tag:blogger.com,1999:blog-13749667054000096532024-03-20T15:05:51.180-07:00Cyber Crime & ForensicsTogether we fight... Eradicate Cyber Crime...Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.comBlogger56125tag:blogger.com,1999:blog-1374966705400009653.post-2216287578379067192019-04-02T23:34:00.004-07:002019-04-02T23:34:51.106-07:00Stay Safe on Internet<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Following are the steps we can take to reduce the
risk of getting hacked. Spread the awareness to your near and dear to prevent
them from becoming a victim of cyber crime. Always be alert while surfing the
net. A small mistake can cost a high loss.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">1. If you want to store your personal information
online, store it in an encrypted format. Keep the physical copies of your
financial documents and records in a safe place.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">2. Before you dispose of a computer or a smart phone,
permanently delete all information from the internal storage by using various software
tools and methods available. Keep in mind that printers, copiers, and fax
machines can also retain data which must be removed before selling or donating.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">3. Do not disclose any personal or financial
information to an unknown recipients. The banks and other financial
institutions will not ask you for personal information including account
number, PIN, Passwords or OTPs over the phone or email. Never give out
information over the phone, through the mail, or over the Internet unless you
have initiated the contact or know who you are dealing with.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">4. If you are receiving an email from bank or other
financial institutions or any other unknown entity asking you to provide any
specific personal information, do not click any links provided in those emails.
Instead open the website of that bank or financial institution and contact the
customer care if necessary.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">5. Avoid posting personal information such as age,
date of birth, maiden name, relationship status, address, or other identifying
information on social media sites.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">6. Keep your passwords confidential. Use different
and complex passwords for different sites used by you. Be sure to include
special characters, numbers, and a mix of upper and lower-case characters to
assure password complexity.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">7. Avoid using Wi-Fi without any authentication.
Secure your home and office Wi-Fi by providing authentication.<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><br /></span></b></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<span style="font-family: Times New Roman, serif;"><span style="font-size: 12pt;"><b>8. Always use licensed </b></span><b>software</b><span style="font-size: 12pt;"><b>. Secure your
computer and smart phone with a licensed anti-virus and anti-malware software.
Turn on your personal firewall.<o:p></o:p></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<span style="font-family: Times New Roman, serif;"><span style="font-size: 12pt;"><b><br /></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">9. Update your products regularly.<o:p></o:p></span></b></div>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-61708247215434982802019-02-25T03:08:00.000-08:002019-02-25T03:08:17.758-08:00The first Robot in Indian Police<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="margin-bottom: .0001pt; margin: 0cm; text-align: justify;">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="mso-fareast-language: EN-IN; mso-no-proof: yes;"><br /><!--[endif]--></span></div>
<div class="MsoNormal">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm; text-align: justify;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">Kerala
Police has become the first police force in the country to use a robot for
police work.<span style="mso-spacerun: yes;"> </span>Named as KP-Bot, the Sub
Inspector ranked lady robot will perform duties of the front office of the
police headquarters in Thiruvananthapuram. Chief Minister of Kerala, Sh.
Pinarayi Vijayan on 19/02/2019 inaugurated the humanoid police robot at the
police headquarters in the state.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm; text-align: justify;">
<span lang="EN" style="color: #1c2022; font-family: "Bookman Old Style","serif"; font-size: 14.0pt; mso-ansi-language: EN; mso-bidi-font-family: Helvetica;"><a href="https://twitter.com/ANI/status/1097957693510303745/photo/1" title=""><span style="color: #2b7bb9; text-decoration: none; text-underline: none;"><br />
</span></a></span><span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;"><o:p></o:p></span></div>
<div style="-webkit-text-stroke-width: 0px; box-sizing: border-box; font-variant-caps: normal; font-variant-ligatures: normal; margin-bottom: .0001pt; margin: 0cm; orphans: 2; overflow-wrap: break-word; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">The KP-Bot will be deployed to perform duties of the front office
of the police headquarters which means that it will receive visitors and direct
them to different places as and when required.The visitors can directly
interact with the SI-ranked KP-Bot. The robot is equipped with facilities to
fix appointment with officers, provide them with identity cards and also open
new files based on their grievances.<o:p></o:p></span></div>
<div style="-webkit-text-stroke-width: 0px; box-sizing: border-box; font-variant-caps: normal; font-variant-ligatures: normal; margin-bottom: .0001pt; margin: 0cm; orphans: 2; overflow-wrap: break-word; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">Just like other police officers, the RoboCop is capable of
identifying higher officials and greet them with a salute.<o:p></o:p></span></div>
<div style="-webkit-text-stroke-width: 0px; box-sizing: border-box; font-variant-caps: normal; font-variant-ligatures: normal; margin-bottom: .0001pt; margin: 0cm; orphans: 2; overflow-wrap: break-word; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">Its duties would include identifying and guiding a visitor to the
concerned department. It would also enquire about the details of the visitors
and record their complaints.<o:p></o:p></span></div>
<div style="-webkit-text-stroke-width: 0px; box-sizing: border-box; font-variant-caps: normal; font-variant-ligatures: normal; margin-bottom: .0001pt; margin: 0cm; orphans: 2; overflow-wrap: break-word; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">There are plans to update the RoboCop with more features like face
recognition and explosive detection.<o:p></o:p></span></div>
<div style="-webkit-text-stroke-width: 0px; box-sizing: border-box; font-variant-caps: normal; font-variant-ligatures: normal; margin-bottom: .0001pt; margin: 0cm; orphans: 2; overflow-wrap: break-word; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; widows: 2; word-spacing: 0px;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">Last year State Police Chief had announced during the Cocoon Cyber
Conference that robots will be introduced in the police force. Following the
announcement the project was realised by state police cyberdome and a Kochi
based start-up, Asimov.<o:p></o:p></span></div>
<div style="margin-bottom: .0001pt; margin: 0cm; text-align: justify;">
<br /></div>
<div style="margin-bottom: .0001pt; margin: 0cm; text-align: justify;">
<span style="color: black; font-family: "Bookman Old Style","serif"; font-size: 14.0pt;">Courtesy
: India Today</span><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt;"><o:p></o:p></span></div>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-77092782541475930052019-02-19T01:19:00.002-08:002019-02-19T01:19:13.057-08:00Prevent Credit Card Fraud<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<span style="color: #3c3c3c; font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">The incidents of online credit card
