Featured Post Today
print this page
Latest Post
Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Best Way To Get Your Password: Social Engineering

In 2003, Ebay users received an email that their account were about to be suspended unless they update their credit card information. The attacker had set up a similar looking website in order to trick the users that they were accessing the legitimate website. A number of people had their credit card information compromised. Information were obtained without the hacker even trying to crack Ebay's servers.

Hello there buddy. I just need your credit card information.

In 2012, a hacker in a devcon event tried to hack a Wal-mart executive in just 20 minutes. He got every detailed information about the executive within that time span just by using his social engineering skills and a little bit of technical tools of the trade. The executive was compromised when he was called and he gave out all the information that the hacker needed. Computer OS version, Web Browser version and Anti Virus Software. Finally he was asked to fill out an online survey form which completed the exploit. This was done at devcon with hundreds of people watching the attack as it happened.


Yes Sir, please click that link. Thank you very much. We're done.

These incidents were made by a hacker which had no direct access to the system's server. This method is by far, easier and more practical because it gave the hacker a broader access to the victim's profile which may directly relate to how he secures his/her online identity. Cracking a system with hacking tools may take time and may not even be successful at worst.

One of the greatest hackers of all time, Kevin Mitnick (who later turned into a security consultant) was, at one time, the most wanted man in America. He gained unauthorized access to various network and systems by using his social engineering skills. He believed that the weakest link in computer security is the human element.

In order to protect yourself from such attacks, you must first know thy enemy.


Commonly Used Social Engineering Techniques

Phishing
Method of acquiring usernames, passwords, credit card information etc. by sending fraudulent emails to users and redirecting them to a non-legitimate website which may collect personal information from them.

Quid Pro Quo
It means "Something for Something"

  • An attacker calls random numbers at a company, claiming to be calling back from technical support. Eventually this person will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and, in the process, have the user type commands that give the attacker access or launch malware.
  • In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen. Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords
Baiting
This is also known as the physical or the real world Trojan Horse. It uses physical media such as USB, CDs and other removable drives as an attack vector. This kind of attack relies heavily on malware and other malicious codes in order to carry out its goal. This may also trigger a wave of infection, affecting a large number of victims in a short span of time.

Now that we have known thy enemy, we can now protect ourselves from the threat.


Yes we can put him out of work.

How To Protect Yourself From Social Engineering Attacks

Password
  • Create a strong and unique password by using combinations of upper and lowercase letters, characters and numbers. 
  • Do not use easy to guess passwords such as your dog's name or your mothers maiden name.
  • Do not use the same password for multiple sites.
Browser Security
  • Always log out of devices which you do not own.
  • Regularly update your web browsers. They regularly do updates in order to patch malicious exploits.
  • Always look for the HTTPS when logging on websites that require personal information.
  • Do not click on unfamiliar links.
Computer Security
  • Regularly scan your computer for viruses.
  • Do not install any unfamiliar applications which may execute malicious codes on your operating system.
  • Unless you know what you are doing, steer away from pirated software.
  • Do not entrust the security of your computer to strangers.
  • Trust only certified technicians when it comes to your PC's maintenance or repair.
Remember, with a little bit of common sense and technical know-how, you can protect yourself from malicious hackers who exploit the human weakness in order to get personal information for their own gains.

Stay tuned and please like our facebook page in order to receive a daily stream of information.



Reference links:








Computer 101: Binary and Measurement



Introduction

Computers have become one of the important gadgets of our life, most of our daily task heavily rely in this amazing machine. But have you ever wondered how it run and how they measure it? If you are curious on how computer works (even if your profession is not related to IT) then you came to the right blog! In this small article I will explain how computer works in simple but understandable words and explain how they measure it too that even most IT guys don't know yet.

1 comments

Geeky Troll: Scheduler

Introduction


This tutorial will cover a somehow, hidden tools on Microsoft Operating System (Hidden in a way that most users don't know about it), it's called Task Scheduler.

Step 1: Go to Run and type "Task Scheduler"


















1 comments

Geeky Troll Part 1

Introduction


Trolling or simply annoying some people using jokes and pranks. Well you cannot complete your trolling experience without using one of the most used device in the world, the computer. But I will show simple tricks and those tricks that cannot harm someones PC.

Okay Let's start

The shutdown prank

This prank will simply shutdown and display a message when a user clicked the shortcut/program.

Step 1: Right-click in your desktop and Click New--Shortcut






Life of a Gamer

Warning: This is an opinionated post about my personal experience about gaming, you're free to give your reaction but what you will read here is my true experience and opinion about the advantage and disadvantage of a gamer.


Introduction


Console and PC gaming is one of the most popular hobby today, gamers are not just male or teens now, the number of female gamers are increasing gradually. Most non-gamers see this kind of hobby as a useless thing to do, a waste of time and will bring no good to an individual. But if we just look at the brighter side we can see lots of benefits from this hobby (but in moderate state).

0 comments

The 101 Guide to use torrent

Introduction

Most of us already heard about "Torrent", using torrent to download a file is the easiest and most convenient way to download a file, there is no "interrupted download" with torrent, because you download a file piece by piece and when you shutdown your PC you can still resume it the next time you open it, it's also easier to find a software,movie,song or other files (legal or illegal). But many people don't know how to use this amazing software, in this article I will teach you how to use it.

Downloading the software
Bittorrent: http://www.bittorrent.com/downloads/
Utorrent: http://www.utorrent.com/downloads/complete?os=mac

You need to download the software first, there are different torrent engines (I prefer uTorrent), so you can use whatever you want.

0 comments

All about Mario


Brief History

Mario, a name that most kids in our century might not know, the guy who break bricks using his head but will die when he touched a walking or flying turtle. The game was created by Shigeru Miyamoto and Gunpei Yokoi which is also two of the lead developer of Donkey Kong.

Did you know? 
-In Donkey Kong, Mario was known as "Jump Man", he was also a carpenter during that time.
-The name Mario was named after Mario Segale, he was the landlord of Nintendo in america.
-His occupation was later changed to plumber because most of the settings in Mario Bros. is in the sewage system.

Character Design


The whole character of Mario is all because of hardware limitation at that time, large pixel and limited colors gave birth to this well known character. The hat is added instead of hair because a hat is easier to portray than hair during those times. His mustache that made him look like an Italian is added because it is easier to show in the game than a nose. He also have dungarees to make the movement of his arm more noticeable.

0 comments

Protect the Net: Phishing


What is a phishing?

Phishing is a type of hacking where the attacker copy a website that you use in order to acquire information such as email, username and password. An attacker will copy the exact source code of a given page then change on how the data will be transmitted, instead of sending it to the server the webpage will simply log your data and redirect you to the actual site.
0 comments

Do you really know DotA?



A lot of teens are addicted to the popular RTS game called DotA (Defense of the Ancients), but do they know how it started and who are the people involved for creating such epic strategy game?

Aeon of Strife

For we are able to understand its history we need to know where the idea came from. DotA was based on Aeon of Strife, a game mod designed for Starcraft (Another popular game) it was created by Aeon64. When Warcraft III: Reign of Chaos was released Aeon of Strife was ported to ROC because of the limitation of Starcraft engine and it was created by a modder named “Eul”.

Warcraft III: The Frozen Throne

When The Frozen Throne (TFT) was released, Eul made a version called “DotA 2: Thirst for Gamma” for TFT engine, but it wasn’t successful, Eul then disappeared without publicizing the source code.
1 comments
 
Support : Trivia Mania Facebook Fanpage
Copyright © 2011. Trivia Mania - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger