Posts

Showing posts from March, 2018

Facebook will pay you to report apps that misuse data

Image
Still reeling from the Cambridge Analytica scandal, Facebook has announced a new category in its "bug bounty" program that targets "data misuse" in third-party Facebook apps. “Facebook's bug bounty program will expand so that people can also report to us if they find misuses of data by app developers,” the company wrote in a Monday blog post.So Facebook will pay you to report apps that misuse data.Until now, Facebook's six-year-old bug bounty scheme has focused on rewarding those who find technical security vulnerabilities. Facebook have made some of the following changes and increase its Bug bounty Program 1.Pause app review: Facebook has paused all app reviews as of last week as it investigates apps that gained access to large amounts of user information before the launch of its app review process in 2014. 2.Access to user friends requires Login Review: We are treating user_friends as an extended permission that requires Login Review. Faceb

What is Cryptocurrency?

Image
Most of the people are interested to know about "What is Cryptocurrency ". Today cryptocurrencies (Buy Crypto) have become a global phenomenon known to most people. It is a digital asset designed to work as a medium of exchange that uses cryptography to secure its transactions, to control the creation of additional units, and to verify the transfer of assets. Cryptocurrencies are a type of digital currencies, alternative currencies and virtual currencies.While still somehow geeky and not understood by most people, banks, governments and many companies are aware of its importance.Few people know, but cryptocurrencies emerged as a side product of another invention. Satoshi Nakamoto, the unknown inventor of Bitcoin, the first and still most important cryptocurrency, never intended to invent a currency.In his announcement of Bitcoin in late 2008, Satoshi said he developed “A Peer-to-Peer Electronic Cash System.“ His goal was to invent something; many people failed to create

How secure is WhatsApp?

Image
WhatsApp is probably one of the most used apps on any smartphone. And for right reasons. It is a pretty great communication tool. It is simple to use and it works well, even with relatively slower connections.But at the same, just like any other app or a web-based tool, WhatsApp can also leak your private data if you are not careful. Do you know "How secure is WhatsApp?" Recently the Indian Army has warned WhatsApp users to stay alert on the social media platform as the Army alleged that Chinese hackers are targeting Indian users to extract personal data.Indian Army on Sunday released a video on micro blogging site Twitter, urging people to use Whatsapp safely. "Stay cautious, stay alert, stay safe! The Chinese were penetrating the digital world," tweeted Indian Army’s official handle, the Additional Directorate General of Public Interface (ADGPI). “Chinese are using many platforms to penetrate your digital world. WhatsApp groups are a new way of hacking

Cyber Security Tips

Image
The number of cyber security attacks is increasing every year. From the period between 2013-2015, it was reported that the cost of cyber crimes quadrupled–with those numbers falling anywhere between $400 billion and as high as $500 billion during that time.Read  top ten cyber security tips below, 1.Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.” 2.Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites.Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor. 3.Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone.If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well. 4.Always be careful when clicking on attachmen

How to prevent Ransomware?

Image
There are a number of defensive steps you can take to prevent ransomware infection. These steps are a of course good security practices in general, so following them improves your defenses from all sorts of attacks: Keep your operating system patched and up-to-date, to ensure you have fewer vulnerabilities to exploit. Don't install software or give it administrative privileges unless you know exactly what it is and what it does. Install antivirus software, which detects malicious programs like ransomware as they arrive, and white listing software, which prevents unauthorized applications from executing in the first place. And, of course, back up your files, frequently and automatically! That won't stop a malware attack, but it can make the damage caused by one much less significant. Ransomware removal If your computer has been infected with ransomware , you'll need to regain control of your machine. Important steps are to: Reboot Windows 10 to safe mode Insta

Truecaller is a privacy risk- how actually works?

Image
Truecaller is a popular calling app, It shows you contact details of unknown number by calling you. Its grabbing your contact details from all its user phone address book. If you are using Truecaller or not, it doesn't matter, your name and number details might be in truecaller database. It can also list of your home address and it could be breached in your privacy. A lot of people have commented saying that the app doesn't leak the numbers out in public. May be not in the proper "leak" sense. But it does put them up their in the Truecaller database for some degree of public use without seeking any permission from the people whose numbers it has. If you have a number, you can easily find out the name and address (at least city specific) of the person who uses that number from the Truecaller search. And if you have a name, even then you can search the database and get some details of that user, along with option to seek full number from the user. Bu

What is URL?