fraud rose day by day and cyber security experts are urging the customers to
take simple measures to protect their money. The rising popularity of online
shopping and on line transactions more and more people are availing these
services without thinking much of security and the cyber criminals are
targeting such no wise users.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<span style="color: #3c3c3c; font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Fraudsters acquire credit card
details, make a small purchase to ensure the card will work and then start
making much bigger purchases until the scam is uncovered and the card is
cancelled.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; text-align: justify;">
<span style="color: #3c3c3c; font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Follow some simple security measures
will protect you from such fraud.<o:p></o:p></span></div>
<ul type="disc">
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Look
for “https” not “http” when online: If you’re using your credit card
details online, look for “https://” at the beginning of the website
address instead of the previously prevalent “http://”. <o:p></o:p></span></li>
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Review
your statements. Go through your statements carefully, and if you spot a
suspicious transaction, report it immediately.<o:p></o:p></span></li>
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Don’t
provide details via email or via phone. Never provide your credit card or
bank account details via email or phone. No bank will ask you the details
of your credit card and no reputable seller deals this way.<o:p></o:p></span></li>
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Check
your credit. Obtain a credit report to verify that your details have not
been used to open any fraudulent accounts.<o:p></o:p></span></li>
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Never
allow your card to swipe in a swiping machine kept away from your vicinity
in a POS. Ask the person to swipe it in front of you. Fraudsters use
skimmers to clone your card.<o:p></o:p></span></li>
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Never
disclose your PIN to anybody even to your near and dear.<o:p></o:p></span></li>
<li class="MsoNormal" style="color: #3c3c3c; line-height: normal; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify;"><span style="font-family: "Arial","sans-serif"; font-size: 13.5pt; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">Do
not allow anybody to use your smart phone. They can install a spy app in
your smart phone and obtain all the details from your phone including
OTPs.<o:p></o:p></span></li>
</ul>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-10057238980686572762019-01-29T00:49:00.000-08:002019-02-04T03:24:11.127-08:00Tips for safe e-mailing<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; mso-outline-level: 1; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: 7.85pt; text-align: justify;">
<span style="font-family: Verdana, sans-serif; font-size: 12.0pt;"><b>E-mail or
electronic mail is one of the quickest medium of communication. Most of us have
our personal or official e-mail Ids. We can send not only simple text but also
files, pictures, videos etc as an attachment with an email. <span style="mso-spacerun: yes;"> </span>However, it’s important that your personal
information remains secure and safe and that you aren’t open to viruses or
hackers.<o:p></o:p></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: 7.85pt; text-align: justify;">
<span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 12.0pt;">Some
precautions to be taken for safe e-mailing. Few of them are described below:</span><span style="font-size: 12.0pt;"><o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 10.0pt;"><span style="mso-list: Ignore;">·<span style="font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; line-height: normal;">
</span></span></span><!--[endif]--><span style="font-size: 12.0pt;">Your
password is your master key. Do not share your email password with anybody and
make it a habit to change your password regularly.<o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 10.0pt;"><span style="mso-list: Ignore;">·<span style="font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; line-height: normal;">
</span></span></span><!--[endif]--><span style="font-size: 12.0pt;">Most of
the time, we click on reply button to send a reply to a mail received by you.
Try to avoid the same since hackers use different methods to redirect your mail
to their own mail account. Always compose a new message and type the recipients
email address. If you want to click reply button to send a reply, please check
the e-mail address shown on the address bar. <o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 10.0pt;"><span style="mso-list: Ignore;">·<span style="font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; line-height: normal;">
</span></span></span><!--[endif]--><span style="font-size: 12.0pt;">Don’t
open attachments from anyone you don’t know. It may contain malware, spyware,
virus or Trojan which harm your computer and collects sensitive information.<o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 10.0pt;"><span style="mso-list: Ignore;">·<span style="font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; line-height: normal;">
</span></span></span><!--[endif]--><span style="font-size: 12.0pt;">Always Log
out or sign off from your account once you finished your work<o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 10.0pt;"><span style="mso-list: Ignore;">·<span style="font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; line-height: normal;">
</span></span></span><!--[endif]--><span style="font-size: 12.0pt;">Keep your
personal information personal – don’t share bank or credit card information by
email.<o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="line-height: normal; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif;"><b><span style="font-size: 10.0pt;"><span style="mso-list: Ignore;">·<span style="font-size: 7pt; font-stretch: normal; font-style: normal; font-variant: normal; line-height: normal;">
</span></span></span><!--[endif]--><span style="font-size: 12.0pt;">Make sure
that you have antivirus software installed and keep it up to date.<o:p></o:p></span></b></span></div>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-61996301020572337702019-01-28T00:32:00.000-08:002019-01-28T00:32:03.345-08:00You should watch the online activities of your children<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">It is very much important that you
should keep a close watch on the online activities of your children. There are
lot of cases of Cyber Grooming, Cyber Bullying and Cyber Stalking against
children who are active on Internet. You should make aware them about the traps
in cyber world and safe use of Internet and other online activities like online
gaming, online chatting etc.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Grooming means that an adult is
getting to know and befriending a child with the intention of sexually abusing
it. Grooming doesn’t have to be online, but the internet gives perpetrators the
anonymity to act more freely and access to children who are not under direct parental
supervision. If your children spend more time on online and try to keep their
activities secret or they oppose you when you try to control them, it might be
a clear indication that they are going to be the victim of Cyber grooming.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Cyber bullying or cyber harassment is
a form of bullying or harassment using electronic means.
