Text
What is Antivirus ? And Why We Need It.?
Do we really need protection on our computer system? Do we need antivirus software on our PC ?

Many people think that they don't need an antivirus software and they don't use it. Then it is seen that they have to face many problems. No virus protection software is perfect but the programs will catch the majority of threats, lessening your chances of getting a virus or other malware. Unprotected Internet surfing remains dangerous. If you visit an infected website a malicious program enters quietly on your computer and commences a range of activities that lead to identity theft, data breaches or ransomeware extortion. They could hack your personal data and informations.
Why we use antivirus software ?
Many Windows and Apple Computer owners still believe they don't need antivirus software. It is seen that 20% of machines don't have the protection program that means those computers are five times more likely to get infected . Provide Insurance : Some people think that use of Antivirus Software is a waste of money. But it is like an insurance policy. For an annual subscription pack of around from $40 to $60, a Virus Protection program run on the background of computer and scan the device. If you invest a little, it gives you a protection from malware infection along with a fear and stress free life. Detect and Eliminate virus : If you run virus protection software, you should never fall victim of malicious attack. When you operate it, it will scan your PC and detect the virus infected files and then you can eliminate it. Protect your family : Another reason to install Antivirus Software involves other people who share your computer, especially your kids and unsophisticated computer users. Your kids are use your computer, surfs internet, install games from various websites. They don't aware of if any kind of infection comes from these websites. So then virus detecting Software protection your computer. Basic Functions of antivirus software : All antivirus engines have three components to function Scanning: When a new virus is detected in the cyberspace, antivirus producers start writing programs (updates). Then it scan the whole device. Integrity Checking: This method generally checks for manipulated files in OS from the viruses. Interception: This method is used basically to detect Trojans and it checks the request made by the operating system for network access. Antivirus Softwares : Generally all virus detecting program offers Mac, Windows, and Android versions as yearly subscriptions. It runs in the background of the device. This software gives the ability to manually scan and schedule scan at different intervals. Here I give the names of some popular Antivirus Softwares. 360 Total Security :

It has the features like firewall, privacy cleaner, file shredder, disk analyzer and more. 360 Total Security also has WiFi security check feature. It's price is $22.50 for one year per 3 PC subscription and $14.60 per year for 3 year. Avast antivirus :

Avast has both free and pro version. Its pro version has WiFi inspector and password manager. It offers almost same features as it's free version. It costs $39.99 per year. Norton Security Deluxe :
Norton has great malware protection feature. It has spam filter and in-built password manager. It's cost $69.99 per year. Bitdefender Antivirus Plus :
It gives a good malware detection performance. This antivirus has built-in password manager, and it gives a protection against encrypting ransomeware. Bitdefender plus costs $39.95 for one year for one computer or $59.95 a year for 3 PC. Kaspersky Internet Security :

It is a mid range antivirus. This Internet Security has excellent malware protection feature. It gives webcam protection, a virtual keyword and a secure browser. Kaspersky have a virtual private network that automatically switches on when you connect to a public WiFi network. It costs $39.95 per year for one computer or $59.95 a year for 3 PC. MacAfee Antivirus Plus :
It is a multi device protection plan. McAfee Plus protects your every Windows, Android, MacOS and iOS devices in your house hold. It also has firewall and file shredder. Price of it is $59.95 per year. Do you still think about Antivirus Software? Please go and get it now. Please share your experience. Read the full article
0 notes
Text
What Is Computer Security ?
Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all organizations and individuals to protect their sensitive data or reputation. Computer Security is very essential for all of us. This is because of the many people and machines accessing it. New technologies such as the Internet have drastically changed our methods of communication, way of conducting business and even the ways we use for engaging in recreation. The Internet provides us both speed and convenience to attract a critical mass of global users. We should be aware that Internet transgressors also adopt the medium as a new avenue for crime. One important indicator is the IT skills of a person that wants to hack or to breach your security has decreased but the success rate of it has increased, this is because of three main factors: 1. Hacking tools that can be found very easily by everyone just by googling and they are endless. 2. Technology with the end-users has increased rapidly within these years, like internet bandwidth and computer processing speeds. 3. Access to hacking information manuals. All this can make even a school boy with the curiosity, a potential hacker for your organization.

