asfinvestigator-blog
asfinvestigator-blog
ASFI
15 posts
Don't wanna be here? Send us removal request.
asfinvestigator-blog · 8 years ago
Text
WannaCry ransomware: Everything you need to know
You've heard the phrase "the road to Hell is paved with good intentions," right?
Well, a vulnerability first uncovered by the National Security Agency and then released by hackers on the internet is now being used in one of the most prolific cyberattacks ever around the globe.
It's called WannaCry, and it's brought computer systems from Russia to China to the UK and the US to their knees, locking people out of their data and demanding they pay a ransom or lose everything. So far, more than 200,000 computers in 150 countries have been affected, with victims including hospitals, banks, telecommunications companies and warehouses.
Here's everything you could want to know about WannaCry.
What is WannaCry?
It's the name for a prolific hacking attack known as "ransomware," that holds your computer hostage until you pay a ransom.
More on WannaCry WannaCry ransomware: Everything you need to know How to protect yourself from WannaCry ransomware Unprecedented ransomware attack a nightmarish 'wakeup call' Ransomware: An executive guide to one of the biggest menaces on the web (ZDNet) The way it works is that once it infects a computer, it encrypts -- or basically scrambles -- all the data. Then the program puts up a screen demanding you pay money to get access back. Typically the price increases over time until the end of a countdown, when the files are destroyed.
We first heard about WannaCry last week from the UK's health service, which appeared to be one of the first major computer systems affected by the hack. It's also called WannaCrypt.
You can follow who's affected by watching this live tracking map created by MalwareTech.
Why do hackers do this?
The same reason you get telemarketing calls and junk email: It's effective.
Security company Symantec says that ransomware attacks alone jumped by more than one-third to over 483,800 incidents in 2016. And that's just the ones they tracked.
How do I protect my machine?
If you're running a Windows-powered PC, make sure all your software is up to date. In addition, as always, do not open suspicious emails, click on links you don't know or open any files you weren't expecting.
What do I do if my computer is infected?
You're out of luck. So far there doesn't appear to be a way to fix WannaCry.
Shortly after WannaCry began to spread, a security researcher accidentally found a kill switch that appeared to stop WannaCry in its tracks. But hackers have since made a fix, and this time there doesn't appear to be any way to stop it. It also has a new name Uiwix, according to researchers at Heimdal Security.
Great, so I have to pay these monsters to get my computer back?
There is currently no way to fix a computer that's infected by WannaCry. But at the same time, paying them isn't your best bet, since you are basically giving money to criminals.
The hackers typically demand about $300 in payment via bitcoin, an untraceable digital currency often used on shadowy parts of the internet. If that ransom isn't paid in 72 hours, the price could double. And after a few days, the files are permanently locked.
Many experts say wiping your machine and relying on backups is a better way to go.
Still, a bunch of people have decided to pay up. As of Tuesday, roughly $70,000 in Bitcoin currency have been transferred as ransom.
Who created WannaCry?
The hack appears to have originally been discovered by the NSA, which allegedly kept it on file as a potential tool to use for surveillance or other issues.
We found out about it because a group of hackers, known as Shadow Brokers, in April released a cache of stolen NSA documents on the internet, including details about the WannaCry vulnerability.
Does WannaCry affect my Mac, iPhone or Android?
No. It appears to only affect computers powered by Microsoft Windows. Microsoft released a software update in March that protects against this vulnerability, but we've since learned that many people didn't update their computers.
Microsoft took the unusual step on Friday to release another update for older computers running Windows XP (first released in 2001), Vista (2006) and Windows 7 (2009) and Windows 8 (2012), protecting them as well.
Microsoft, by the way, isn't happy about this attack, and has slammed spy agencies for stockpiling vulnerabilities instead of reporting them to computer companies to be fixed.
Who's most vulnerable?
Windows-powered PCs that aren't running updated software that protect from this vulnerability are the most at risk. WannaCry appears to travel across corporate networks, spreading quickly through file-sharing systems.
The diabolical part of that is corporate computers are typically controlled by IT departments that choose when to send updates to computers. So if one computer is vulnerable, it's likely all the computers on a corporate network are too, making it easy for WannaCry to have a large impact.
How does WannaCry spread?