Cyber bullying and cyber harassment are also known as online bullying. It
has become increasingly common, especially among teenagers. Cyber bullying is
when someone, typically teens, bully or harass others on social media sites.
Harmful bullying behavior can include posting rumors, threats, sexual
remarks, a victims' personal information, or pejorative labels
(i.e., hate speech).Bullying or harassment can be identified by repeated
behavior and intent to harm. Victims may have lower self-esteem,
increased suicidal tendency, and a variety of emotional responses,
including being scared, frustrated, angry, and depressed.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Cyber stalking is a crime in which
the attacker harasses a victim using electronic communication, such as <span style="color: windowtext; text-decoration: none; text-underline: none;">e-mail</span> or <span style="color: windowtext; text-decoration: none; text-underline: none;">instant
messaging</span> (IM), or messages posted to a Web site or a <span style="color: windowtext; text-decoration: none; text-underline: none;">discussion
group</span>. A cyber stalker relies upon the anonymity afforded by the
Internet to allow them to stalk their victim without being detected.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Please instruct your child about
the necessity of safe browsing and protect them from online abuses.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Always educate your children about
the necessity of privacy settings in social media platforms. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Monitor your child’s online
activity always. Install necessary tracking tools in your computer to do so.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">If your system is equipped with a
built in camera or a web cam, always cover it if not in use. You may aware, a
hacker can get into your system and access the camera to record your movements.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Do not allow your children to
install any unwanted software tools or other gaming tools downloaded from
untrustworthy web sites. It may lead to install any spyware on your system and
steal the valuable information from your system.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Do not click any suspicious links
received through e-mail or any other means. It may be a phishing link that may
lead to a false web site that exactly looks like the website you want to
browse.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Always use licensed software.
Pirated software do not provide you enough security.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Always update your software with
latest updates. It is very much necessary to stay secure.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: 14.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;">Remember, your child’s safety is in
your hands. Educate them. <o:p></o:p></span></div>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-91111884933116732172019-01-23T02:20:00.000-08:002019-02-04T03:32:32.572-08:00Stay Safe on Social Media<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<span style="color: blue; font-family: Verdana, sans-serif; font-size: large;">Social Media is one of the most popular medium of
communication today. We are using social media sites like Face book, Twitter, LinkedIn
etc. and such platforms are one of the perfect targets for scams.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><br /></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<span style="color: blue; font-family: Verdana, sans-serif; font-size: large;">Here are some of the basic precautions to stay safe
on social media:<span style="color: blue;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">1.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Use a strong password. The
longer it is, the more secure it will be.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">2.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Use a different password for each of
your social media accounts.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">3.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Set up your security answers.
This option is available for most social media sites.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">4.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">If you have social media apps on your
phone, be sure to password protect your device.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">5.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Be selective with friend requests. If
you don’t know the person, don’t accept their request. It could be a fake
account.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">6.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Click links with caution.
Social media accounts are regularly hacked. Look out for language
or content that does not sound like something your friend would post.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">7.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Be careful about what you share.
Don’t reveal sensitive personal information ie: home address, financial
information, phone number etc. The more you post the easier it is to have
your identity stolen.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">8.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Become familiar with the privacy
policies of the social media channels you use and customize your privacy
settings to control who sees what.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: blue; font-family: Verdana, sans-serif; font-size: large;"><span style="color: #191919; font-family: "bookman old style" , serif;"><span style="mso-list: Ignore;">9.<span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span></span></span><!--[endif]--><span style="color: #191919; font-family: "bookman old style" , serif;">Protect your computer by installing
antivirus software to safeguard. Also ensure that your browser, operating
system, and software are kept up to date.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 0cm; mso-list: l0 level1 lfo1; mso-margin-top-alt: auto; tab-stops: list 18.0pt; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: Verdana, sans-serif; font-size: large;"><span style="color: blue;"><span style="color: #191919;"><span style="mso-list: Ignore;"><span style="font-family: verdana, sans-serif; font-size: x-small;">10.</span><span style="font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"><span style="font-family: verdana, sans-serif; font-size: x-small;"> </span><span style="font-family: Verdana, sans-serif;"> </span></span></span></span><!--[endif]--></span><span style="color: #191919;"><span style="font-family: Verdana, sans-serif;">Finally, Remember to log off when
you’re done.</span><span style="font-family: verdana, sans-serif;"><o:p></o:p></span></span></span></div>
<div style="text-align: justify;">
<br /></div>
</div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-87937014709231214452019-01-14T03:43:00.004-08:002019-02-04T03:30:11.112-08:00Stay secure on Cyber World: Few Tips<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; vertical-align: baseline;">
<br /></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">There are few steps given below to browse secure on Internet. Following
them strictly will reduce the risk of losing your valuable information.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">1. Always remember that somebody is watching your activities. You are an
attractive target to hackers who sniff around the net. Don’t think that ‘I am
Safe”<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">2. Physical security of your device is as important as logical security.
