latest Post

Top Hidden Cyber Security And Technology Tips


Top-Hidden-Cyber-Security-And-Technology-Tips.png
It wonderful having you read through this blog post again, relax as we shall be discussing CYBER SECURITY in this post
Each and every one of us must have encounter fraudulent attack online in some way or another, we keep witnessing this in our daily lives and in most times we are victims because we cant defend ourselves mostly because their tactics keep changing and we don’t know how to stay safe online, But after reading this post, we shall understand that it our responsibility to stay safe online and how can we stay safe online?
We can’t talk of security if we don’t know what we should be secured from, No vigilante stays awake at night when he doesn’t know what to secure the city from and that why we are going to start by describing the crimes that do occurs. We call it Cyber Crime
Cyber is a prefix used to describe idea as part of computer technology and information while Crime is any act that violates a law of the society or human beings that result in punishment, therefore Cyber Crime is said to be any criminal activities carried out by criminals using computers technology or any electronic devices, this can be of 2 ways “Having computer system as the target” and “Using the computer technology as the weapon to attack”
There are many Cyber crimes but am going to list little and explain them
We have Virus Dissemination
Site Cloning: This is a current trend in our current day generation, where there are lots of identical websites currently in existence with fraudulent tendencies, these websites come in forms of online markets and courier services, money vendors and currency exchange, etc.
they spoke your credit card credentials and rip you off.                       
PUPs (potentially unwanted programs): This is less harmful but more annoying malwares, they install unwanted software in your system including search agents and toolbars which include spyware, adware, listeners and as well as dialers. They also prone you with intrusive adverts that you can‘t control easily. (Bitcoinminer was one of the most commonly noticed PUPs in 2013)                      
Malvertising: This is short for malicious adverts, this occur to almost all of us, I can easily be making researches online, all of a suddenly you will see a naked woman dancing, asking you to click so you can chat, if you fall for this and you leave your research to go and chat with a naked woman, you will become a victims. This is a method whereby users download malicious codes by simply clicking at some adverts on any website that is infected.
In most cases, the websites are innocent. It is the cyber criminals who insert malicious advertisements on the websites without the knowledge of the latter. In other cases, the cyber criminals show clean ads for a period of time and then replace it with malverts making it more difficult to track                       
Spamming, Phishing and Scamming: Spamming ,phishing and scamming are very common forms of cybercrimes and there is not much you can do to control them except total blocking.
Scammers use Spam (which is basically unwanted bombarded emails and messages mostly from Spam bots.) to get to their targets audience and with Phishing (which is a method where cyber criminals offer baits so they can collect information they want from their TA) they propose offers that are too good to be true to lure their preys. We are all familiar with these ones because we come across them on daily basis.
These ones really don’t do much harm, because our computers are the target. So we see them as the lesser crimes                       
But how about when these crimes are directed to us, to impersonate us, dupe us, and rip us off?                       
That's when cyber crimes become really big issue to the society. Has anyone heard of Identity theft? Thieves no longer steal only properties, they steal identity too whereby I become you and you become me
The term Identity Theft is used to cyber-impersonate, when a person purports to be some other person, with a view to creating a fraud for financial gains or otherwise
you should see identity theft 2013 movie so you can understand well, they create ids same as yours and you’d be photocopied in the city
Next is credit card fraud: Do you know your credit card information can be stolen without someone seeing it or even touching it? Watch this video (Credit Card theft Technology) that explains how your credit card information can be stolen without contact with a device. Currently with this technology, cyber criminals are at the upper hand
                  
Next is Ransomware : This is one of the detestable malware-based attacks.
Ransom ware enters your computer network and encrypts your files using public-key encryption, and unlike other malware this encryption key remains on the hacker’s server. Attacked users are then asked to pay huge ransoms to receive this private key.                       
Hackers Cyber-jacking Attacks: This occurs mostly at the National or International level where advanced hackers target government or national properties like:
•Network Providers
•Government Websites
•National Power System Grids
•Traffic Control Systems
•Nuclear Weapons Control Systems
•Aircraft towers and lots more.                       