It appears networks of computers, like schools, companies, hospitals and businesses, are particularly vulnerable. That's because security researchers say the ransomware is spread through standard file sharing technology used by PCs called Microsoft Windows Server Message Block, or "SMB" for short.
It also appears able to spread to other computers outside corporate networks. Researchers have already found variants of the attack, so there isn't just one way it works.
What do I do if I'm not hit but worried I might be?
If you have backups, now would be a good time to update them. If you don't, I suggest you start.
Also make sure to check your software updates and talk to your IT managers. (https://www.cnet.com/…/wannacry-wannacrypt-uiwix-ransomwar…/)
Fore More contact US on : [email protected] Web: www.asfi.co.in ;
https://www.facebook.com/ASFI.Forensic/ 
6 notes · View notes
asfinvestigator-blog · 8 years ago
Text
DATE RAPE DRUGS
Tumblr media
Date rape drugs refer to the drugs most often used to assist perpetrators in committing a sexual assault, which encompasses any sort of sexual touching or activity that a person does not consent to. This is known as drug-facilitated sexual assault. Date rape drugs are often slipped into a person’s drink when they are not paying attention. Because these drugs have no color, smell, or taste, it is often difficult for one to tell if they have been drugged. However, date rape drugs are very powerful, and they can cause extreme weakness and disorientation so that one cannot defend themselves nor give consent to a sexual activity.
Common date rape drugs (other than alcohol) include rohypnol (flunitrazepam, also called Circles, R-2, Forget Pill, and Roofies), GHB (gamma hydroxybutyric, also called Cherry Meth, Easy Lay, G, Liquid E, and PM), and ketamine (also called Bump, Green, Jet, K, Purple, and Super Acid). Klonopin (clonazepam) and Xanax (alprazolam) are also commonly used date rape drugs. Rohypnol often comes in the form of a pill, GHB in the form of a liquid, white powder, or pill, and ketamine in the form of a liquid or white powder. While rohypnol is illegal in the United States (and often smuggled in from Mexico or Europe), GHB and ketamine are both legal substances, though they are highly regulated and used primarily to treat animals and sleep disorders.
Date rape drugs are commonly used at dance clubs, bars, concerts, and other party venues which is why they are often referred to as club drugs–and can cause one to pass out and have no memory of what occurred while they were under the influence of the drug.
These drugs have several powerful effects, which vary in length. If a date rape drug is mixed with an alcoholic drink, its effect becomes more powerful and can cause serious health problems or even death. Possible effects of these drugs include loss of muscle control and motor skills, loss of coordination, visual impairment, loss of time and identity, dream-like or out-of-body experiences, sweating, nausea, aggressive behavior, speech impairment, sleepiness, loss of consciousness, confusion, numbness, vomiting, memory loss, slow heart rate, low blood pressure, tremors, and seizures.
Tumblr media
HERE ARE SOME TIPS TO ENSURE NO ONE GIVES YOU A DATE RAPE DRUG ::::
:> Don’t accept drinks from strangers.
:> If drinking from a container, be sure to open it yourself.
:> Avoid drinking from punch bowls or other communal containers.
:> Keep your drink with you at all times, even when you go to the bathroom.
:> If someone else is making you a drink, be sure to watch the drink as it is being made.
:> Have a friend who is not drinking with you to ensure that you both stay safe.
:> If you feel like the effects of the alcohol you are drinking are stronger than usual, or if you feel drunk but have not been drinking any alcohol, be sure to seek help.
:> If you feel like you have been drugged or if you are a survivor of sexual assault (some signs include a lack of memory from the night before or torn clothes), please know that it is never the survivor’s fault. You should get medical help right away and inform the police.
3 notes · View notes
asfinvestigator-blog · 8 years ago
Text
BE AWARE ABOUT CYBERCRIME IN 2017
Tumblr media
Cyber-crime can happens with anyone, at any time by cyber attackers. For small business holders it is very difficult to prevent them self’s from such a risks, because of lack of resources and proper security to protect them. For online business it is critical to protect data, it can have its vulnerabilities and keeping your data protected is crucial for all businesses.
Top three cybercrimes to look out for in 2017 were:
1.      Ransomware
2.      Internet of Things (IoT)
3.      Spear-phishing
 These will continue to grow especially the internet of things.