Please lock your systems (Desktops, Laptops and Smart Phones etc.) so that no
one can use it while you are away. If you are using some external devices like
external hard disks, flash drives etc. please do not keep it unattended. Keep
them in a safe locker.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">3. Always follow the secure password policy. Use a strong mix of
characters to form your password. Don’t use same password for multiple sites.
Do not write your password anywhere just to remember it and sharing your
passwords with others will harm you. People use easy to guess and similar
passwords for the simple reason that they have too many and they can be hard to
remember. But remember, it is one of the biggest security mistakes. An ideal
password needs to be hard to guess. It should be long, have capitals, special
characters and it should not be related to something someone might know about
you (e.g: date of birth), <o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">4. Do not click on email links or attachments you do not recognise. If
it’s unexpected or suspicious for any reason, don’t click on it. Double check
the URL of the website the link takes you to: bad actors will often take
advantage of spelling mistakes to direct you to a harmful domain. Malware – a
malicious piece of code - could get on your machine when you open an attachment
or link.<o:p></o:p></span></div>
<div class="MsoNormal" style="-webkit-text-stroke-width: 0px; background: white; box-sizing: inherit; font-stretch: inherit; font-variant-caps: normal; font-variant-east-asian: inherit; font-variant-ligatures: normal; font-variant-numeric: inherit; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; orphans: 2; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; vertical-align: baseline; widows: 2; word-spacing: 0px;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">Clicking on unknown links may lead to
“phishing” sites that harvest usernames and passwords.<o:p></o:p></span></div>
<div class="MsoNormal" style="-webkit-text-stroke-width: 0px; background: white; box-sizing: inherit; font-stretch: inherit; font-variant-caps: normal; font-variant-east-asian: inherit; font-variant-ligatures: normal; font-variant-numeric: inherit; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; orphans: 2; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; vertical-align: baseline; widows: 2; word-spacing: 0px;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">Pay attention to suspect emails as more and
more hackers are getting sophisticated in the way they write them. <o:p></o:p></span></div>
<div class="MsoNormal" style="-webkit-text-stroke-width: 0px; background: white; box-sizing: inherit; font-stretch: inherit; font-variant-caps: normal; font-variant-east-asian: inherit; font-variant-ligatures: normal; font-variant-numeric: inherit; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; orphans: 2; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; vertical-align: baseline; widows: 2; word-spacing: 0px;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">It may be easy to avoid the email which claims
you have won lottery. <o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">5. Hackers can harvest usernames and password using fake WebPages
designed to look like the ones you use, such as your bank or your Face book
account.<o:p></o:p></span></div>
<div class="MsoNormal" style="-webkit-text-stroke-width: 0px; background: white; box-sizing: inherit; font-stretch: inherit; font-variant-caps: normal; font-variant-east-asian: inherit; font-variant-ligatures: normal; font-variant-numeric: inherit; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; orphans: 2; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; vertical-align: baseline; widows: 2; word-spacing: 0px;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">You put your username and password in and in
real-time while you are doing that, they are doing the same on your banking
page. They are not storing it for later but robbing you real time. Hence sensitive
browsing, such as banking or shopping, should only be done on a device that
belongs to you, on a network that you trust. Whether it’s a friend’s phone, a
public computer, or a cafe’s free Wi-Fi—your data could be copied or stolen.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">6. Beware of sharing sensitive information such as your vacation plan,
your work details etc. on social platforms. Criminals can befriend you and
easily gain access to a shocking amount of information<o:p></o:p></span></div>
<div class="MsoNormal" style="-webkit-text-stroke-width: 0px; background: white; box-sizing: inherit; font-stretch: inherit; font-variant-caps: normal; font-variant-east-asian: inherit; font-variant-ligatures: normal; font-variant-numeric: inherit; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; orphans: 2; text-align: justify; text-align: start; text-decoration-color: initial; text-decoration-style: initial; vertical-align: baseline; widows: 2; word-spacing: 0px;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">7. Beware of Pop-ups. If we are generally
aware about suspicious attachments, we might not think that closing a pop-up
window might make us vulnerable to hacking. When you are shopping online for
instance, and get an ad pop up, clicking and closing on one of those might
actually install a malicious piece of code on your machine that may lead to
steal your sensitive information by hackers.<o:p></o:p></span></div>
<div class="MsoNormal" style="background: white; line-height: 150%; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 12.0pt; mso-outline-level: 3; text-align: justify; vertical-align: baseline;">
<span style="color: #333333; font-family: Verdana, sans-serif; font-size: large; line-height: 150%;">8. Back up your data regularly, and make sure your anti-virus software is
always up to date.<o:p></o:p></span></div>
<div style="text-align: justify;">
<br /></div>
</div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-14399889842057353262019-01-14T00:34:00.001-08:002019-02-04T03:27:50.181-08:00Ministry of Home Affairs, Government of India released an e-booklet titled ” A Hand Book for Adolescents / Students on Cyber Safety”<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt;">
<br /></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;">The Ministry of Home Affairs, Government of India has come out with a
booklet on cyber safety for teenagers titled “A Hand Book for Adolescents /
Students on Cyber Safety” keeping in mind the increased use of smart phones and
other internet of things (IoT) by teenagers and students and the various
