion Detection System (IDS), Firewalls and more. If you are learner in hacking, you can get most of these skills in a security course like Security +.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#7&amp;nbsp;Wireless Technologies&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22038&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Wireless Technologies&quot; src=&quot;http://i0.wp.com/techviral.com/wp-content/uploads/2016/02/Wireless-Technologies.png?resize=300%2C300&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Wireless Technologies&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
Wireless Technology literally means the procedure of sending information via invisible waves in the air. Persons who wish to hack wireless devices must first understand the functioning of it. So you must learn encryption algorithm like WEP, WPA, WPA2, the four way handshake and WPS. Moreover you can also learn and understand things like protocol for connection and authentication as well as restrictions on wireless technologies.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#8&amp;nbsp;Scripting&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22039&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Scripting&quot; src=&quot;http://i0.wp.com/techviral.com/wp-content/uploads/2016/02/Scripting.png?resize=300%2C173&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Scripting&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
It is considered as important&amp;nbsp;skill in order to become a pro-hacker because if any hacker is using tools of other hacker, he/she will be dis-rated for using them. Also, security administrators are vigilant about the hacking attempt and they come with new tool in order to cope with hackers.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;#9&amp;nbsp;Database&amp;nbsp;&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22043&quot; style=&quot;background-color: white; box-sizing: border-box; clear: both; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Database &quot; src=&quot;http://i1.wp.com/techviral.com/wp-content/uploads/2016/02/databases.jpg?resize=300%2C197&quot; style=&quot;font-size: 18px; line-height: 26px; text-align: center;&quot; /&gt;Database&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
Database is a structured set of data present in computer and which is accessible in numerous ways. For those hacker’s who wish to hack database, then it is necessary for them to understand the functioning of the databases. It consists of SQL Language. It is better to understand the big DBMS like Oracle, MySQL or Oracle.&lt;/div&gt;
&lt;hr style=&quot;background-color: white; box-sizing: content-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; height: 0px; line-height: 26px;&quot; /&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div data-dobid=&quot;dfn&quot; style=&quot;background-color: white; box-sizing: border-box; font-family: &#39;Titillium Web&#39;; font-size: 18px; line-height: 26px;&quot;&gt;
&lt;h3 style=&quot;box-sizing: border-box; font-size: 22px; font-weight: 400; line-height: 30px; margin: 27px 0px 17px;&quot;&gt;
#&lt;strong style=&quot;box-sizing: border-box;&quot;&gt;10 Web Applications&lt;/strong&gt;&lt;/h3&gt;
&lt;figure class=&quot;wp-caption aligncenter&quot; id=&quot;attachment_22045&quot; style=&quot;box-sizing: border-box; clear: both; margin: 6px auto 0px; max-width: 100%; text-align: center; width: 300px;&quot;&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;&lt;img alt=&quot;Web Applications&quot; src=&quot;http://i2.wp.com/techviral.com/wp-content/uploads/2016/02/Web-Applications.png?resize=300%2C280&quot; /&gt;&lt;/figcaption&gt;&lt;figcaption class=&quot;wp-caption-text&quot; style=&quot;box-sizing: border-box; color: #444444; font-size: 11px; font-style: italic; line-height: 17px; margin: 6px 0px 26px; text-align: left;&quot;&gt;Web Applications&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style=&quot;box-sizing: border-box; margin-bottom: 26px;&quot;&gt;
Web Applications is software which you use on the Internet via your Web&amp;nbsp;Browser. It has been&amp;nbsp;witnessed that web applications have also became a prime target of the hackers since the last few years. You will be be victorious in your task if you understand the functioning of web applications and the databases backing them. Moreover it will also help you to make your own website for the purpose of phishing or other.&lt;/div&gt;
&lt;hr style=&quot;box-sizing: content-box; height: 0px;&quot; /&gt;