Definition of Computer Security :
General Computer Security includes such diverse things as controlling authorised ( and unauthorised ) computer access, managing computer accounts and user privileges, copy protection, virus protection, software metering, and database security. More generally, it also includes defences against computers across network connections, password sniffer, and network worms. What are the things to secure ? First of all, is to check the of what all to secure in a computer environment: physical security by setting control systems like motion alarms, door accessing systems, humidity sensors, temperature sensors these components decrease the possibility of a computer to be stolen or damaged by humans and environment itself. All People having access to computer systems should have their own user password protection. Monitors should be screen saver protected to hide the information from being displayed when the user is away or inactive. Secure your network especially wireless, passwords should be used. Internet equipment as routers to be protected with password. Data that you use to store information which can be financial, or non-financial by encryption. Information should be protected in all types of its representation in transmission by encrypting it. Things to losses due to security attacks : Losing you data – If your computer has been hacked or infected, there is a big chance that all your stored data might be taken by the attacker. Bad usage of your computer resources – This means that your network or computer can go in overload so you cannot access your genuine services or in a worst case scenario, it can be used by the hacker to attack another machine or network. Reputation loss – Just think if your Facebook account or business email has been owned by a social engineering attack and it sends fake information to your friends, business partners. You will need time to gain back your reputation. Identity theft – This is a case where your identity is stolen (photo, name surname, address, and credit card) and can be used for a crime like making false identity documents. For Computer Security you have to ensure these things : Users have to password protected. Operating system, which you have use, must be updated Antivirus or anti-malware in your computer system must be updated. Point out what are the unusual services. Use screen server. Use computer firewall. Backup your data regularly. Update other third-party softwares. Check that if your account has full rights or is restricted. Aspects of Computer Seycurit : Computer Security has three aspects : Confidentiality, Integrity, and Availability. Recently Authenticity and Utility is added to it. Confidentiality : Confidentiality is the concealment of information or resources. Also, there is a need to keep information secret from other third parties that want to have access to it, so just the right people can access it. Example : Let’s say there are two people communicating via an encrypted email they know the decryption keys of each other and they read the email by entering these keys into the email program. If someone else can read these decryption keys when they are entered into the program, then the confidentiality of that email is compromised. Integrity: Computer Integrity ensures that the written data remain unaltered or unchanged without an authorised person's permission. Data Integrity is the insurance of that the data has not been deleted or altered by someone without permission. Software Integrity also ensures that software programs have not been altered, whether by an error, a maliciously user, or a virus. Examples: Let's say you are doing an online payment of 5 USD, but your information is tampered without your knowledge in a way by sending to the seller 500 USD, this would cost you too much. In this case cryptography plays a very major role in ensuring data integrity. Availability: Availability has been defined by various security standard as the product's services are accessible whenever needed and without under delay. Or the property of being accessible and usable upon demand by an authorised entity. Availability with respect to computer : we want the computer to work when we expect it to as we expect it to. Examples :Let ’s say a hacker ha s compromised a web server of a bank and put it down. You as an authenticated user want to do an e-banking transfer but it is impossible to access it, the undone transfer is a money lost for the bank. Benefits of Computer Security awareness : Most of the security breaches come from uninformed and untrained persons which give information to a third party or publish data in Internet without knowing the consequences. So the benefits of computer security awareness are obvious as it directly minimizes the potential of you being hacked off your identity, your computer, your organization. Read the full article
0 notes
Text
How to Choose a VPN ( Virtual Private Network ) Service ?
There are many options to choose a Virtual Private Network service on the Internet. Some are free, some have monthly subscription pack. Before you select a VPN service make sure you consider these factors for VPN :

Cost : VPNs are not too costly , but it vary from vendor to vendor. If your budge is low or you does not want to invest money for buying VPNs, then you can go with free Virtual Private Network services. This services will give you basic security but they are usually supported by advertisements. If you want to pay, you can purchase a subscription to VPN services, which will vary in price from $2 to $10 per month. Reliability : Choose VPN which is reliable. Read the reviews to make sure that the VPN server will give you the perfect protection for your Internet. Security : A good VPN will have features like 128 bit encryption, anonymous DNS server and no connection log. Bandwidth limit : Bandwidth limit is linked with pricing. If you pay more you get more bandwidth with faster Internet access. Apps for Android, iOS Phones and Tablets : Make sure that your VPNs have an App option. Virus Protection : Some Virtual Private Network providers gives a virus and malware protection options, it increase your online safety. Most VPN services run on all popular operating systems for computers and devices.
Some popular VPN s are :
ExpressVPV : Number of servers : 1800+ Server location : 148 IP addresses : 30,000 Maximum supported devices : 3 Costs: For 15 months $6.67/month, 6 months $9.99/month, 1 months $12.95/month. You can visit the site here.
NordVPN : Number of servers : 2029 Server location : 61 IP addresses : 2,000 Maximum supported devices : 6 Costs: For 24 months $3.39/month, 12 months $5.75/month, 6 months $7/month. To visit the site click here.

Cyber Ghost : Number of servers : 11 09+ Server location : 44 IP addresses : N/A Maximum supported devices : 5 Costs: For 12 months $5.99/month, 1 months $11.99/month. For more details you can visit the site.
IPVanish : Number of servers : 950+ Server location : 60+ IP addresses : 40,000 Maximum supported devices : 5 Costs: For 12 months $6.49/month, 3 months $8.99/month, 1 months $10/month. For more details click here.

