Wednesday, 26 October 2016

Digital India & the Cyber Security Threat

India is gearing up to bring in new encryption and privacy policies to take on growing cybersecurity challenges. It may also amend the existing laws to make cyberspace more secure.

In recent times, India has launched a series of cybersecurity initiatives to digitally empower its citizens and safeguard cyberspace. As the Digital India initiative progresses, cyberattacks have doubled year over year, and Indian businesses and government sites have become more vulnerable.

Global Cooperation

India and the U.S. agreed to cooperate on cybersecurity issues during Prime Minister Narendra Modi’s recent trip to the U.S. As a part of the U.S.-India Cyber Relationship Framework, both countries agreed to share cybersecurity best practices, share threat information on a real-time basis, promote cooperation between law enforcement agencies and encourage collaboration in the field of cybersecurity research. India and the U.S. will also establish joint mechanisms to mitigate cyberthreats and protect internet infrastructure and information.

In 2015, India and the U.K. made a joint statement about cooperation in the cybersecurity space. The two countries agreed to work together to provide professional development and establish a Cyber Security Training Centre of Excellence. The U.K. also agreed to help launch the proposed National Cyber Crime Coordination Centre in India.

India has also entered into cybersecurity cooperation with Malaysia and the European Union. There is a strong case for India to collaborate with more countries, but in the meantime, these partnerships are a great foundation.

Growing Cybersecurity Challenges

Though India has taken a series of steps to harden its security posture, the number of cyberattacks and average cost of a data breach have increased significantly.

The “2016 Cost of Data Breach Study: India” reported that the average total cost of a data breach paid by Indian companies increased by 9.5 percent, while the per capita cost increased by 8.7 percent and the average size of a breach grew by 8.1 percent. Additionally, 41 percent of Indian companies experienced a data breach as a result of a malicious or criminal attack — the most common root cause of a data breach.

India needs a comprehensive cybersecurity law to be prepared to tackle cybersecurity challenges more effectively. Singapore’s proposed Cyber Security Bill will offer a good template. A new cybersecurity law would enable India to protect critical infrastructure more effectively. It would also empower cybersecurity agencies to manage incidents quickly and mandate reporting of significant cybersecurity incidents. Additionally, it would create a stronger cybersecurity culture among businesses and Indian government agencies.

Establishing a national cybersecurity command center, such as the recently announced National Cyber Security Center created by IBM for Australia, would boost India’s cybersecurity defenses, make Indian businesses globally competitive and create a safer Digital India.

Monday, 24 October 2016

Hrithik Roshan's Facebook account hacked, now restored

Star Hrithik Roshan's account on social networking site, Facebook, was hacked but the issue was solved within a day and the actor is back to using it now.

The 42-year-old actor's fans were in a shock when last evening they saw a young guy's photo as the diplay picture of Hrithik's FB profile.
The account started live streaming and more than two thousand five hundred people joined in before realising it wasn't Hrithik but some other guy.
"An enterprising individual managed to hack my page earlier in the day. However the matter has been taken care of and the page is mine once more," Hrithik wrote on his FB page after getting back , Report -zeenews

Sunday, 23 October 2016

Yahoo Hacked: What to Do If Your Account Has Been Compromised

In recent weeks Yahoo has been prompting users to change their passwords and to add a phone number as an extra layer of security and on Thursday the reason for these requests became clear. The tech company announced that a hack could have compromised 500 million users' details.

Change Now
Whether you're one of the 500 million or not, the first step to take should be to change your password and to activate Two Factor Authentication (2FA) and to do both now.
2FA sends a code to a smartphone or cell phone every time you attempt to log into your account and unless said code is entered, along with the password, entry will be denied. It's the simplest, but one of the most effective ways of adding an extra layer of security. If it sounds like a pain, you can set the service to remember a specific computer for up to 30 days without asking for a code.

Microsoft sets up cyber security centre in Gurgaon

The Gurgaon centre, one of the only seven such centres across the world, will serve as a dedicated hub for Microsoft in India and brings together Microsoft`s Digital Crime Unit experts comprising attorneys, investigators and security response experts

As part of the Microsoft Consultancy Services (MCS), an India-based response team will offer cyber monitoring, use machine learning-based detection technology and ensure rapid response to cyber threats to customers in the country. 
Using a proprietary algorithm, Microsoft Advanced Threat Analytics works round the clock, constantly learning from the behaviour of organisational entities (users, devices and resources) and helps customers adapt to the changing nature of cyber security attacks. 
Additionally, Microsoft`s Advanced Threat Protection in Exchange Online Protection helps prevent malware attacks in an email environment, strengthening security and protection against the growing threat of identity frauds and business email frauds.