incidents of cyber bullying, cyber grooming, email fraud and dangerous games
like blue whale etc.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;"><span style="mso-spacerun: yes;"> </span>The booklet also explains various
kinds of cyber crimes like identity theft, job fraud, email spoofing and how
children can overcome them.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;">It advises teenagers against accepting friend requests from unknown
people on social media.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;">The Home Ministry last year set up a Cyber and Information Security
division to check the rapid growth of cyber crimes and cyber threats. It now
aims to introduce the cyber crime handbook in schools as a component of the
school curriculum.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;">This hand book also describes about online gaming frauds, online
transaction frauds and safeguard for social networking profiles etc.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;">The 38 page booklet that is available online on the ministries website
is prepared in consultation with cyber crime experts. It is a good steps towards
making awareness to the teenagers and students about the traps in the internet
world and how to be secure.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="background: white; line-height: normal; margin-bottom: 11.25pt; text-align: justify;">
<span style="color: #333333;"><span style="font-family: Verdana, sans-serif; font-size: large;">This hand book is beneficial for others also.<o:p></o:p></span></span></div>
<div style="text-align: justify;">
<br /></div>
</div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-34585103046903637132019-01-13T22:14:00.001-08:002019-02-04T03:26:49.537-08:00More about Passwords<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<br />
<br />
<div style="text-align: justify;">
<span style="font-family: Verdana, sans-serif; font-size: large;">Make your password complex but easy to remember.</span></div>
<br />
<div style="text-align: justify;">
<span style="font-size: large;"><span style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<span style="font-family: Verdana, sans-serif; font-size: large;"><div style="text-align: justify;">
Use mnemonics.</div>
</span><br />
<br />
<div style="text-align: justify;">
<span style="font-size: large;"><span style="font-family: Verdana, sans-serif;"><br /></span></span></div>
<span style="font-family: Verdana, sans-serif; font-size: large;"><div style="text-align: justify;">
Eg: - if your password is iloveyou@123 write it as 1l0v3y0u@123 (here <u>i is replaced with 1</u>, <u>o is replaced with 0</u> and <u>e is replaced with 3</u> so that it could be hard to break by a hacker and easy to remember by you. Otherwise iloveyou@123 is an easily breakable password.)</div>
</span><br />
<div style="text-align: justify;">
<span style="font-size: large;"><br /></span>
</div>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-14969583492605986402019-01-12T23:15:00.001-08:002019-02-04T03:25:43.008-08:00Security tip of the day <div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<b><u><br /></u></b>
<div style="text-align: justify;">
<b><u><span style="font-family: Verdana, sans-serif; font-size: large;">Passwords are just like your locker key. Do not share it with anyone.</span></u></b></div>
<br />
<div style="text-align: justify;">
<span style="font-family: Verdana, sans-serif; font-size: large;"> Keep the password little bit complex by using upper and lower case letters, numbers and special characters.</span></div>
<div style="text-align: justify;">
<span style="font-family: Verdana, sans-serif; font-size: large;">Do not use dictionary words and something that related to you.</span></div>
<div style="text-align: justify;">
<span style="font-family: Verdana, sans-serif; font-size: large;">Change your password regularly.</span></div>
<div style="text-align: justify;">
<span style="font-family: Verdana, sans-serif; font-size: large;">Do not keep it in writing, just remember it.</span></div>
<br /></div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-13111206467539565212013-09-26T03:54:00.000-07:002013-09-26T03:54:20.108-07:00Bitten by the Google bug?<div dir="ltr" style="text-align: left;" trbidi="on">
The new edition of Dataquest reports a bug in the Google accounts: The report is reproduced below:<br />
<br />
<br />
It can be very embarassing to type in the wrong window while using Gtalk, especially with your colleagues. This time, if your messages gets delivered to your co-workers, you can say it's not your fault. Many Google acocounts have been affected by a bug today.<br />
<br />
<br />
<br />
<br />
No one has figured out the pattern in the message and it seems like G-talk selects random people and sends your messages to them.<br />
<br />
<br />
<br />
According to the update on Google app board, Google is looking into this glitch. The update read "The problem with Gmail should be resolved. We apologise for the inconvenience and thank you for your patience and support."<br />
<br />
<br />
<br />
Earlier, there was a problem with email delivery. They were apparently triggered by a dual network failure. The Times Of India reported Sabrina Farmer, Senior Site Reliability Engineering Manager say, "This is a very rare event in which two separate redundant network paths, both stop working at the same time."<br />
<br />
<br />
<br />
We suggest all the users of Google Talk and Google Hangout to be very careful about sending chats and messages. If you don't want your boss to read you bitching about him to a friend, don't do that over chat.<br />
<br />
</div>
Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-75434549850650065392010-11-13T23:16:00.000-08:002010-11-13T23:23:12.682-08:00Google's World's Largest Cloud Computing Centre to be setup in Hyderabad, India<div align="justify">Google announced its world's largest cloud computing centre would be set up in Hyderabad, India to attend to both global and Indian operations. Cloud computing is known as the next big thing in the web. In a cloud computing environment, users instead of running applications on their desktops, access the same applications from the large data centre called clouds. Cloud computing is <a title="Web" href="http://en.wikipedia.org/wiki/Web"><span style="color:#000000;">Web</span></a><span style="color:#000000;">-based </span><a class="mw-redirect" title="Processing" href="http://en.wikipedia.org/wiki/Processing"><span style="color:#000000;">processing</span></a>, <span style="color:#000000;">whereby shared resources, software, and information are provided to </span><a title="Computer" href="http://en.wikipedia.org/wiki/Computer"><span style="color:#000000;">computers</span></a><span style="color:#000000;"> and other devices (such as </span><a class="mw-redirect" title="Smartphones" href="http://en.wikipedia.org/wiki/Smartphones"><span style="color:#000000;">smartphones</span></a><span style="color:#000000;">) on demand over the </span><a title="Internet" href="http://en.wikipedia.org/wiki/Internet"><span style="color:#000000;">Internet</span></a><span style="color:#000000;">.