Hide My Ass : Number of servers : 830 Server location : 280 IP addresses : 3100 Maximum supported devices : 5 Costs: For 12 months $6.56/month, 6 months $8.33/month, 1 months $11.52/month. You can get more information from here.
Golden Frog VyprVPN : Number of servers : 1800+ Server location : 148 IP addresses : 30,000 Maximum supported devices : 3-5 Costs: For 12 months $6.67/month, 1 months $9.95/month. Please click here for more details.

PureVPN : Number of servers : 500+ Server location : 180 IP addresses : 95,000 Maximum supported devices : 5 Costs: For 6 months $9/month, 1 months $10.95/month. Visit the site from here. Read the full article
0 notes
Text
VPN : Virtual Private Network
A VPN is a simply a secure connection over a public network. In old days two people wanted to communicate, they had to lease an expensive private line and run their own private network. But in this age they can use public network like public WiFi. But Internet is insecure. If you want to communicate securely on internet, they need to secure this connection. They need to create a virtual private network on top of the physical public network. A VPN does it.
VPN Protocols :
Different VPNs provide security through different cryptographyc protocols. Most common protocols are Internet Protocol Security ( IPSec ) and Secure Sockets Layer (SSL). Some VPNs also provide Layer 2 access to the target network , these will require a tunnelling protocol like Point-to-Point Tunnelling Protocol (PPTP) or Layer 2 Tunnelling Protocol (L2TP) running across the base IPSec - connection. Uses of VPN : VPNs have two main uses. The first is to connect disjoint parts of the same network. A corporation might have two offices on different sides of the planet. Each office has its own physical network , and the two networks are connected by VPNs running over the Internet. VPNs are more private than a "private line" provided by the telephone company. The second use is to connect mobile users: users working from home and users working out of hotel rooms. The old way to bring these users into the large network was to have them dial in directly, often long distance. This is expensive, and forces the company to maintain a large bank of modems. The modern way is to have the users dial in locally to an ISP, and then connect from the ISP to the company over the Internet. To secure this connection, VPNs run from the user's computer to the network. Advantages of VPN : By adding VPNs to your laptop, smartphones, or tablet you will have a secure connection over free wireless Internet to access sensitive and private accounts - email or your bank account. When you only have public Internet, you simply launch the VPN-program when you connect to the signal. This will create your own secure, private network over the Internet and encrypt any data you share. Hackers can't see while you log in to your email or bank account. If you're in a sensitive personal or business situation, your security will improve by using a VPNs when you connect over free WiFi. Who Needs a VPN : We all use Internet from a computer, a smartphone or a tablet. A VPN service encrypt your activities, prevent thieves from watching and recording what you do. So, both private and business users need to use VPN services. Read the full article
0 notes
Text
What Is Cloud computing? And Why We Use Cloud Computing ?
Cloud Computing is an Internet based development and use computer technology. The term Cloud refers to a network or Internet. In other words, we can say that Cloud is something which is presently at remote location. Cloud can give services over network i.e on public networks on private networks i.e WAN, LAN or VPN.