1.      RANSOMWARE
A type of malicious software designed to block access to a computer system until a sum of money is paid. Ransomware is computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer's Master File Table (MFT) or the entire hard drive. Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.
2.      INTERNET OF THINGS (IOT)
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Broadband Internet is become more widely available, the cost of connecting is decreasing, more devices are being created with Wi-Fi capabilities and sensors built into them, technology costs are going down, and smartphone penetration is sky-rocketing.  All of these things are creating a "perfect storm" for the IoT. It’s been predicted that 96% of senior business leaders will be using IoT by 2020.
3.      SPEAR-PHISHING
In 2015 / 2016 we saw a huge number of attacks carried out via spear-phishing emails. These emails look like they come from a legitimate source, for example a trusted institution, colleague or friend, they are tailored for the recipient and some appear very convincing and sophisticated. The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.
1 note · View note
asfinvestigator-blog · 9 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Lori Erica Ruff (“Nee”: Kennedy) was a private and introverted woman.
In 2003, the tall, pretty brunette married a man named Blake Ruff after meeting him at a church bible study group in East Texas.They eloped in Dallas, as Lori rejected the idea of a well-attended traditional wedding and the newspaper announcement that came with it.
She never warmed to her family in law and spent a lot of time alone, also working from her computer at home as a marketing consultant. Lori was always evasive when questioned about her childhood and past, stating only that both her parents were deceased and that she had no living relatives.Her husband didn’t push her for answers or attempt to make her open up in any way.
They tried for a baby, but Lori miscarried several times, before finally giving birth to a daughter in 2008.She was very protective of her child, and never allowed anyone to babysit.She spent time with her daughter, dressing up and frequenting tea shops as she always liked to do.
Problems arose in their relationship, causing Blake to move out of the marital home in 2010.He moved back to his family home and ordered a divorce. Lori began to have a meltdown; she lost weight and received counseling at a nearby church, where she would ramble and repeat to the pastor on the subject of her flaws and problems and questioned what was wrong with her and why her marriage had deteriorated.She would fidget and repeat herself and stare at her open palms and the back of her long hands.
In 2010 Blake’s father discovered the body of Lori in Blake’s car, a black Tahoe.She had committed suicide with a shotgun to the head.She had two letters on her person; one for Blake and one for her daughter with a note that it be opened on her 18th birthday.According to the report, the letters were nothing but pages of incoherent rambling. During a search of the Ruff’s marital home, which was in very poor condition inside, scattered with paper scrawling’s of conscious commentary from the hand of Lori, the police found a safe box at the bottom of her closet. Blake noted that when they were living together Lori was adamant that he never open the box and that it was personal. As usual, Blake didn’t question it or push her as to why, he simply accepted it.An officer jammed the box open and was shocked by the contents.
Inside were various documents.One of which was a certificate in which Lori had legally changed her name, from Becky Sue Turner, To Lori Erica Kennedy.The only problem was, that Becky Sue Turner had died many years ago in Fife, of asphyxiation in a house fire. She was only two years old.Some digging revealed an article on the tragedy.
Becky Sue Turners birth and death certificates were also in the box.Lori had apparently taken over the identity of Becky Sue only a month or two after the death.She had ordered a copy of the birth certificate and knew that since Becky sue had died in a state that she wasn’t born in, it would be less likely that she would get caught taking over her identity.
From there she got an I.D Card for the state of Idaho stating that she was 18 years old and went on to legally change her name to Lori Erica Kennedy and obtained a social security card.She got a GED and a degree in business from the University of Texas.
There was a letter of reference signed by a man named Roger Steinbeck, who claimed that Lori had worked for him “since high school until 1988”. However the letter was vague and had no mention of any specific date and what Lori’s actual role or duties were.The letter was written on hotel stationary from “The oriental hotel” in Bangkok, Thailand.
