Tuesday, November 7, 2017

Facebook | Whatsapp Hacking

CONTENT REMOVED

Internet Security – Cookies

Cookies are files, generally from the visited webpages, which are stored on a user's
computer. They hold a small amount of data, specific to a particular client and website,
and can be accessed either by the web server or the client computer which can be
usernames, password, session token, etc.
This allows the server to deliver a page personalized to a particular user, or the page itself
can contain some script which is aware of the data in the cookie and so is able to carry
information from one visit to that website.
Types of Cookies

There are three different types of cookies:

 Session Cookies: These are mainly used by online shops and allows you to keep
items in your basket when shopping online. These cookies expire after a specific
time or when the browser is closed.
 Permanent Cookies: These remain in operation, even when you have closed the
browser. They remember your login details and password so you don’t have to type
them in every time you use the site. It is recommended that you delete these type
of cookies after a specific time.
 Third-Party Cookies: These are installed by third parties for collecting certain
information. For example: Google Maps.
The following screenshot shows where the data of a cookie is stored and to do this, I have
used a plugin of Firefox which is called Cookies Manager+. It shows the date when a cookie
will expire.

Internet Security

With the usage of Internet, a number of activities take place in your computer which can
be for good or bad and varies from identity thefts to people who hack into computers and
steal private passwords, documents and files. The fact is that everything is online and
opens us to these frauds and makes us victims, unless you have taken the necessary steps
to protect your computer.
It is quite strange that till date, a lot of people don’t give much importance to Internet
Security. They think that their computers are invisible, but as soon as they start using
their computers for anything that involves logging onto the Internet, they are an easy
prey, even for a teenaged hacker.

Impact from an Internet Breach

The potential losses in this “cloud” are discussed as follows.
Here is a list of some losses that can have a direct impact on you and others:
 Losing Your Data – An Internet breach can swipe away all the data that you have
gathered over the years.
 Reputation Loss – Just think your Facebook account or business email have been
hacked by a social engineering attack and it sends fake information to your friends,
business partners. You will need time to gain back your reputation after such an
attack. Or your webpage has been hacked and the hacker puts up an ugly picture
on it, so a new customer that is visiting your webpage to get some information will
see this picture named “HACKED” and the chances that he will go away without
contacting you will be too high.
 Identity Theft – This is a case where your identity is stolen (photo, name
surname, address, and credit card details) and can be used for a crime like making
false identity documents or anything else.

Computer Security

Why Security?

Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all organizations and individuals to protect their sensitive data or reputation. This is because of the numerous people and machines accessing it. It is important to mention that the recent studies have shown a big danger is coming from internal threats or from disappointed employees like the Edward Snowden case, another internal threat is that information material can be easy accessible over the intranet.
One important indicator is the IT skills of a person that wants to hack or to breach your security has decreased but the success rate of it has increased, this is because of three main factors:
1. Hacking tools that can be found very easily by everyone just by googling and they are endless.
2. Technology with the end-users has increased rapidly within these years, like internet bandwidth and computer processing speeds.
3. Access to hacking information manuals.
All this can make even a school boy with the curiosity, a potential hacker for your organization.
Since locking down all networks is not an available option, the only response the security managers can give is to harden their networks, applications and operating systems to a reasonable level of safety, and conducting a business disaster recovery plan.


What to Secure?


Let’s see this case, you are an IT administrator in a small company having two small servers staying in a corner and you are very good at your job. You are doing updates regularly, setting up firewalls, antiviruses, etc. One day, you see that the organization employees are not accessing the systems anymore. When you go and check, you see the cleaning lady doing her job and by mistake, she had removed the power cable and unplugged the server.
What I mean by this case is that even physical security is important in computer security, as most of us think it is the last thing to take care of.

Benefits of Computer Security Awareness


Do you know in all this digital world, what is the biggest hole or the weakest point of the security?
Answer. It is us, humans.
Most of the security breaches come from uninformed and untrained persons which give information to a third party or publish data in Internet without knowing the consequences.
See the following scenario which tells us what employees might end up doing without computer security awareness: So the benefits of computer security awareness are obvious as it directly minimizes the potential of you being hacked off your identity, your computer, your organization.