What is Cloud Computing?
Could Computing refers to manipulating, configuring and accessing the applications online. It offers online data storage, infrastructure and application. Cloud Computing is a term used for hosted services delivered over the Internet. A Cloud service has three distinct characteristics which differentiate it from traditional hosting - It is sold on demand - typically by the minute or the hour. It is elastic in terms of usage - a user can have as much or as little of a service as he/ she wants at any given time. The service is fully managed by the provider - a user just needs PC and Internet connection. Hence, the Cloud Computing is making our business application mobile and collaborate. Why Cloud Computing ? Cloud Computing has many advantages : Applications and data can be accessed from anywhere at any time. Data may not be held on a hard drive on one user's computer. It could bring hardware costs down. One would need the Internet connection. Organisations do not have to buy a set of software or software licenses for every employee and the organisations could pay a metered fee to a Cloud Computing company. Organisations do not have to rent a physical space to store server and databases. Servers and digital storage devices take up space. Cloud computing gives the option of storing data on someone else's hardware. Organisation would be able to save money on IT support because organisations will have to make sure about the desktop and continuous Internet connectivity instead of servers and other hardware. Deployment Models of Cloud Computing services : Deployment models define the type of access to the Cloud. i.e how the Cloud is located? Cloud can have any of the four types of access - Public Cloud : A Public Cloud sells services to anyone on the Internet. It allows systems and services to be easily accessible to generate public. When a service provider uses public cloud resources to create a private cloud the result is called a "virtual private cloud". Examples of Public Cloud are Google, Amazon, Microsoft etc. Advantages: Since Public Cloud share some resources with a large number of consumers, it has low-cost. Public Cloud is also based on pay-per-use model and resources are accessible whenever consumer needs it. Disadvantaged :In Public Cloud model, data is hosted off-site and resources are shared publicly, therefore does not ensure higher level of security. It is comparatively less customisable than private cloud. Private Cloud: A Private Cloud is like a data center that supplies the hosted services to a limited number of people. The private cloud allows systems and services to be accessible with in an organisation. It operated only within a single organisation. However, it may be managed internally or by third party. Advantages: Private Cloud operations are not available to general public and resources are shared from distinct pool of resources. Therefore, it ensures high security and privacy. It have more control on its resources and hardware than public Cloud because it is accessed only within an organisation. Private Cloud resources are not as cost-effective as public clouds but they offer more efficiency than public cloud. Disadvantage : Private cloud is only accessible locally and ips very difficult to deploy globally. It can be scaled only within capacity of internal hosted resources. In order to keep up could deployment, organisation requires more skills and expertise. Hybrid Cloud A Hybrid Cloud is a mixture of public and private cloud. Non-critical activities are performed using public cloud while the critical activities are performed using private cloud. Advantage : Hybrid Cloud offers both the public and private scalability. It offers both secure and scalable public resources. Since Hybrid cloud, therefore it can have some savings. Disadvantage : Hybrid Cloud becomes complex due to presence of private and public cloud. The Hybrid Cloud is dependent on internal IT infrastructure. Therefore it is necessary to make sure redundancy across data centers. Community Cloud : A Community Cloud allows system and services to be accessible by group of organisations. It shares the infrastructure between several organisations from a specific community. It may be managed internally or by the third party. Advantage :Community cloud offers same advantage as that of private cloud at low cost. Sharing Between Organizations Community cloud provides an infrastructure to share cloud resources and capabilities among several organizations. It is comparatively more secure than the public cloud. Disadvantage : Since all data is housed at one location, one must be careful in storing data in community cloud because it might be accessible by others. It is also challenging to allocate responsibilities of governance, security and cost. Service Models of Cloud Computing: Infrastructure-as-a-service (IaaS): It provides virtual servers with unique IP addresses and blocks of storage on demand. Customers benefit from an Application Programmable Interface (API) from which they can control their servers. As customers can pay for exactly the amount of service they use, like for electricity or water, this service is also called utility computing. Platform-as-a-service (PaaS): It is a set of software and development tools hosted on the provider's servers. Developers can create applications using the provider's APIs. Google Apps is one of the most popular PaaS providers. Developers should take notice that there are not any interoperability standards. Therefore , some providers may noy allow you to take your application and put it on another platform. Software-as-a-service (SaaS): It is the broadest market. In this case, the provider allows the customer only to use its applications. The software interacts with the user through an interface. These applications can be anything from Web-based E-Mail to applications such as Twitter. Cloud Computing Applications: Cloud Computing has its applications in almost all the fields such as business, entertainment, data storage, social networking, management, entertainment, education, art and global positioning system, etc. Some of the widely famous cloud computing applications are discussed here. Business Applications Cloud computing: 1. MailChimp :It offers an e-mail publishing platform. It is widely employed by the businesses to design and send their e-mail campaigns. 2 Chatter: Chatter app helps the employee to share important information about organization in real time. One can get the instant feed regarding any issue. 3 Google Apps For Business: Google offers creating text documents, spreadsheets, presentations, etc., on Google Docs which allows the business users to share them in collaborating manner. 4 Quickbooks : It offers online accounting solutions for a business. It helps in monitoring cash flow, creating VAT returns and creating business reports. Data Storage and Backup: 1 Box.com: Box.com offers drag and drop service for files. It just required to drop the files into Box and access from anywhere. 2 Mozy : Mozy offers online backup service for files during a data loss. 3 Joukuu :Joukuu is a web-based interface. It allows to display a single list of contents for files stored in Google Docs, Box.net and Dropbox. Management Applications: There are apps available for management task such as time tracking, organizing notes. Applications performing such tasks are discussed below: 1 Toggl : It helps in tracking time period assigned to a particular project. 2 Evernote : Evernote is an application that organizes the sticky notes and even can read the text from images which helps the user to find the notes easily. 3 Outright It is an accounting app. It helps to track income, expenses, profits and losses in real-time. Social Applications: There are several social networking services providing websites - 1 Facebook : Facebook offers social networking service. One can share photos, videos, files, status and much more. 2 Twitter : Twitter helps to interact directly with the public. One can follow any celebrity, organization and any person, who is on twitter and can have latest updates regarding the same. Entertainment Applications : 1 Audiobox.fm : It offers streaming service, i.e., music can be stored online and can be played from cloud using service's own media player. Art Applications: Moo : It offers art services such as designing and printing business cards, postcards and minicars. Cloud Computing Providers: Various Cloud Computing platforms are available today. 1 Salesforce.com :This is a Force.com development platform. This give a simple user interface and lets users log in, build an app and push it in the cloud. 2 Appistry :The Appistry's Cloud platform is efficient in delivering a runtime application platform. This platform is very useful to create scalable and service oriented applications. 3 AppScale :The AppScale is an open source platform for Google App Engine applications. 4 AT&T :The AT&T allows access to virtual servers and manages the virtualization infrastructure. This virtualization infrastructure includes network, server and storage. 5 Engine :Yard The Engine Yard is a Rails Application cloud computing platform. 6 Enomaly : Enomaly provides the Infrastructure-as-a-Service platform. 7 FlexiScale :The FlexiScale offers a cloud computing platform that allows flexible, scalable and automated cloud infrastructure. 8 GCloud3 : The GCloud3 offers private cloud solution in its gPlatform. 9 Gizmox :The Gizmox Visual WebGUI platform is best suited for developing new web apps and modernize the legacy apps based on ASP.net, DHTML, etc. 10 GoGrid :The GoGrid platform allows the users to deploy web and database cloud services. 11 Google : The App Engine lets the users build, run and keep up their applications on Google's infrastructure. 12 LongJump: The LongJump offers a Business Application Platform, a platform-as-aService (PaaS). 13 Microsoft : The Microsoft's Windows Azure is a cloud computing platform offering an environment to create cloud apps and services. 14 OrangeScape : OrangeScape off ers a Platform-as-a-Service (Paas) for non spreadsheet.programmers. Building an app is as easy as 15 RackSpace : The RackSpace provide servers-on-demand via a cloud driven platform of vitalized servers. 16 Amazon EC2 : The Amazon EC2 (Elastic Compute Cloud) lets the users configure and control computing resources while running. Read the full article
0 notes
Text
6 Best Mobile Security App And Antivirus.
New technologies such as the Internet have drastically changed our methods of communication. We are "netizens" , we spend a vast amount of time on Internet. The range of mobile users is wide. School students to teenagers, adults to senior citizens are use internet with their smart phones. In this era we must be aware of cyber threats on our PC as well as on our mobile devices. For this reason Mobile Security App is necessary for our android phones. Mobile phones are very sensitive, it contains our personal documents and photos. Mobile device security prevent the mobile scam, and keep your personal data private & safe. AV TEST AB TEST is an independent organization which evaluates and rates antivirus and security suite software for Microsoft Windows and Android Operating Systems, according to a variety of criteria. They publish their results every second month and awarded their certification.