The hotel is an actual establishment (Now the mandolin Oriental hotel) and one of the first five star hotels built in the city. It was host to many celebrities back in the day, such as Audrey Hepburn, John Steinbeck, Mick Jagger and Michael Jackson.Officers contacted Roger Steinbeck, but were met with a dead end and reported that he didn’t exist.It is not known if Lori ever traveled over sea’s, however she didn’t have a passport under the name Lori Erica Kennedy until 1990, and no stamps for Thailand were found in it.   Amongst the documents were two other sheets of paper; one with notes, scrawled phone numbers and names, and one with dates and the letters D and M, leading people to believe she had possibly been working out dates to indicate ages of her new identities parents. When her finger prints and face were ran through data bases nothing showed up.
In fact, finding out anything about Lori pre 1988 was impossible.The only other information that investigators were able to find out through talking to an old acquaintance was that she had previously worked as a dancer in a gentleman’s club. The autopsy revealed that she had breast implants, but had gotten them as Lori and not her previous identity.
Some people speculate that Lori was running from a tragic past, or was in a witness protection program, but nobody knows the truth.
Lori Erica Kennedy took her secret to the grave.
Read more unsolved mysteries and creepy cases at: http://reallifeishorror.blogspot.com/
622 notes · View notes
asfinvestigator-blog · 10 years ago
Text
Asquare Forensic Investigator - ASFI वर्ष - 1962, भारत-चीन युद्ध ==चीन== सैनिक - 80,000 शहीद - 722 घायल - 1697 ==भारत== सैनिक - 10,000 से 12,000 शहीद - 1383 घायल - 1047 लापता - 1696 बंदी - 3968 परिणाम - भारत, चीन से हार गया…! चीन अभी तक सुधरा भी नहीं है। लेकिन हमे क्या ?? 53 साल पहले की बात भूल कर हम तो चीनी सामान खरीदेंगे....उसकी आर्थिक स्थिति मजबूत करेंगे !! सैनिक तो होते ही मरने के लिए है !! नेता बोल देते है.....हमारा व्यवहार बोलता है !! मर जाएंगे क्या हम बिना चीनी सामान के ?? अगर नहीं.....तो याद उन्हे भी कर लो.....जो लौट के घर ना आए…!! और सीखो जापान जैसे देशो से…… काफी समय पहले की बात है अमेरिका और जापान में आपसी व्यापार बिलकुल न के बराबर था। अमेरिका ने काफी जोर देकर जापान की सरकार से कहा की जो आपके यहाँ संतरा (orange) होता है हम उससे काफी सस्ता और दिखने में अच्छा संतरा आपको दे सकते है,, जापान की सरकार ने अमरीका के दबाव की वजह से आर्डर दे दिया। जब वो संतरा जापान के बाज़ारों में बिकने के लिए पहुंचा ( आपकी जानकारी के लिए बता दूँ कि जापानी संतरा खाने में कड़वा होता था और जो अमेरिका वाला संतरा था वो खाने में अच्छा भी था। ) तो जब वो अमरीका वाला संतरा जापानी बाज़ारों में आया तो किसी ने नहीं खरीदा। पता है क्यों नहीं खरीदा…!! जापानी लोगो ने कहा कि चाहे मेरे देश का संतरा कड़वा और महंगा है। पर है तो हमारे देश का ही। हम इसे ही खरीदेंगे। तो वो बाकी का करोड़ो रूपये का संतरा सरकार के पास पडा पड़ा ही सड गया तो ये होती है राष्ट्रभक्ति मेरे भाइयो…!!
कुछ सीखो छोटी आँख वाले जापानियों से
हमारी तो आँखे भी बड़ी है और दिल भी…!!
कृपया करके इस पोस्ट को शेयर करे …!!! heart emoticon See More
See Translation
0 notes
asfinvestigator-blog · 10 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
ASFI FORENSIC ORGANISATION 
Forensic Science
www.asfi.co.in
0 notes
asfinvestigator-blog · 10 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media
Where is Zebb Quinn?
Zebb Quinn has been missing since the 2nd of January 2000. He was 18 years old at the time of his disappearance and resided in Ashville, North Carolina where he worked at a Wal-Mart.At 9pm, after what would be Zebb’s final shift, a surveillance camera recorded Quinn approaching the parking lot, where he met a friend, Robert Jason Owens.The two drove off in their separate vehicles with the intention of going to view a car that he was thinking about purchasing. Further down the road, fifteen minutes later, a gas station surveillance camera captured what would be the last living image of Zebb Quinn.Owens claims that Zebb signaled for him to pull over and said that he had to respond to an urgent page that he had received, and proceeded to make a call at a pay phone booth. Acting paranoid, he said he suddenly had to go and rear-ended Owens vehicle with his own while speeding away.