Image
  A URL (Uniform Resource Locator), as the name suggests, provides a way to locate a resource on the web, the hypertext system that operates over the internet. The URL contains the name of the protocol to be used to access the resource and a resource name. The first part of a URL identifies what protocol to use. The second part identifies the IP address or domain name where the resource is located.A URL is the most common type of Uniform Resource Identifier (URI). URIs are strings of characters used to identify a resource over a network. URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) for web resources, "mail to" for email addresses, "ftp" for files on a File Transfer Protocol (FTP) server, and telnet for a session to access remote computers. All URLs are presented in the following order: Scheme name Colon and two slashes Location of the server The port (optional) and the location of the resource on the server Fragme

What is hyperlink?

Image
Alternatively referred to as a link, a hyperlink is an icon, graphic, or text in a document that links to another file or object. The World Wide Web is comprised of hyperlinks linking trillions of pages and files to one another. Why are hyperlinks used on web pages? Hyperlinks are what allow web pages to connect to other web pages and without them you would need to know the URL for every page on the Internet. What happens when you click a hyperlink? When you click, tap, or select a hyperlink, the browser leaves the current page you are viewing and opens the link for the new page. Why are some hyperlinks different colors? For usability, many websites (including Computer Hope) change the color of visited hyperlinks as a way to let the reader know what page they have already visited. For example, unless you have already viewed our motherboard page, the link should be blue. However, the link to this hyperlink page should be purple because you've visited the page, since y

What is Email Marketing?

Image
Basically the use of email to promote products and/or services. But a better email marketing definition is the use of email to develop relationships with potential customers and/or clients. Email marketing is one segment of internet marketing, which encompasses online marketing via websites, social media, blogs, etc. It is essentially the same as direct mail​ except that instead of sending mail through the postal service, messages are sent electronically via email.Much of the spam email we all get proclaiming 'deals' on this and that is a good example of email marketing at its worst; the mindless email barrage. Email Marketing Can Be Personalized Particular groups of customers can be targeted or even individuals. Offering individual customers special deals on merchandise and/or services on the customer's birthday, for instance, is one example of email marketing personalization. The Advantages of Email Marketing The two big advantages of email marketing are

How to Improve Your Website’s Google Rank

Image
1. Publish Relevant Content Quality content is the number one driver of your search engine rankings and there is no substitute for great content. Quality content created specifically for your intended user increases site traffic, which improves your site’s authority and relevance. Don’t forget to use bold, italics, heading tags, and other emphasis tags to highlight keyword phrases, but don’t overdo it.Never sacrifice good writing for SEO. The best pages are written for the user, not for the search engine. 2. Update Your Content Regularly You’ve probably noticed that we feel pretty strongly about content. Search engines do, too. Regularly updated content is viewed as one of the best indicators of a site’s relevancy, so be sure to keep it fresh. 3. Metadata When designing your website, each page contains a space between the tags to insert metadata, or information about the contents of your page. If you have a CMS site, the UMC web team will have per-populated this data fo

Different types of firewalls

Image
1.Packet filtering firewalls This, the original type of firewall , operates inline at junction points where devices such as routers and switches do their work.However, this firewall doesn't route packets, but instead compares each packet received to a set of established criteria -- such as the allowed IP addresses, packet type, port number, etc. 2.Circuit-level gateways Using another relatively quick way to identify malicious content, these devices monitor the TCP handshakes across the network as they are established between the local and remote hosts to determine whether the session being initiated is legitimate -- whether the remote system is considered trusted. They don't inspect the packets themselves, however. 3.Stateful inspection firewalls State-aware devices, on the other hand, not only examine each packet, but also keep track of whether or not that packet is part of an established TCP session. This offers more security than either packet filtering or circ

What is firewall ?