Avast Mobile Security App
Avast is the most popular antivirus for your android phone. This mobile security app offers automatic virus scans of the content of your device and memory card. Avast antivirus has also app analyzing option. This analyze the apps before download whether the app is at risk with its malicious data or not. Call blocking and filtering option helps you to limit your unwanted calls. You can download this app from Google Play Store. Avast mobile security system has both free and premium versions. Premium version costs $14.99 per year. But free version gives you most of the features.

Norton Mobile Security:
Norton is an award winning mobile security app. It gives proactive protection for smart phones and tablets. Norton gives you an alert when you download a free app from Google Play Store. The app advisor of Norton tells you about malware, privacy and other risks on downloading that free app. You can back up your contacts if contacts are deleted accidentally or if you want to transfer them to a new device. Now a days we all use internet in our smart phones and tablets. But mobile scams are a biggest threat than ever. With Norton antivirus protection you can keep your personal information private by remotely locking a lost or stolen mobile device through their website. This antivirus software costs $29.99 per year . It secures your android, ipad and iphones with a single subscription. There is a free trial of the premium version for 30 days, which gives you to access all the features of Norton mobile security app.

Bitdefender Antivirus software: Bitdefender mobile security app gives total protection from viruses. Recently Bitdefender add a new feature. With this feature you get to see whether your email account details have been leaked or not. Its Anti-Theft Module provides option to remotely locate, lock, wipe or send a message to the Android device. Your phone will take a snap of any person who tries to tamper with your phone in your absence and send it to Bitdefender Central. Other newest features like app lock, pin time out, fingerprint sensor support, smart unlock make the app best mobile security product of the year 2015 and 2016. This virus protection app uses the Bitdefender Cloud Services to alert users, when browsing webpages that contain malware, phishing, or fraudulent content. It also make sure that your Android device stays clean by automatically virus scanning any application immediately after its install. According to March 2017 AV Test Bitdefender Mobile Device Security gives 100% virus detection. It costs $15 per year.
Lookout: Lookout is another superb mobile security app for your Android phones and tablets. This mobile security app gives a mobile-first and cloud-first approach that secures your mobile data from malicious attack. It has the ability to virus scan your apps and websites to prevent your phone being infected with viruses or having any personal information stolen. This mobile antivirus has the feature Anti-Theft that backs up all your data on secure servers. And also has tracking feature that locate your phone on map. Lookout premium costs around $2 per month. It also has a free version which gives you only app security and phone location feature.

McAfee Mobile Security App: McAfee wins Silver Award of Info Security, USA, February 2017. AV Test certify its Android Security. This best mobile security app guard against viruses, spyware and malicious websites. It protect users on social media. This antivirus software's another feature lock and wipe prevents misuse of your personal data. It take a snapshot of the person holding your lost device with capture cam that make you stress free. Another handy feature of McAfee mobile security system is Battery Optimizer, it helps to boost your phone. McAfee premium costs $29.99 per year.