But among all these crimes, how do we stay safe?
Since we have identify the means and format through which they are coming, the next is know how to kick them off when you sense them near, because our cyber criminals are the most creative team workers now, there are over hundreds of formats through which they operate
Now how do we stay safe from all these things? How do we become our local vigilante ourselves if our government is not really ready to help
THE FIRST AND THE MOST IMPORTANT THING IS  TO MANAGE YOUR GREED                       
Research has it that more than ¾ of the reported cyber-attack victims were presented with a “TOO GOOD TO BE TRUE” offers and they immediately fell for it. Come to think of it, yahoo boys offer you mouth watering deals, you no longer check the risks involves, all you see is the money mentioned
1] Do not reply to mails that say you won a lottery that you never entered.
2] There are no widows or dying people who need your help to transfer their money to NGOs in your country. (This format is just so stupid)
3] Do not directly reply with your resume to online job offers via emails –even if the job website is reputed, make a little background check first
4] Control your excitement and actions if you get a ‘chance’ to lay your hands on millions of Dollars, for no reason.
In virus attacks, PUPs, and other Computer Related Attacks
Avoid patches and cracked software’s especially if it’s not from a source you trust, most antivirus considers these programs as security threats. Developers would always tell you to turn off any antivirus in use
Avoid all these random RAM optimizer and random registry cleaner software’s                       
Avoid Password keeper software’s: This password keeper has really dealt with me, I used to have a mozilla plugin that saved all my site passwords, until somehow I started noticing some strange activities on my logged sites, so i had to quickly change the passwords and get rid of that stupid app before it got worse                       
Its good to refresh your OS at least once in 6months if you have the liberty and convenience.
Always gives you opportunities for a fresh start                       
Make sure browser flashplayers and other vulnerable pluggins are frequently updated. I’ve been to someone’s mozilla and saw his plugin toolbar filled with so many apps i don’t recognize. Pluggins you don’t have use for, please don’t install them, and make sure they are from mozilla.org                       


Credit Cards
Let’s talk about bank TOKENS and OTP. I recall, one of my friend that hated the mention of token code… her reason being that the protocol involved was too extravagant, so much long process just to make a mobile transaction. ‘Why would bank take security questions, take password and still request token?’ How much does she have that she’s securing.
Those were her questions…. To cut the long story short, someone in her lodge crammed her credit card info and made online transactions with it.                       
Credit cards information can be stolen remotely if your card has the radio chick embedded in it, the only way now to be safe is to set up your account with a 2-factor authentication                       
Token and OTPs are good example of those.                      


Finally, there‘s not really much we can do to stop cyber crimes in our current generation, infact crackers and hackers are getting smarter by the day and are always abreast of the technological advancements. The best to do is to avoid, secure, report and at worst case scenario... Fight back!!!                      
Above all, BE SMART, Share and Explorer
                       
 Thank you guys... I know we have all learn one thing or another, don’t forget to use the comment box


About ZealwiseTrends

ZealwiseTrends
Recommended Posts × +

3 comments:

  1. Cybercrime is a big issue in today's world. I was once duped by those email scammers. They sent me an email that my ATM CARD pin needed to be changed for some security issues. The email looked pretty official. So I replied them. After that they asked me to provide my old pin and choose a new pin. This way they got access to my account. I began to receive debit alert from my bank even though I didn't withraw any money. When I went to the bank, they told that it was a scam. We should be very careful cus their tactics change every day.

    Bright recently published a post on his blog; 2017 WAEC GCE Expo

    ReplyDelete
    Replies
    1. Mr Bright the highest criminal activity in the world is cyber crime and we have to be vigilant and keep ourselves safe
      thanks for stopping by

      Delete

Thanks for reading through, Drop a comment to help our next article and don't forget to share
There is love in sharing!!!!