</span></div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-39620855583657796932010-10-06T03:25:00.001-07:002010-10-06T03:25:50.461-07:00BlackBerry<div align="justify">Recently, BlackBerry is in news. Here we are going to discuss what BlackBerry means.<br />BlackBerry is a line of mobile e-mail and smart phone devices developed and designed by Canadian company Research In Motion (RIM) since 1996.<br />BlackBerry functions as a personal digital assistant with address book, calendar and to-do list capabilities. It also functions as a portable media player with support for music and video playback and camera picture and video capabilities. BlackBerry is primarily known for its ability to send and receive (push) Internet e-mail wherever mobile network service coverage is present, or through Wi-Fi connectivity. BlackBerry is mainly a messaging phone with the largest array of messaging features in a smartphone today. This includes auto-text, auto-correct, text prediction, support for many languages, keyboard shortcuts, text emoticons, push email, push Facebook and MySpace notifications, push EBay notifications, push instant messaging with BlackBerry Messenger, Google Messenger, ICQ, Windows Live Messenger and Yahoo Messenger; threaded text messaging and a customizable indicator light near the top right of all Blackberry devices. All notifications and conversations from applications are shown in a unified messaging application which third party applications can access also. Many of these applications would have to be running in the background of other phones to be used. BlackBerry's push gives BlackBerry devices their renowned battery life. All data on the phone is compressed through BlackBerry Internet Service (BIS). BlackBerry has about two thirds less data transfer than any other smart phone, while supplying the same information.<br />BlackBerry commands a 20.8% share of worldwide smartphone sales, making it the second most popular platform after Nokia's Symbian OS. The consumer BlackBerry Internet Service is available in 91 countries worldwide on over 500 mobile service operators using various mobile technologies.<br />The first BlackBerry device was introduced in 1999 as a two-way pager. In 2002, the more commonly known smart phone BlackBerry was released, which supports push e-mail, mobile telephone, text messaging, Internet faxing, Web browsing and other wireless information services. It is an example of a convergent device. </div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-30000671949160121562010-10-04T03:36:00.000-07:002010-10-04T03:38:37.336-07:00Cyber Attacks<div align="justify"><span style="font-family:arial;"><strong>Cyber attacks are the newest form of warfare!! It is true. An article published in The Hindu dated 04/10/2010 by Mr. Peter Beaumont confirms this. The article says an attack aimed at an Iranian nuclear plant and a recently revealed 2008 incident at a US base show the spread of cyber weapons. The gist of the article is reproduced below:<br /><br />A deliberate computer worm attack was happened in the computer system of the U.S military's central command which would take 14 months to eradicate. The Modus Operandi was, worm infected memory sticks were scattered in the bathroom at a military base of U.S with a hope in the human error. Somebody picked up the memory stick and used in the computer system which resulted in infection of worm to the computer network.<br /><br />Like wise an attack of worm has happened in an Iranian nuclear reactor which delayed the commissioning of the reactor.<br /><br />The full story is available in The Hindu daily, dated 04th October 2010. </strong></span></div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-70382790541826656602010-07-08T04:48:00.000-07:002010-07-08T04:50:42.990-07:00CARD SKIMMERS<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZemenHbwlHTVjvMhUF2NxGtS0XyHV7ygkTe31WeUhrNHxwiJZUR_T3I15ylBigxPnyOTWVdp2pH4D0rqK83oT5bxhgk5QZqbNJzmCPwlBB7808Ldoyqy6Y_b89rZqffT0ANNIBTVRYko/s1600/skimmer.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 95px; FLOAT: left; HEIGHT: 138px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5491501270153085650" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZemenHbwlHTVjvMhUF2NxGtS0XyHV7ygkTe31WeUhrNHxwiJZUR_T3I15ylBigxPnyOTWVdp2pH4D0rqK83oT5bxhgk5QZqbNJzmCPwlBB7808Ldoyqy6Y_b89rZqffT0ANNIBTVRYko/s320/skimmer.jpg" /></a><br /><div align="justify">A card skimmer is a device which is designed to steal information from a card with a magnetic strip, classically a credit card, when the card is used in a legitimate financial transaction. Once collected on the device, the skimmer can be used to make a clone of the card which can be used for fraudulent purposes, or the collected information can be utilized for online and over the phone transactions which do not require a physical credit card, only the information on the card. There are several ways in which a card skimmer can be used. Some skimmers are designed as standalone units through which a card must be swiped. The second type of skimmer is a small electronic device which attaches to a credit card terminal or automated teller machine (ATM). In this case, every time a card is swiped or inserted, the skimmer gathers the user's information, and it may be attached to a device which logs keystrokes to collect the personal identity numbers (PINs) of people who use the terminal.<br />People can protect themselves from credit card skimmers in a number of ways. If a credit card is taken by someone to be run, the card holder can ask to watch the process. Most credit card terminals are kept in plain view, making it easy for people to see if their cards are run twice, or if there is anything unusual about the way in which the card is handled. When asked to enter a PIN, people should also get into the habit of covering their hands while they enter the number, to make it harder to collect the number with the use of a camera or observation.