Posts

Showing posts from August, 2017

How To Maintain Our Privacy:-Must Read

"How TO Secure our System from vulnerability"   The Overall Technical world are Man_Made..Hence the vulnerability issue are very  common in any system..BUt This is a  opportunity for hacker to get an access of targatted computer and hack the cridentialls.     According to a recent news,The HBO offers $250,000 to a hackers group for prevent  a upcoming leaks of vulnerability.  but this   kind of scenario are very high level..also Handel of this kinds of matter by Higher level authority.. But everyone unable to pay a  large amount for our own privacy...Hence for maintaining and built a strong privacy by patching,updating the OS.. By using Secure  (Trusted) internet connection..Not from Third Party Application..Strictly restrict the third party soft.,application,which always ready  for taking a system access of user.. The security researcher  also say if you are very consious with our privacy on internet so attach ...

The Opinion about "SARAHAH"

                  """Sarahah"""(Anonymous)Read before Installing:-   Now a day Sarahah are very popular..Every body wants to chat on sarahah..Many Boys And girls are updated our status with sarahah and called for the anonynous message.In sarahah we can sent anonymously message(Hidden our identity) to anyone who use a sarahah. The best part of this app is messager identity is not showing..But this is the dangerous part of the app. We only view the message we unable to see the message sender's identity..At my lost blog Many guidelines about for our maintaining our privacy on internet..  But normal people don't think that they use sarahah with our privacy issue..because not locatted sender's activity is the main risk for user..Suppose,A particular girl of sarahah user,and the cyco criminal minded background man who usese a sarahah,the person sent message freely to anyone and wants to targett...
                                 Hotel open Wifi-SPYING "a user information"      *NOw a days the attacker targeted a hotel,malls,multiplex open wifi .Many people are visited at a particular hotel an they connect   with hotel;s open wifi.    *At the time the risk are generated for user.At that time the hacker mostly perform "Man-IN-The Middle" attack. in this attack,    the attacker connected in a same network ,trace your each and every activity on internet,spy your conversation(in packet format)     *The main thing is that"our privacy" are trending at the time..Everyone wants to maintain our privacy..But we give a golden chance     to attacker for leaking(spoilling) our privacy..But this overall scenario are not hearing at india..Because After coming a "Jio Data"...
                             ""DATA in DNA"":-Interesting..   WE always used to store our data in pendrive ,memory card, external storage..And who's data is highly confidential they purchase a space on cloud for stoaring a data.. Normally we know this types of techniques..But The security researcher built a new technique that we can store our whole data in our DNA..IS it possible...THE answer is ?  "YES" .. Our data is in binary format (0,1). In the technique the data is converted binary format in genetic code and store in DNA..Beca use YOu don;t believe a 4% of  DNA store all released films record upto 2017(e.g)..WOW...Means after some years man dosen;t need any external device for storage..    And EACH And Every people are freely moved at any place with whole information of world in any fields..  But Drawback of this technique is,A criminal background people freely moved with m...
                 "Amazon Echo---;Hacked or Not"         This news are very viral that the Amazon Echo(Speaker) spying a user coversation..Is it reallyy possible..But it's COMPLEX  to implement.    *The Amazon Echo is ude\\sed for listning a music,set an alarm,playing online song and listen with the alexa voice assistant but the      security researcher found many reports that the alexa assistant which use is(tells about device pairing, activated or not,set an alarm      audio facillity) Spying a user coversation after switching on a particular speaker.    *The hacker turning  a speaker into a listning device.But the main thing is that the hack is not so simple, who have a physical access      of a advice they perform this type of hack.. Hence only give the particular premises access of your devices such as family     members, a pa...
  Upcoming WIndows 10(redstone 3) with Next Generation security features..         RAnsomware types of attacks are nearly implementing on Windows OS..Hence The Upgraded version of Windows 10  (Redstone 3)  coming with fully Advanced feature for defending and possibely retrive the all data of User.. In the OS include a Anti-  Ransomware option.In this feature the user can control to protect a files and folder from unautharized change by Unfriendly  application. The best part of this feature is fully conrtrol on folder access, is a part of windows defender that blocks unautharized  application from making any mofification to your important files save at the "Protected Folder"..  Microsoft making every effort to  make very secure  with advanced feature and techniques to their upcoming version of windows 10.  * The next upcoming upgraddation of windows10 which also known as(Redstone 3) expect to release between se...
        "Internet Of Things"=The new bill                                                                               pass by US  The online devices are included such as:- Router,smart-phone's devices,home appliances which based on internet,self driving car,  haverboard. etc..We recently heard about the car hacking,smart gun(only use by its owner),CCTV camera's hacked that could risk  anyone life..  The massive cyber attack on popular DNS provider shut down the large no.of portion of the internet.Last year made us all fear about  the innocent looking IOT devices,which surrounded us every day and every minute,it poses a threat to a global security.For this kinds  of issues the us govt.Passes a new bill which name is "IOT cybersecurity im...