Kaspersky Internet Security: Kaspersky's powerful virus protection app blocks malware and dangerous links. This mobile antivirus filters un wanted calls and texts on your device. If your device has lost its remote tool keep your personal data secure. Kaspersky has both free virus protection and premium protection option. Free version offers manual scan for malware, data protection (if your device is lost or stolen), android wear and simplicity features. Premium version have automatic virus scan, anti phishing, call and text filtering and confidentiality options along with free features. Kaspersky mobile security app premium costs $14.95 per year. You will get a 30 day free trial on downloading the app. Your phone and tablet can be as vulnerable as your PC. That's why, when you are surfing or socializing you need to protect your mobile life. Mobile security systems are keep your android phone safe from malware. You can check other mobile security systems from here. Mobile device security becomes a must have feature for your android phones and tablets. So which one is the best mobile security app for your android ? Read the full article
0 notes
Text
Choose Your Two-Factor Authentication Option : It Is Very Important.
♦In the present networked world with the remarkable development in digital sector, single factor authentication e.g. password, is no more as secure in the World Wide Web. Simple, unsafe and easy-to-remember passwords are easily found via computerized secret key gathering programs. The security and privacy threats through malware are constantly increasing both in quantity as well as quality. Obliging more than one independent factor increases the difficulty to providing false credentials. Two-factor authentication gives a higher protection level by extending the single authentication factor. In this blog I will discuss about the implementation of two-factor authentication method.

Why Two-Factor Authentication is Necessary:
Most systems today works on static passwords to verify the user's identity. Users also have a tendency to use simple, easy-to-remember password and they reuse them on different sites. They write their passwords store them on their system or asking the websites for remembering their password etc. Using static passwords in IT system is like to present themselves to Hackers, ID Thieves and Fraudsters. In addition, hackers have the preference of using many technique such as guessing attack, shoulder surfing attack, dictionary attack, social engineering attack etc. to steal passwords do as to gain access to their log in accounts. To solve the password problem in the banking sectors and for online transaction two-step verification using OTP and ATM pin/ cards have been implemented.

Multi-Factor Authentication and Two-Factor Authentication:
Multi-factor authentication is a security framework on which more than one password of confirmation is executed to confirm the authenticity of an user. In two-factor authentication, the user provides dual means of identification, one of which is typically a physical token, such a card and the other of which is typically something memorized, such as a security code. The goal of multi-factor authentication is to create a layered defense and make it more difficult for an unauthorized person to access o target such as computing device, network and database. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before breaking into the target. Multi-factor authentication is a system where in two or more different factors are used in conjunction to authenticate. Using more than one factor is sometimes called "strong authentication". Methods of authentication: Authentication to access a login account, accessing social engineering accounts, reading online news paper, online ticketing are carried out by Alpha-Numeric Password or Graphical password. Alternative authentication come in the form of Biometric Authentication using finer print, irish recognition and heart beat. Universally today existing acknowledged three authentication factors are: ♦ what you know like Alphanumeric passwords, Graphical Password ♦ what you have like ATM card or tokens ♦ what you are like Fringerprint, Thumb impression, Iris recognition, Heart Beat called Biometric Authentication. The Biometric-based authentication is relatively expensive and raises privacy concerns. One Time Passwords (OTP) offers a promising alternative for two-factor authentication systems. Drawbacks with OTP generation aer is an additional expense for the user. User has to carry the device in which he gets the OTP whenever he needs. How Do You Set Up Your Two-Factor Authentication: Before choosing any online services especially your email and financial account you should add two-step verification or two-factor authentication. This two-step verification prevents your account from being hacked because it requires two separate things : Something you know ( your password ) and something you have in front of you ( the temporary code ). Even if a hacker knows your password, he would not be able to get into your account without entering the verification code. If an online service offers multi-factor authentication and you want to keep your transaction secure, enable and use this function. Twitter, PayPal and thousands of other services offer this capability. To boost your security set two-step verification for your online bank and credit account. Every Bank's website differs but you'll want to look under your profile or account settings. Find the security or privacy section and look two step verification. If you can't find this setting, don't worry but don't give up. Contact your bank's customer service by calling the number on its website. They will explain how to set up this important security feature. You can put two-factor authentication on your email accounts. Here I give you some guideline on where to find two-factor authentication settings at the top providers. Gmail: To set up two-step verification on Gmail account visit : www.google/2step . While logged into your account, click the circle at the top of the page and then select My account. Under Sign-in & Security choose Signing in to Google. Then turn on 2-Step Verification. Google gives you a couple of two-step options. You can choose to have a code sent via text message or get Google to call you and provide the code over the phone. You will need to enter the code before you can successfully access your account. Don't worry, you won't need to do this each time you log in. You can designate safe devices through Gmail and won't need to enter a code every time you want to use the account. When signing in on a personal ( private ) computer, check " Don't ask again on this computer." Another option is called Google Authenticator - an app. You can download on your smart phone that will generate the secret code without any Internet connection. You will need to open the app when signing in to your account to access the code. Download the program from the app store you use. You also can use a physical security key, sometimes called a key fob. This device stay linked to your account and continuously generates new codes. To use a security key for Gmail, you will have to purchase the fob separately ( about $30-$50 ) and set it up on the site. Yahoo: Once you successfully create your email address, click the gear icon and then Account Info. Sign in again. Next,click Account Security and then Two-Step Verification. Yahoo will give you three options. You can have a code sent to your phone via text message or receive a phone call with the code. By default, you will only need to enter a code the first time-out sign into your account from a new device. If you have the Yahoo app on phone, you can also user the Yahoo Account Key. To enable it, open the Yahoo app and tap your Profile image. You will see a key icon that represent Account Key - click on that. Click through to view a sample notification and see how the app works. Finish the setup by tapping Yes to enable the program. once you have enable Account Key, you won't need to enter your password or a special code. When you sign in to your Yahoo account, a notification will be sent to your phone. You will tap Yes to verify that you're signing to your account. AOL: AOL also offers free email with two-step verification. Once you have entered your information and created your email address, visit the Account page and sign in again. Under the 2-Factor Authentication section, select Setup. Next, enter your phone number and choose text message or phone call to receive your code. AOL will send you the verification, which you will enter. Then click Verify and select Turn On. Outlook: Anyone can create a free email account at Outlook.com, the same services as Microsoft's Live.com. Once you create your account, sign in. Choose the Security & Privacy option on the page header. Scroll down and select Set Up Two-Step Verification. You can verify your identity with a phone number, an alternate email address, or the Windows app. If you select a phone number, Microsoft will send you the code via text message. To generate login codes without an Internet connection, you can also download the Microsoft Authentication or Google Authenticaticator. Two-factor authentication solution equips customers with flexible and strong authentication to very large scale. However, since fraud is still being reported with two-factor authentication, it shows that it is not totally secured. Only the fraud rate is reduced as compared to that of one-factor authentication. As per defenders two-factor authentication cauld definitely lessen the occurrence of online fraud, and other online extortion. So every common people have to apply this two-factor authentication in their online life. Try it and share your experience here. Read the full article
0 notes
Photo

