Screen Reader Access   
 
Search for   :     
 
   
  ANNOUNCEMENTS
 
 

Workshop conducted on Cyber Crime by Mr Praveen Kumar Yadav (PGT CS)

31-07-2017 Click Here

If we can defeat them sittinIf we can defeat them sitting at home……who needs to fight with tanks and guns!!!!

 

Cyber Security: - An Alarming Danger

SCHOOL LEVEL WORSHOP HELD ON 31.07.2017

VENUE: KV NO 4, JAIPUR

Session taken by: Sh. PRAVEEN KUMAR YADAV, PGT Computer Science

The session began at 11.00 am in the morning in senior Computer Laboratory. nMrs. Neelam Singh, Principal highlighted the motive and utility of the course in the present era in keeping our data and records safe and secure

1.       ONLINE FRAUDS

2.       VISHING

3.       SPAMMING

4.       PHISHING ATACK

5.       PASSWORDPROTECTIONS

6.       PUBLIC WIFI

7.       MOBILE SECURITY

8.       FACE BOOK SECURTY

9.       WHATSAPP SECURITY

10.   FREE ANTIVIRUS

11.   DUMPSTER DRIVING

12.   RAILWAY PAN NUMBER NO CARE

13.   I.P. ADDRESS &  M.A.C ADDRESS

Praveen Kumar Yadav, PGT- Computer Science of the Vidyalaya explained the term “Cyber Security” in details in the beginning of the course.

      He quoted an example of the sending a fake email to someone by using the email address of others.

      To find out the real sender go in the details- go in the header at the bottom of the mail and you will find the real    

       sender’s used ID in sending the fraud mails. So in case of doubt check the Header in details.

A small discussion was held about “Ransom ware attack”: A Virus attacked recently during the digitalization.

a)      Stay Alert and Aware Alwayes:-

Avoid to open SPAM AND JUNK FOLDER in your emails.

Generally bulk messages are stored in Junk or SPAM folders.

Never Share your OTP or Passwords with any one. In case of any of fraudulent report to the cyber cell located in almost all the cities.

→ Phishing attack: Hackers made same pages of the same appearance’s page of the webs

So check IP Address before proceeding…even they create similar IP Address with minor Changes.

The Hackers can hack your OTP also. So keep a paid anti-virus always in your mobile and PCs.

Mobile APPS downloaded from play store also are having viruses.

So download the apps from the authentic site of concerned departments.

Be very much cautious and aware while handling the banking issues.

Certain fraud mobile numbers are provided to the hackers for certain periods which cannot be detected easily. (Only Awareness Can Save You from Fraudulent)

Although the hackers can be trapped in all the cases in case of proper investigation by cyber-crime cell.

High-level scams also are detected by this ways.

But for the issues of Rs. 2-10 thousands are not attended by the cybercrime departments due to certain reasons. Hence hacker cheat the people in the same range of small transitions.

 

The hackers at first judge you by your talking and symphonies you with their talk, then demand the informations of debit/credit card as it is utmost needed or the card will be blocked. In this case people provide the informations.    

 

So remove AADHAR numbers and other confidential informations from your mobile and social sites.

 

All the informations are well connected with the AADHAR NUMBER SO KEEP IT TOP MOST CONFIDENTIAL.

(Gas Agency, SIM Provider, Bank) What to do next???????????????????

Open WI-FI

SOME OF THE OPEN WI-FI STEAL THE INFORMATIONS FROM YOUR MOBILE AT THE TIME OF USING THE OPEN WI-FI.

SO BE CAUTIOUS AND AVOID TO USE THE OPEN WI-FI

 

PASSWOD PROTECTION

Hacker create “Cyber stock”from your informations available on social sites etc. 

So-

1.     Avoid your status, personal informations, personal photos, and important datas.

2.     Passwords should not contained based on the information of self, family members, relatives antecedents’.

3.     Do not have same passwords at different places.

4.     Keep on changing the passwords after the gap of 30 days

5.     Use the letters of different languages in maintaining the passwords.

6.     Delete spam folders without opening

7.     Click jacking: offers: do not click on such of the offers etc as on your click hackers steal all the informations from you.

8.     Do not use free anti-virus (only AVAST Can be used in some cases)

9.     Do not reply unknown emails.

10. Do not have chatting with strangers

11. Check the URL before log in.

12. Avoid personal photographs as the same can be misused.

13. Avoid uploading AADHAR on mails etc.

14. http (unsecured) informations are can be seen or stolen by hackers

15. https (secured) informations goes to receiver directly.

16. Avoid the document on Gmail. The informations can be used by the hackers.

17. Do not save passwords on mails etc.

18. The subsidiary account with a low balance can be used for online transactions etc.

 

keyloggers

At the time using café or public portals etc. our informations can be stored or misused by the service provider      so Use virtual key board. (Virtual key board is quite safe)

 

Hackers have created similar website of personal banking or income tax departments where we generally put our bank details and the same is hacked and maintained by the hackers.