FBI Software, Web Training: How Delhi Police Will Tackle Online Stalking

According to a study released by UN Office on Drugs and Crime (UNODC), one of the greatest gaps in fighting online child abuse is lack of skilled and dedicated personnel among law enforcement agencies in key investigative areas.

Sundari Nanda, Special Commissioner of Police, Women Safety, Airport and Modernisation, made a similar point and stressed that police personnel need to know about online mediums since they are approached by people in distress.

"Many of the crimes against women and children are happening in the online space. We have to up our game when we are dealing with such criminals. It is essential for our officers to know about online platforms and social media and the threats posed by them," she said.

Bearing this in mind, a three-day training programme was organised by Delhi Police's Special Police Unit for Women and Children (SPUWAC) in collaboration with Data Security Council of India (DSCI) and International Centre for Missing and Exploited Children (ICMEC) to train police officers about how the Internet is being used to target children.

At the programme, police officers were told that they might be given access to software used by the FBI and other premier investigative agencies.

"During the three-day training programme, we were told that ICMEC has developed software in collaboration with the FBI, other law enforcement agencies in the US and the Massachusetts Institute of Technology (MIT) that might be made available to us.

"These softwares are quite advanced and can track online predators, how they are accessing child pornographic images, where all the images have been circulated, from where these were uploaded. They can lead you to the IP address from where the abuse might be happening," said a senior police officer who attended the programme.

While there are laws to tackle child abuse in India, there are not sufficient figures on the issue, a fact pointed out by UNICEF India in its report titled 'Child Online Protection in India' that was released last month.

According to the report, despite the presence of close to 400 million Internet users in India, a majority of them being the youth, there are no reliable figures on child online abuse and exploitation.

The report also stated that even though cyber crimes against children, have various forms like sexting, online grooming, child pornography and cyber bullying, they are under-reported and not included in the National Crime Records Bureau statistics as a separate category.

Last month, a 29-year-old man was arrested in the national capital for harassing more than 50 minor girls in the age group of 9-16, by sending them their morphed photos and abusive messages through WhatsApp and Facebook.

Thursday, 20 October 2016

ATM Hack Hits 3.2 Million Indian Debit Card- CHANGE YOUR PIN NOW

India is undergoing the biggest data breaches to date with as many as 3.2 Million debit card details reportedly stolen from multiple banks and financial platforms.

The massive financial breach has hit India's biggest banks including State Bank of India (SBI), HDFC Bank, Yes Bank, ICICI Bank and Axis, and customers are advised to change their ATM PIN immediately.

Hackers allegedly used malware to compromise the Hitachi Payment Services platform — which is used to power country's ATM, point-of-sale (PoS) machines and other financial transactions — and stole details of 3.2 Million debit cards, reports The Economic Times.

Hacked Debit Cards Reportedly Used in China

Some banks, including the country's biggest lender SBI, have announced that they'll replace compromised debit cards, while others banks, including HDFC Bank, have urged their customers to change their ATM PINs and avoid using ATMs of other banks.

The extent of damage due to breach also depends on the type of cards customers are using.

Cards which use Magnetic Stripe transmit your account number and secret PIN to merchants in a way that it could make easy for fraudsters to hack them, making these cards easier to clone.

SBI Blocks and will Re-Issue 600,000 Debit Cards

SBI has blocked affected debit cards and will re-issue over 600,000 cards.
the Payments Council of India has ordered a forensic audit on the Indian bank servers to measure the damage and investigate the origin of the cyber attack. Bengaluru-based payment and security specialist SISA will conduct the forensic audit.

Tuesday, 18 October 2016

How to Find the Wi-Fi Password of your Current Network

Your computer is connected to a wifi network but you do not remember the password , mybe you forgot the password.

Step1;- Open the command prompt in administrator mode,Type “cmd” in the Run box, right-click the command prompt icon and choose Run as Administrator .

Step2:- Now enter the following command and hit enter to see the WiFi password.

netsh wlan show profile name=labnol key=clear

Remember to replace labnol with the name of your Wireless SSID (this is the name of the Wi-Fi network that you connect your computer to).