Hackers stole more than 1 billion roubles ($17 million) from Russian banks using the Cobalt Strike security-testing tool in 2017.
0 notes
Text
A new bug was Spotted by Italian Blog Mobile World. It asks users to send a single character from Telegu - a native Indian language. Once the recipient receives a simple message containing the symbol or typed that symbol into the text editor, the character immediately instigates crashes on iPhones, iPads, Macs, Apple Watches and Apple TVs running Apple's iOS Springboard. The character can disable third-party apps like iMessage, Slack, Facebook Messenger, WhatsApp, Gmail, and Outlook for iOS, as well as Safari and Messages for the macOS versions.
0 notes
Photo

California-based security firm Malwarebytes Labs discovered that a malvertising campaign is targeting Android users and forcing their smartphones to mine Monero or XMR cryptocurrencies for a short period of time.
0 notes
Text
Best 5 Password Manager for Common People.
Are you using the password like "123456" or "password" ? They are easy to remember but... easy to crack. Most of us use weak password and reuse them.I know that, every common people have to remember as many as 100 password each day. Every site ask you to create a separate user-name and password. Your financial and Gmail account needs a strong and hard to hack password. How can you remember all these password ?The solution is password manager.
Password Manager

A password manager will store your password, remember your password and keep it strong and uncrackable. It will enhance your safety and make your online life easier. For this reason security experts encourage people to use password manager. Most password managers have paid and free versions of their software. They offer two-step-verification security. The free version works on only one device. And paid version works on all your computer, smart-phone, tablet, and any other device you use. Here I discus about the best 5 password managers.

LastPass password Manager: Last Pass is one of the best password manager. It offers both free and paid versions. Last Past Premium costs $12 per year and can be used on an unlimited number of devices. It stores your encrypted passwords in the cloud rather than on your local device. Both the premium and free version alerts you to weak passwords. This password manager automatically change a password when a service has been hacked or compromised. It supports two-factor-authentication for your password vault using Google-Authenticator. The service recently revised with a some more features like credit monitoring, secure password, document storage, notifications when a site you have an account with has been hacked, tools to autofill forms and streamline online shopping and more. Last Pass supports Windows, macOS, Linux, Android iOS, and Windows Phone, and has plugins for chrome, Firefox, Safari, Opera, and Microsoft Edge.

Dashlane: This is a widely used password manager. It store your encrypted passwords on your device ( locally ). This password manager generate strong password, use autofill technology to complete forms with your information, rate your current passwords and have two-step-verification. Dashlane will also tell you if you have an account on a site that's have been hacked. And with it's built-in password manager, you can reset the password to a new unique, strong one without leaving the user interface. Dashlane has both a free and Premium versions. Dashlane Premium allows you to back up your encrypted password file to the cloud, and it's cost $40 per year.