Image
A firewall is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules.   Broadly speaking, a computer firewall is a software program that prevents unauthorized access to or from a private network. Firewalls are tools that can be used to enhance the security of computers connected to a network, such as LAN or the Internet. They are an integral part of a comprehensive security framework for your network. A firewall absolutely isolates your computer from the Internet using a "wall of code" that inspects each individual "packet" of data as it arrives at either side of the firewall — inbound to or outbound from your computer — to determine whether it should be allowed to pass or be blocked. courtesy: https://personalfirewall.comodo.com/what-is-firewall.html WordPress: https://aywenz.wordpress.com Facebook:   https://www.facebook.com/aywenzit/

How to prevent spyware from your computer

Image
Spyware is a form of malware that can infect your computer and reconfigure your Internet browser settings by changing your home page and modifying your search results.Due to the seriousness of spyware and the harm it can do to your system and personal information, it is highly recommended you take the following measures to prevent spyware from overtaking your system. Download and Install Anti-Spyware Software Perhaps the most critical step in preventing your system from becoming infected with spyware is to have a utility installed that can thwart malware threats from being installed on your computer. Most antivirus applications are effective in identifying different types of malware, including spyware, but may not detect all spyware variants. In addition to having an antivirus software, you should invest in an anti-spyware solution or download a free utility to assist you in combating spyware threats. Be Cautious When Web Surfing The best defense against spy

Different types of spyware

Image
There are four different types of spyware which have their own purpose and functions. They are mainly computer spyware and cell phone spyware. These four different spyware are related with each other, and all these four types of spyware can be present in a single system if it is seriously affected. These four types of spyware are Adware Trojans Tracking cookies System monitors 1.Adware: This type of spyware tracks information from the user like user’s browsing activity on the Internet and downloads to keep track of user’s intent. After this adware tracks the user’s activity like web searches, frequently visited websites and downloads, this adware then displays several types of ads like window ads or pop-up ads. These are done mainly for marketing purposes. 2.Trojans: Trojans are malicious software that often appear legitimate and fool people into accessing them by several social engineering techniques. Unlike other spyware, Trojan horses cannot install themselves au

What is spyware?

Image
Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge. Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account informat

How to make your WhatsApp more private and secure?

Image
1) Lock WhatsApp One of the best WhatsApp security tips is to protect the app with a password or PIN. WhatsApp itself doesn’t offer such a function, but there are third-party apps that do. It might seem cumbersome but if you lose your phone, it’s going to prevent anyone else accessing your chats. 2) Hide ‘last seen’ timestamp Not sure you want people to know when you’re coming on and offline? It may not seem like vital information, but if a scammer already knows some other things about you, adding that last piece of contextual information could prove useful to them 3) Restrict access to profile picture Is your profile photo one you’ve used elsewhere – on LinkedIn, Facebook or Twitter? Maybe it’s even on your company’s website somewhere. If it is, and your WhatsApp sharing is public, anyone you’ve ever spoken to – even if you’ve just replied to an unwanted message – can download your pic from your WhatsApp profile and, using Google Image search, very quickly find out more

How to protect your computer from virus?

Image
1. Keep your software up to date Software makers like Microsoft and Oracle routinely update their software to fix bugs that could potentially be exploited by hackers. Oracle just released on Sunday an update to its Java software to fix a security hole hackers could have used to infect computers with malware. 2. Don’t click on links within emails A good rule of thumb is if you don’t recognize a sender of an email, don’t click on any links within it. Microsoft says 44.8 percent of Windows virus infections happen because the computer user clicked on something. 3. Use free antivirus software You don’t have to pay for software to protect your computer or for an annual subscription to maintain the latest virus protection. For Windows users, Microsoft Security Essentials is free. 4. Back up your computer You have no protection from calamities ranging from hard drive failure to your house burning down. If you value your data, back it up.You have three basic backup options: an e

Different types of virus

Image
  1. Boot Sector Virus Even though this virus has now become obsolete, it still pops out in one way or the other. This virus got attention when floppy disks were used to boot a computer. In modern computers, this virus could appear on the “Master Boot Record”. In the partitioned storage device of your computer, it is the first sector to take place. 2. Web Scripting Virus Similar to the hyperlinks that we used in Microsoft Word, many websites rest on codes to provide engaging content to their users. For example, since the trends of watching videos online have now become very popular – more than 2 Billion Videos are streamed on Facebook every day, these videos also execute a specific code.These codes can be exploited and it is very troublesome to note that this exploitation has taken place on some very notable sites. All the hackers have to do it to leave a comment in the Comments Section of the website which contains that code. Thus, even without the Webmaster knowing it, th