Step3 :-If you would only like to see the password and not the other information, use the findstr command:

 netsh wlan show profile name=labnol key=clear | findstr Key

Monday, 10 October 2016

How to Hack Whatsapp account of their girlfriends or friends

Indeed What's app on your phone automatically creates a database file But suppose someone chats you hide your Whats App to be deleted what would you do?

Step 1:- Simple way to obtain his phone first and then quickly go to the File Manager

Step 2:- Now the open whats App floder and click Database

Step 3:- Here you'll find the last 7 days, which history database  name is "msgstore-date.db.crypt8" and  send these data base via bluetooth or SHAREit.

Step 4:- then how to read database file (go--> and click " select SQLite File"

Step 5:- finaly you are able to read chat file.

How to remove malware from your Windows PC

Are you getting lots of pop-ups? Have you seen other weird problems crop up? If so, your PC might be infected with a virus, spyware, or other malware—even if you have an antivirus program installed. it’s best to check for malware if your PC is acting up and we’ll show you how to do it yourself

                                            Step 1: Enter Safe Mode

In this mode, only the minimum required programs and services are loaded. If any malware is set to load automatically when Windows starts, entering in this mode may prevent it from doing so. This is important because it allows the files to be removed easier since they’re not actually running or active. 
To boot into Windows Safe Mode, first click the Start Button in Windows 10 and select the Power button as if you were going to reboot, but don’t click anything. Next hold down the Shift key and click Reboot. When the full-screen menu appears, select Troubleshooting, then Advanced Options, then Startup Settings. On the next window click the Restart button and wait for the next screen to appear (just stick with us here, we know this is long). Next you will see a menu with numbered startup options; select number 4, which is Safe Mode. Note that if you want to connect to any online scanners you’ll need to select option 5, which is Safe Mode with Networking. 

You may find that your PC runs noticeably faster in Safe Mode. This could be a sign that your system has a malware infection, or it could mean that you have a lot of legitimate programs that normally start up alongside Windows. If your PC is outfitted with a solid state drive it’s probably fast either way. 

                                            Step 2: Delete temporary files

Now that you’re in Safe Mode, you’ll want to run a virus scan. But before you do that, delete your temporary files. Doing this may speed up the virus scanning, free up disk space, and even get rid of some malware. To use the Disk Cleanup utility included with Windows 10 just type Disk Cleanup in the search bar or after pressing the Start button and select the tool that appears named Disk Cleanup.

Step 3: Download malware scanners

There are two types of antivirus programs. You’re probably more familiar with real-time antivirus programs, which run in the background and constantly watch for malware. Another option is an on-demand scanner, which searches for malware infections when you open the program manually and run a scan. You should have only one real-time antivirus program installed at a time, but you can have many on-demand scanners installed to run scans with multiple programs, thereby ensuring that if one program misses something a different one might find it.
If you think your PC is infected, we recommend using an on-demand scanner first and then following up with a full scan by your real-time antivirus program. Among the free (and high-quality) on-demand scanners available are  BitDefender Free Edition,Kaspersky Virus Removal Tool, Malwarebytes, Microsoft’s Malicious Software Removal Tool, Avast, and SuperAntiSpyware.

Step 4: Run a scan with Malwarebytes

If your problems persist after you’ve run the threat scan and it has found and removed unwanted files, consider running a full scan with Malwarebytes and the other scanners mentioned earlier. If the malware appears to be gone, run a full scan with your real-time antivirus program to confirm that result.

Step 5: Fix your web browser

Before launching your web browser, check your homepage and connection settings. For Internet Explorer right-click the Windows 10 Start button and select Control Panel, thenInternet Options. Find the Home Page settings in the Generaltab, and verify that it’s not some site you know nothing about. For Chrome, Firefox, or Edge, simply go to the setttings window of your browser to check your homepage setting.

Step 6: Recover your files if Windows is corrupt

Once you have backed up everything, reinstall Windows either from the disc that came with your PC, by downloading the installation image from Microsoft, or by using your PC’s factory restore option, if it has one. For a factory restore you typically must press a certain key on the keyboard during the boot process in order for restore procedure to initialize, and your PC should tell you what key to press in the first few seconds after you turn it on. It there’s no on-screen instructions consult your manual, the manufacturer, or Google.