&lt;div style=&quot;box-sizing: border-box; margin-bottom: 26px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/5149858366309406452/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/top-10-skills-required-to-become-pro.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/5149858366309406452'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/5149858366309406452'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/top-10-skills-required-to-become-pro.html' title='Top 10 Skills Required to Become a Pro-Hacker'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCcKTvBApnEEKDRakQxVg82mC2evBiE6WHgqSoJinc8wgGIaQQ9DeW4d_QvFBIgCTjjeuYJLN3myGc1qKnh1IPFGTkBM9D-mEECsJ7hObG-Q82m1J2XHi-i7BWR3e-Wb-8mrFK7Amnqx7F/s72-c/Top-Ten-Skills-Required-to-Become-a-Pro-Hacker.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-1604405780209894933</id><published>2016-02-19T17:56:00.000+05:30</published><updated>2016-02-19T17:57:37.332+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Hacking"/><title type='text'>Why Android Malware is worse than you thought.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;The future will not only
be about thinner, faster, and bendable smartphones, but it will definitely also
be about security and bigger online threats.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUCd2bAti9ppSxrNySL2esG5yaX8eMqGBxGlGC3RdQcRWQ22t0BGV-T2e_J5ELyf3Omy5Nb1wNlh44yvc5d51M4JRrwbQO5EgBaQ6FZkQmLJIhatxBbkUG8RyENR2t7xo2SWmcvnP815wz/s1600/andri.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUCd2bAti9ppSxrNySL2esG5yaX8eMqGBxGlGC3RdQcRWQ22t0BGV-T2e_J5ELyf3Omy5Nb1wNlh44yvc5d51M4JRrwbQO5EgBaQ6FZkQmLJIhatxBbkUG8RyENR2t7xo2SWmcvnP815wz/s640/andri.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Let’s imagine a scenario
where you don’t need to take photos any more because Google will simply choose
the best pictures from a live stream of the day’s events just to make your life
easier.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Soon you won’t even need
to decide what to eat, your Android phone will know exactly what you need and
what you like, showing you the most suitable foods for your age.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;But there’s so much hype
around the future of Android that we forget to see the obvious threats, the
alarmingly increasing number of Android malware, and the criminal activities
carried out on smartphones.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;According to a recent
International Data Corporation (IDC) study, one out of every one hundred mobile
devices (1.4%) on the global market was infected with malware in Q2 2015.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;The same study reveals
that vendors shipped a total of 334.4 million smartphones worldwide in the
first quarter of 2015 and Android dominated the market with a 78% share. That’s
a lot of Android phones affected by malware!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;0.2% of the devices in
the U.S. were infected with malware in the second quarter of 2015. Of the 0.2%
infected devices, more than half (62%) were infected with malware aimed at
stealing the user’s personal data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Privacy-stealing malware
can get a wide range of personal information and data from your Android device,
including contacts, locations, pictures, and login credentials for your online
banking.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Using this type of
malware, hackers can easily gain access to your bank account data and use it to
carry out criminal acts on your behalf or sell your info on the black market.
This is not a spy movie we’re talking about, this is a very common scenario in
2016, anywhere in the world.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;The good thing is that
Google has been constantly making security improvements to the Android
platform. The number of vulnerabilities that affect the OS compared to PC
platforms is really small. But the customizable nature of the OS still leaves
the door open to security breaches.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Guess where that leaves
your Android smartphone security? That’s right, in your own hands. Every click
counts!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Here are 5 must-follow
tips to protect your Android device from malware:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol start=&quot;1&quot; type=&quot;1&quot;&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Stop exposing yourself to bad
     apps in unofficial stores. Always get the latest apps from official Google
     &amp;amp; partner stores.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;A good Antivirus is a must on
     your phone.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Don’t be afraid of all the
     updates your phone asks for from time to time. They can be a life saver.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Use a VPN when making online
     payments using public WiFi.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Beware of data-pulling adware.