Identify the fake we/

If the address  is in IP address or as mails.bankpnb etc form it would be fake.

 

Skimming

Hide your credit card and informations etc. form the other at the time of your personal use.

 

IP Address main PC or Mobiles and Mack address (sub connections)

 

In the end vote of thanks was conveyed by Sh. A. A. Rizvi for the valuable and 
 

 

Cyber Security :-

www.infosecawareness.com

Security Book :Download

1) blasze.com

2) Netcraft.com

3) goldharvests.com

4) web.archive.org

5) meghsikshak.in/meghsikshak

6) http://infosecawareness.in/feedback/feedback

 

 

Encrypt Gmail:

The software used for ctrl.org/decrypt

 

Facebook Instant Messenger (GPS) Tracking  

 

How to trace Email :

 

www.cyberforensics.in /onlineemailtracer/index.aspx

http://www.iplocation.com /Free/Emailtracer
http://whoreadme.com

Mailer
emkei.cz


pipl.com
cdac.in
yourname.com
spokeo.com
keywordspy.com

ifread.com Email tracing software

Cyber Crime
http://www.ic3.gov/default.aspx

White hat ,black hat,gray hat,ethical hacker

Avast antivirus registration free

www.xudongz.com/blog

Tor Browser

Bruteforce

kevin mitnick
https://mitnicksecurity.com

Email Spamming http://www.hoax-slayer.com
Attacks : Phishing ,vishing ,spam mails,pop window ,Dumpster driving,

Railway :PAN .of cases

Resources
http://smart-ip.net/check-email
http://mxtoolbox.com/
http://www.iptrackeronline.com
http://readnotify.com
http://www.10minutemail.com
http://hoax-slayer.com
http://www.thehackernews.com
http://www.just-ping.com

Latest Exploits
To hack whatsapp SS7 attack(Paid Attack)
For Anonymity TOR Browser
To Hack WPA2-PSK Wifi    Evil Twin Attack,Fluxion,
To Hack Google/ Yahoo : DNS Poising attack
To hack windows/Unix OS :Metasploit Framework
To hack remotely : DARKCOMET RAT
To hack facebook/Twitter  :Session hijacking
For Ecommerce Hacking : Tampering attack
For payment gateway bypassing :Burp suite exploitation.

Conclusion
The only system is which is truly secure is one which is switched off and unplugged.
 

Types of password attacks

Dictionary attack
Bruteforce attack
Rainbow Table attack
phishing
Social Engineering
Malware infection
offline Cracking (CPUZ and GPUZ)
Guess

Receive sms online Free
http://receive-sms-online.com/
http://www.receive-sms-now.com/
http://www.receivesmsonline.com/
http://www.hs3x.com/
http://www.onverify.com/
http://selloite.com/smsreceiver/
http://smsreceivefree.com/
http://freesmsverification.com/

       

  • Do not save all passwords.
  • Lock your apps
  • Importance of App permission
  • Securing your network
  • Use mobile security App
  • Create Multiple user Account to protect privacy.
  • Prepare and backup your Data.
  • Enable Remote Wipe
  • Track your Lost Device (Ex. Wheres My Droid ,Plan B,Seekdroid Lite,AntiDroidTheft,Prey Antitheft)

 

Top 10 Mobile Security Tools 

Lookout Mobile Security(OS /Android)
Snap Secure Mobile Security(OS /Android/Blackberry)
BullGuard Mobile Security(Windows /Android/BB)
iHound Phone and Mobile Tracking (Phone)
McAfee Wavesecure
Kaspersky Mobile Security
F-Secure Mobile Security((Symbian/Win /Android)
Norton Mobile Security Lite (Andriod)
Avast Mobile Secuirty (Android)
Gadget Trak (OS)

Womens Security Android App

 

VithU App

(Push your power Button twice to instantly send an SOS alert to Contacts)

Circle of 6 App (Thats Lets you connect to up to 6 close Contacts)

I'am Shakti App (Press power Button 5 times in 2 seonds to trigger the app )

Lifetime360FamilyLocatorApp  (Location alert with Family members )

FamyFamily chat and Locator App ) -GPS Locator

Nirbhaya :Be Fearless App (Shake to Alert)

How to Encrypt Email in Gmail 
Steps:
1. Download  Secure Mail for Gmail (by Streak) chrome extension (Automatic the extension will be added)
2. Go to Compose Mail an icon Lock Sign Will Come.
3.Enter To, Sub ,Description the  Click Secured Mail .
4. It will ask for password and password Hint.
5. Send the message.
6. At the receiving end enter the same password to Decry pt  the message.

 
 
Copyright & All Right Reserved to KV No. 4 Jaipur Powered by : Compusys e Solutions