<br />Standalone credit card terminals with card skimmers may look or behave in a slightly unusual way. For example, the area to insert the card may be loose or crooked, indicating that it has been moved, or that a card skimmer has been attached over the actual area of insertion. People who regularly use the same terminal may also want to note changes in the configuration, which could indicate that a skimmer is being used. Card skimmers are also often accompanied by cameras to log PINs. </div><br /><div align="justify"></div><br /><div align="justify"></div><br /><div align="justify"></div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-26975960011382450312010-05-04T01:41:00.000-07:002010-05-04T01:42:29.214-07:00Six arrested for credit card scam in Kerala<div align="justify">An international gang of credit card fraudsters has been arrested by Kerala Police. These fraudsters had purchased gold ornaments from a shop and later it was found that the credit cards used were fake ones.<br />The gang imported blank credit cards from China and embossed credit card numbers on these blank credit cards using Chinese punching machine. They collected the details of credit cards of different people from ATM booths through skimmer, through hacking and from foreign sources and wrote the details into the new credit cards made by them. Using these credit cards, they purchased gold worth of RS 2.75 lakhs using different credit cards from a gold ornament shop in Kannur district in Kerala.</div><div align="justify"> </div><div align="justify">Source : <a href="http://www.keralapolice.org/">www.keralapolice.org</a> (The official website of Kerala Police)</div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-69074640648196125952010-04-01T03:28:00.000-07:002010-04-01T03:29:21.842-07:00ZOMBIE<div align="justify"><strong>zombie computer or often called Zombie is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. Most owners of zombie computers are unaware that their system is being used in this way. </strong></div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-62073562900098882952010-04-01T03:23:00.000-07:002010-04-01T03:24:08.745-07:00OPEN PROXY SERVERS<div align="justify">In computer networks, a proxy server is a server computer system that acts as an intermediary for requests from client computer systems seeking resources from other servers. A client connects to the proxy server, requesting some service available from a different server. The proxy server evaluates the request according to its filtering rules. A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.<br />An open proxy is a proxy server that is accessible by any Internet user. With an open proxy, however, any user on the Internet is able to use this forwarding service.<br />An open proxy allows a user to conceal his IP address and thereby help preserve his anonymity and maintain his security while browsing the Web or using other Internet services.<br />It is possible for a computer to run as an open proxy server without the computer's owner knowing this. This can result from misconfiguration of proxy software running on the computer, or from infection with malware (viruses, trojans or worms) designed for this purpose.. If it is caused by malware, the infected computer is known as a zombie computer.<br />There are hundreds of thousands of open proxies online. Running an open proxy is a high risk for the server operator; providing an anonymous proxy server can cause real legal troubles to the owner. Such services are frequently used to break into foreign computer systems, child pornography is usually consumed through proxies, and illegal content is likely to be spread through such proxies. Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them. </div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com4tag:blogger.com,1999:blog-1374966705400009653.post-17225204507123324842010-03-03T04:17:00.000-08:002010-03-03T04:18:15.379-08:00Credit Card Fraud Prevention Tips1. Try not to let your credit card out of your sight whenever possible.<br />2. Be very careful to whom you give your credit card. Never give your credit card info out when you receive a phone call. Legitimate companies don't call you to ask for a credit card number over the phone.<br />3. Never respond to emails that request you provide your credit card info via email -- and don't ever respond to emails that ask you to go to a website to verify personal (and credit card) information. These are called 'phishing' scams.<br />4. Never provide your credit card information on a website that is not a secure site.<br />5. Sign your credit cards as soon as you receive them.<br />6. Don't write your PIN number on your credit card -- or have it anywhere near your credit card.<br />7. Never leave your credit cards or receipts lying around.<br />8. Shield your credit card number so that others around you can't copy it or capture it on a cell phone or other camera.<br />9. Keep a list in a secure place with all of your account numbers and expiration dates, as well as the phone number and address of each bank that has issued you a credit card. Keep this list updated each time you get a new credit card.<br />10. Only carry around credit cards that you absolutely need. Don't carry around extra credit cards that you rarely use.<br />11. Open credit card bills promptly and make sure there are no bogus charges. Treat your credit card bill like your checking account -- reconcile it monthly. Save your receipts so you can compare them with your monthly bills.<br />12. Never write your credit card account number in a public place (such as on a postcard or so that it shows through the envelope payment window).<br />13. Never lend a credit card to anyone else.<br />14. If you change your residence, notify your credit card issuers in advance of your change of address.Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-31871074413135771142009-11-23T04:31:00.000-08:002009-11-23T04:33:22.049-08:00TWO ARRESTED FOR FORWARDING FAKE E-MAIL<div align="justify"><br />The Kerala Police Cyber Cell arrested two youths on charges of circulating an e-mail, which contained a picture of a palatial mansion, wrongly attributed to CPM Politburo member and State Secretary Mr. Pinarayi Vijayan. The arrested were Manoj, employed in Nigeria is on leave and now in Kerala and Karthik, a student. They were booked under Section 66 (A) of the I T Act 2008, which said sending offensive messages through electronic means was punishable. This is the first ever case registered in Kerala under the amended Information Technology Act. Now the Kerala Police Cyber Cell is trying to find out the source of the mail. The duo were arrested on charges of forwarding the mail after adding some captions and forwarded to nearly 3 lakhs addresses. These arrests would send a strong message to all those who forward spontaneously malevolent e-mails to others, said Cyber Cell DySP.