     Install an ad blocker or at least an ad tracker.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;No doubt that Android is here to
stay and dominate the smartphone market and we’re really excited about the
future of Android technology.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 11.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;To Know more about Mobile Security.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;&lt;b&gt;Our Institute Location:&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Redback IT Solutions
Private Limited,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;#AL 24 TNHB PHASE III,&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Sathuvacheri,( Near
Vallalar Water Tank)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Vellore. 632602&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;&lt;b&gt;Contact :&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;Training Coordinator&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 11.5pt;&quot;&gt;8189985551&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/1604405780209894933/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/why-android-malware-is-worse-than-you.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1604405780209894933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/1604405780209894933'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/why-android-malware-is-worse-than-you.html' title='Why Android Malware is worse than you thought.'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUCd2bAti9ppSxrNySL2esG5yaX8eMqGBxGlGC3RdQcRWQ22t0BGV-T2e_J5ELyf3Omy5Nb1wNlh44yvc5d51M4JRrwbQO5EgBaQ6FZkQmLJIhatxBbkUG8RyENR2t7xo2SWmcvnP815wz/s72-c/andri.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7152608155290614106.post-531456608199855390</id><published>2016-02-17T12:07:00.001+05:30</published><updated>2016-02-17T12:09:01.938+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Network Forensics"/><title type='text'>Cyber Crime &amp; How to Protect Yourself From Them</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &#39;Open Sans&#39;, sans-serif; font-size: 12pt;&quot;&gt;Cyber Crime and How to
Protect Yourself from Them&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; As Internet usage is growing daily the world
is coming closer. The World Wide Web sounds like a vast phenomenon but
surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create
another problem for people who spend long hours browsing the Cyber World –
which is cyber crimes.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaM1CpeEzZNUd9evIs2ithj0O1gZpAf5dSrz3O4Nor71_H1SOvPJk-5Z3b0rELBxzfgg3vIPSrWtjmkG3Z_OMo6XnQbnDo-L5BSAr-4r069_RYKLnd6rRx85tzSxquFNXvZB9nJ5ksausS/s1600/cyber.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaM1CpeEzZNUd9evIs2ithj0O1gZpAf5dSrz3O4Nor71_H1SOvPJk-5Z3b0rELBxzfgg3vIPSrWtjmkG3Z_OMo6XnQbnDo-L5BSAr-4r069_RYKLnd6rRx85tzSxquFNXvZB9nJ5ksausS/s640/cyber.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; While law enforcement agencies are trying to tackle this
problem, it is growing steadily and many people have become victims of hacking,
theft, identity theft and malicious software. One of the best ways to avoid
being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and
hardware to authenticate any information that is sent or accessed over the
Internet. However, before you can understand more about this system, let us
find out more about cyber crimes.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Types of Cyber Crimes&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; When any crime is committed over the Internet
it is referred to as a cyber crime. There are many types of cyber crimes and
the most common ones are explained below:&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Hacking:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;This is a type of crime wherein a person’s computer is
broken into so that his personal or sensitive information can be accessed. In
the United States, hacking is classified as a felony and punishable as such.
This is different from ethical hacking, which many organizations use to check
their Internet security protection. In hacking, the criminal uses a variety of
software to enter a person’s computer and the person may not be aware that his
computer is being accessed from a remote location.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Theft:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;This crime occurs when a person violates copyrights and
downloads music, movies, games and software. There are even peer sharing
websites which encourage software piracy and many of these websites are now
being targeted by the FBI. Today, the justice system is addressing this cyber
crime and there are laws that prevent people from illegal downloading.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Cyber Stalking:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;This is a kind of online harassment
wherein the victim is subjected to a barrage of online messages and emails.
Typically, these stalkers know their victims and instead of resorting to
offline stalking, they use the Internet to stalk. However, if they notice that
cyber stalking is not having the desired effect, they begin offline stalking
along with cyber stalking to make the victims’ lives more miserable.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Identity Theft:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;This has become a major problem with
people using the Internet for cash transactions and banking services. In this
cyber crime, a criminal accesses data about a person’s bank account, credit
cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major
financial losses for the victim and even spoil the victim’s credit history.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Malicious Software:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;These are Internet-based software or
programs that are used to disrupt a network. The software is used to gain
access to a system to steal sensitive information or data or causing damage to
software present in the system.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Child soliciting and Abuse:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;This is also a type of cyber crime
wherein criminals solicit minors via chat rooms for the purpose of child
pornography. The FBI has been spending a lot of time monitoring chat rooms
frequented by children with the hopes of reducing and preventing child abuse
and soliciting.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Causes of Cyber Crime&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Wherever the rate of return on investment is
high and the risk is low, you are bound to find people willing to take
advantage of the situation. This is exactly what happens in cyber crime.