Some hours later, Robert Owens was treated at a hospital for a head injury and fractured ribs. He claimed he had gotten into a second car accident that night, however failed to file a report about the incident with the police.
The pager call was traced back to Quinn’s aunt, Ina Ustich, which was registered to her home phone.Quinn was not close to his aunt and had only began to recently communicate with her a week before his disappearance. When questioned, his aunt claimed to be at dinner with a woman named Tamara, who happened to be the mother of Quinn’s love interest, a girl named Misty. Misty’s allegedly abusive boyfriend, Wesley, was also claimed to be present. Ustich contacted the police that same night to report a break in. She said nothing had been stolen from the house, however she noticed that a few framed photographs were out of place.
According to Quinn’s parents, he referred to Misty as his girlfriend, and had done so for a few weeks up until his disappearance. Wesley had allegedly threatened Quinn but the couple denies any role in the missing teen’s case.   A couple of days after Zebb Quinn had been reported missing; a man called the Wal-Mart where he worked, Claiming to be him and called in sick due to illness. The voice did not match that of Quinn’s and was traced back the Volvo plant where Owen’s worked. He admitted to being the person who placed the call and said he was doing it as a favor to his friend. Two weeks passed before Zebb Quinn’s car showed up parked outside of the hospital his mother worked at, indicating that it was put there by someone who knew the family. There was a live mixed Labrador puppy inside (which was later adopted by an investigator), a jacket that didn’t seem to belong to Quinn, a hotel key card that investigators could not trace back to the source, and various drink bottles.There was a pair of lips drawn on the back window of the car. Forensic testing of the evidence did not lead anywhere.Fifteen years later Robert Jason Owens was arrested for the murder of Cristie Schoen, who was pregnant at the time, as well as the murder of her husband J.T Codd. He is still a person of interest in the disappearance of Zebb Quinn. (Sources: Wikipedia, charley project, )
More posts at Real Life is Horror Blog <<Click 
140 notes · View notes
asfinvestigator-blog · 10 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media
0 notes
asfinvestigator-blog · 10 years ago
Text
http://ahirsquareforensicinvestigator.blogspot.in/2015/09/difference-between-certificate-course-b.html
1 note · View note
asfinvestigator-blog · 10 years ago
Text
http://asquareforensic.blogspot.in/
1 note · View note
asfinvestigator-blog · 10 years ago
Photo
Tumblr media Tumblr media Tumblr media Tumblr media
0 notes
asfinvestigator-blog · 10 years ago
Text
http://asquareforensic.blogspot.in/2015/09/safety-for-cyber-crime-ASFI.html
0 notes
asfinvestigator-blog · 10 years ago
Photo
Tumblr media
0 notes
asfinvestigator-blog · 10 years ago
Text
What is Forensic Science ?
Forensic science simply means that scientific procedures are being applied to legal problems. Virtually all fields of science touch upon this discipline.  The word forensic comes from the Latin term forēnsis, meaning "of or before the forum", public, to the forum or public discussion; argumentative, linguistic, belonging to discussion.  It is applied science and consists of a range of different disciplines which often require different supporting science knowledge. It continues to evolve and is now applicable to crime disruption and crime prevention as well as crime detection and the identification of victims in mass disasters.
 The forensic sciences are used around the world to resolve civil disputes, to justly enforce criminal laws and government regulations, and to protect public health.  Forensic scientists may be involved anytime an objective, scientific analysis is needed to find the truth and to seek justice in a legal proceeding.  Early on, forensic science became identified with law enforcement and the prosecution of criminal cases — an image enhanced by books, television, and movies.  Forensic science is a rewarding career where the love of science can be applied to the good of society, public health, and public safety.
“If the law has made you a witness, remain a man of science.  You have no victim to avenge, no guilty or innocent person to convict or save — you must bear testimony within the limits of science.
0 notes
asfinvestigator-blog · 10 years ago
Text
https://www.facebook.com/ASFI203/posts/956243921084988:0
1 note · View note