<br /><br /><strong><span style="color:#cc0000;">Courtsey : The Indian Express daily dated 23rd November 2009</span></strong></div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-73009988644927340902009-11-19T04:34:00.000-08:002009-11-19T04:35:02.592-08:00Salami Attacks<p align="justify"><span style="color:#ff0000;">An attack on a computer network which involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access; for example, a file that holds their bank account details. A typical salami attack would add a small amount to a debit that the account holder would not check, such as a debit that represented a service charge. This small increase in debit (often a few pence or a few cents) would then be credited to the perpetrator's bank account. An unsophisticated banking system, which just checked that debits and credits matched, would be unable to detect this type of fraud. The name ‘salami attack’ comes from the fact that salami is cut into very thin slices. It is also known as salami shaving.</span></p>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-42916519063507276152009-11-19T04:18:00.000-08:002009-11-19T04:24:45.763-08:00Cyber Arms RaceA report published in the Times of India daily, New Delhi edition on 19/11/2009 says many countries are already in cyber arms race. The news follows:<br /><br />Warning of a cyber arms race, a leading security firm said that China, France, Israel, Russia and the United States were among countries that have developed "cyber weapons". Several nations around the world are actively engaged in cyberwar-like preparations and attacks. Today the weapons are not nuclear, but virtual, and everyone must adapt to these threats.<br />The California based McAfee, in its fifth annual Virtual Criminology Report, said China, France, Israel, Russia and the United States have developed advanced offensive cyber capabilities. Cyber attacks with political objectives were on the rise and the critical infrastructure was vulnerable, in part because of its reliance on the Internet.Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-80884495462258202932009-11-18T00:02:00.000-08:002009-11-18T00:06:28.337-08:00VISHINGWe are all familiar with phishing in cyber crime scenario. But what is vishing? It is nothing but another method of cyber crime technique to gather personal information also known as voice phishing. Vishing is tha act of leveraging a new technology called VoIP or Voice over Internet Protocol in using the telephone system to falsely claim to be a legitimate enterprise in an attempt to scam users into disclosing personal information. Government organisations, financial institutions etc. can be targets of Vishing.Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-69705561833338282602009-11-17T23:39:00.000-08:002009-11-17T23:40:46.506-08:00Future of email in question????<div align="justify">The Times of India today published an article which clearly describes the future of email is in trouble. The gist of the report is given below.<br /><br />With more and more teenagers switching to instant messaging and social networking sites for speedy communication, email could be extinct within a decade, says a new report. Although inboxes are still filling up daily all over the world, experts believe emails are dying out because they are too slow, too inconvenient and simply not fashionable any more.<br /><br />The study conducted by TalkTalk in Britain found only 51% of the Britons in their teens or early twenties using email as their first means of communication. Experts reckons people prefer the "one and done" style of message, which is where a short message can be sent to all contacts at the same time. The study also reveals that email has already become "grey mail" with the most devoted users are middle aged or old aged. 98% of people in the age group of 65 or more and 96% of those aged 45-64 are regularly using email as their mode of communication in Briton.</div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com0tag:blogger.com,1999:blog-1374966705400009653.post-75897951743255072962009-11-12T03:04:00.000-08:002009-11-12T03:05:56.965-08:00What is a GPS? How does it work?<div align="justify"> The Global Positioning System (GPS) tells you where you are on Earth. It's eleven o'clock ... do you know where your kids are? Would you like to? One way to track them would be to have a GPS receiver installed in the car! The GPS, or Global Positioning System, is one of the hottest technologies around, and no wonder. Consider these diverse uses:<br />Minnesota scientists use GPS to study movements and feeding habits of deer.<br />Surveyors used GPS to measure how the buildings shifted after the bombing in Oklahoma City .<br />GPS help settle property disputes between land owners.<br />Marine archaeologists use GPS to guide research vessels hunting for shipwrecks.<br />GPS data has revealed that Mt. Everest is getting taller!<br /><br />GPS answers five questions simultaneously:<br />"Where am I?"<br />"Where am I going?"<br />"Where are you?"<br />"What's the best way to get there?<br />"When will I get there?"<br />GPS is the only system today that can show your exact position on the Earth anytime, in any weather, no matter where you are!<br /><br />Development:Like so many other high-tech developments, GPS was designed by the U. S. military. The concept started in the late '60s but the first satellite wasn't launched until February 1978. In 1989 the Magellan Corp. introduced the first hand-held GPS receiver. In 1992 GPS was used in Operation Desert Storm. On March 1996 the President decided to make GPS free for civilian users.<br /> <br />System Description:GPS has three 'segments':<br />The space segment now consists of 28 satellites, each in its own orbit about 11,000 nautical miles above the Earth.<br />The user segment consists of receivers, which you can hold in your hand or mount in your car.<br />The control segment consists of ground stations (five of them, located around the world) that make sure the satellites are working properly.<br /> Civilian Use: At first, the military did not want to let civilians use GPS, fearing that smugglers, terrorists, or hostile forces would use it. Finally, bowing to pressure from the companies that built the equipment, The Defense Department made GPS available for non-military purposes, with some restrictions. On May 1, 2000, President Clinton lifted the restrictions, and announced that the option to degrade civil GPS signals during emergencies would be phased out by 2010. The federal government is committed to providing GPS technology for peaceful uses on a worldwide basis, free of charge.</div>Unnikrishnanhttp://www.blogger.com/profile/10676341115211760307noreply@blogger.com1