3 ways humans can do PPC better than machines alone

Image
Artificial Intelligence is a hot topic in PPC but until the machines fully take over day-to-day account management, there are a few key areas where human PPC pros can still add a lot of value. 1.Use Business Data for Bid Management Bid management can be one of the most repetitive and boring tasks of managing PPC because after a model has been built, you are left with an ongoing task executing on the plan and this may involve downloading the data, putting it into the correct format, and then running it through your formulas to determine the new bid. For machines, this might sound like the perfect dinner on a caribbean - beach sunset, but for us humans? Not so much. Repetition is dull, and as a dull task, we tend to become a bit less thorough with our analysis as time goes on. There are four clear advantages to using the engine’s bid management systems: They are free to use. They are based on best-in-breed algorithms. They have access to a lot of auction-time signals that ad

What is virus?

Image
A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works. The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator. In contrast, a computer worm is stand-alone programming that does not need to copy itself to a host program or require human interaction to spread. Viruses and worms may also be referred to as malware. A virus can be spread by opening an email attachment, clicking on an executable file, visiting an infected website or viewing an infected website advertisement. It can also be spread through infected removable storage devices, such USB drives. Once a virus has infected the host, it can infect other system software or resources, modify or disable core functions or applications, as well as copy, delete or encrypt data. Some viruses begin replicating as soon as they infect the host,

How to avoid bugs?

Image
Testing at every stage of development: Systems can help identify and eliminate bugs early in the software development process. Unit testing (performed by developers) and functional testing (undertaken by QA professionals) should be laced throughout the project. Then, when bugs are uncovered, that portion of the programming is still fresh in the developer’s mind, making it easier to find a fix. Prioritization of bug fixes: Software development pros should have a plan in place for when and how to fix bugs. Some require an immediate fix to head off additional challenges. Others can be saved for later in the process. Your development team should be able to explain how they prioritize bugs to ensure your deadlines are met. Above all, don’t save all the bugs until the end. Fix the mission-critical ones as soon as you find them. Acceptance testing: Communication can be a challenge. Sometimes, the software development team does not fully understand your requirements or intention

Different types of bugs

Image
1) Functionality Errors: Functionality is a way the software is intended to behave. Software has a functionality error if something that you expect it to do is hard, awkward, confusing, or impossible. 2) Communication Errors: These errors occur in communication from software to end-user. Anything that the end user needs to know in order to use the software should be made available on screen. 3)Missing command errors: This happens to occur when an expected command is missing. 4) Syntactic Error: Syntactic errors are misspelled words or grammatically incorrect sentences and are very evident while testing softwareGUI. Please note that we are NOT referring to syntax errors in code. The compiler will warn the developer about anysyntax errors that occur in the code 5) Error handling errors: Any errors that occur while the user is interacting with the software needs to be handled in a clear and meaningful manner. If not, it is called as an Error Handling Error. 6) Ca

What is bug?

Image
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The process of fixing bugs is termed "debugging" and often uses formal techniques or tools to pinpoint bugs, and since the 1950s, some computer systems have been designed to also deter,detect or auto-correct various computer bugs during operations. Most bugs arise from mistakes and errors made in either a program's source code or its design, or in components and operating systems used by such programs. A few are caused by compilers producing incorrect code. A program that contains a large number of bugs, and/or bugs that seriously interfere with its functionality, is said to be buggy (defective). Bugs can trigger errors that may have ripple effects. Bugs may have subtle effects or cause the program to crash or freeze the computer. Other bugs qualify as security bugs and might, for example,

Different types of malware

Image
Malware is a broad term that refers to a variety of malicious programs.They vary in their purpose, how they infect a computer, how they replicate and the damage or security risk they pose. Adware: The least dangerous and most lucrative Malware. Adware displays ads on your computer.Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements.Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Spyware: Spyware is software that spies on you, tracking your internet activities in order to send advertising (Adware) back to your system. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data), and more. Virus: A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various progr