Accessing sensitive information and data and using it means a rich harvest of
returns and catching such criminals is difficult. Hence, this has led to a rise
in cyber crime across the world.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;History of Cyber Crime&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;When computers and networks came into being in
the 1990s, hacking was done basically to get more information about the
systems. Hackers even competed against one another to win the tag of the best
hacker. As a result, many networks were affected; right from the military to
commercial organizations. Initially, these hacking attempts were brushed off as
mere nuisance as they did not pose a long-term threat. However, with malicious
software becoming ubiquitous during the same period, hacking started making
networks and systems slow. As hackers became more skillful, they started using
their knowledge and expertise to gain benefit by exploiting and victimizing
others.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Cyber Crime in Modern Society&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; Today, criminals that indulge in cyber crimes
are not driven by ego or expertise. Instead, they want to use their knowledge
to gain benefits quickly. They are using their expertise to steal, deceive and
exploit people as they find it easy to earn money without having to do an
honest day’s work.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Cyber crimes have become a real threat today
and are quite different from old-school crimes, such as robbing, mugging or
stealing. Unlike these crimes, cyber crimes can be committed single handedly
and does not require the physical presence of the criminals. The crimes can be
committed from a remote location and the criminals need not worry about the law
enforcement agencies in the country where they are committing crimes. The same
systems that have made it easier for people to conduct e-commerce and online
transactions are now being exploited by cyber criminals.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Categories of Cyber Crime&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Cyber crimes are broadly categorized into
three categories, namely crime against&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-left: 0.5in; text-indent: -0.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 13.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;1.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Individual&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 13.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-left: 0.5in; text-indent: -0.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 13.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;2.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Property&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 13.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-left: 0.5in; text-indent: -0.25in; vertical-align: baseline;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 13.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;3.&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt; font-stretch: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Government&lt;/span&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 13.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Each category can use a variety of methods and
the methods used vary from one criminal to another.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Individual:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;This type of cyber crime can be in the form of cyber
stalking, distributing pornography, trafficking and “grooming”. Today, law
enforcement agencies are taking this category of cyber crime very seriously and
are joining forces internationally to reach and arrest the perpetrators.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Property:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;Just like in the real world where a criminal can steal and
rob, even in the cyber world criminals resort to stealing and robbing. In this
case, they can steal a person’s bank details and siphon off money; misuse the
credit card to make numerous purchases online; run a scam to get naïve people
to part with their hard earned money; use malicious software to gain access to
an organization’s website or disrupt the systems of the organization. The
malicious software can also damage software and hardware, just like vandals
damage property in the offline world.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;border: none windowtext 1.0pt; color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-border-alt: none windowtext 0in; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; padding: 0in;&quot;&gt;Government:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;Although not as common as the other two categories, crimes
against a government are referred to as cyber terrorism. If successful, this
category can wreak havoc and cause panic amongst the civilian population. In
this category, criminals hack government websites, military websites or
circulate propaganda. The perpetrators can be terrorist outfits or unfriendly
governments of other nations.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;How to Tackle Cyber Crime&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; It has been seen that most cyber criminals
have a loose network wherein they collaborate and cooperate with one another.
Unlike the real world, these criminals do not fight one another for supremacy
or control. Instead they work together to improve their skills and even help
out each other with new opportunities. Hence, the usual methods of fighting
crime cannot be used against cyber criminals. While law enforcement agencies
are trying to keep pace with cyber criminals, it is proving to be a Herculean
task. This is primarily because the methods used by cyber criminals and
technology keeps changing too quickly for law enforcement agencies to be
effective. That is why commercial institutions and government organizations
need to look at other methods of safeguarding themselves.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;, serif; font-size: 13.5pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; margin-bottom: 0.0001pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;color: #444444; font-family: &amp;quot;Open Sans&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Redback Cyber Security Council offers a way to
keep all information confidential by using safe and secure domains that cannot
be tracked or accessed. This security solution can be used by commercial and
governmental organization to ensure an impenetrable network while still making
sure that users can get access to the required information easily.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://redbackcouncil.blogspot.com/feeds/531456608199855390/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/cyber-crime-how-to-protect-yourself.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/531456608199855390'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7152608155290614106/posts/default/531456608199855390'/><link rel='alternate' type='text/html' href='http://redbackcouncil.blogspot.com/2016/02/cyber-crime-how-to-protect-yourself.html' title='Cyber Crime &amp; How to Protect Yourself From Them'/><author><name>Sivapriya</name><uri>http://www.blogger.com/profile/04532765509347974952</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaM1CpeEzZNUd9evIs2ithj0O1gZpAf5dSrz3O4Nor71_H1SOvPJk-5Z3b0rELBxzfgg3vIPSrWtjmkG3Z_OMo6XnQbnDo-L5BSAr-4r069_RYKLnd6rRx85tzSxquFNXvZB9nJ5ksausS/s72-c/cyber.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>