Kee Pass: Kee Pass is a free, open-source program that you can download and use on all of your devices. It stores your passwords locally and you can download browser plugin so Kee Pass will auto fill your logins. This password manager has its own password It also has two-step-verification options, that helps you to generate unique strong passwords. This is also a portable app, it is super easy to take with you and use on multiple computers, even if the machine is locked down and all you have in a pen drive. With the help of Kee Pass you can even create physical password key in the form of pen drive or CDs. Kee Pass has a lot of third-party plugins and tools to extend its functionality and bring it to more devices, browsers, and platforms.

1Password: 1Password manager is a very popular password manager. It is flexible and easy to use. This password manager works seamlessly in just about every web browsers. It stores your encrypted password vault in its own cloud storage device. You can also set up an emergency kit as a safety net and share passwords with authorized users. You can keep multiple vaults for different types of passwords. 1Password has two service tiers: 1Password and 1Password Families. A single user can get 1Password for $2.99/month. 1Password Families cost $4.99/month for up to 5 people and additional members cost $1 extra per month. Each family member will have his or her own account, but you can easily share information with others via the app. Both the single and family programs allows you to install the program on all of your devices and have autofill technology and a password generator. 1Password supports Windows, macOS, Linux, Android iOS, and Windows Phone, and has plugins for chrome, Firefox, Safari, Opera, and Microsoft Edge.

Sticky Password: Sticky Password is a popular, easy-to-use, time sever and absolutely secure password manager. It can take care all of your data that you are expected to entre online, such as your date of birth , full address, phone number ctc. This password manager secure your data in encrypted format. This has password generator to generate extra strong new passwords, when ever you need. Sticky password manager also stores credit card numbers for express checkout. It also offers biometric authentication i.e fringerprint scanning. One of the optional benefits of Sticky Password is you don't have to synchronise only via our cloud servers. The synchronization can be made over local Wi-Fi or manually. Sticky password manager has both free and premium versions. Premium version costs $ 29.99 per year. Sticky password manager works on your computer, Mac, Android iOS, Tablets and Smart phones. Read the full article
0 notes
Photo

On February 5, a phishing attack compromised the information of 100 Waldo County employees in Maine.
0 notes
Text
How to Create a Password That's Easy to Remember but Hard to Hack

A password is a word or string of characters used for user authentication to prove identity. It protects documents. You can prevent unauthorized access with the help of it. Almost every services need to set up a separate username and password. If you have to work on computer then you have to manage as many as 100 or more passwords. Researchers estimate that half of us use weak passwords and other half re-use fewer passwords across all over online accounts. simple, unsafe and easy-to-remember passwords are easy to break. When we re-use the same password, cyber criminals harvest it from services that have been breached and then use automated tools to decide what other services this passwords will unlock. For this reason, it is essential to use a separate, unique and strong password for each different online account. Then you need a safe way to record and access these passwords or you have to make a trick to remember these passwords. Otherwise you will not be able to gain access to your accounts! So what can you do ?

Password Manager
A password manager will enhance your safety and make your online life easier. Most ot it have paid and free version of their software. They also offer two-step verification security. The free version covers all your devices like computer, smart phone, tablets etc. Some options are: Dashlane: It's a paid version, Dashlane Premium costs $39.99 per year and covers all your devices and free version works on only one device. Last Pass: It has also two version. Last Pass premium costs $12 per year and can be used on unlimited number of devices. There are many more device like Pass Word iCloudKeychain Kee Pass Etc.

Mnemonic Password:
The Encrypted Pocketbook of Passwords is a physical password journal that uses secret keys, so even if the book is stolen , the thief would still be unable to guess your pass words, unless he or she knew your secret keys. This book conveys: ◆ Each account of any value must have a unique and separate password. ◆ It is okay to write most of each password, as long as you don't write out enough of each one that the missing piece can be guessed. ◆ You also need to keep any written information as secure as possible Most thieves know that passwords are usually written and kept within 3 feet of the device so you should be aware. You should keep any physical journal ad hidden as possible. I also recommend keeping 2 journals , so if one is stolen or missing, the back up can be used to recover and change the passwords.

Create Goal Setting Password: Goal Setting Passwords strategy creates a strong but memorable passcode that works very well when you need to change your passcode regularly. Not only will this method help you remember your password, but every time you type it, you"ll reinforc your goal too. Some examples: Lift weights twice a week ~ L!ftw3!ght2x@w33k Eat more fruits and vegetables ~ 3@t>fruit&v3g3t@bl3s

Mnemonic Passwords: Mnemonic is a ideas, a pattern of letters or associations that help in remembering something. Recall that when you were a student you will use this method to remember things like the colour of the spectrum, order of the element in periodic table. If you can remember these catches phrases, you can recall a strong password. To start, you first need to pick a phrase - lyrics from a favorite song, a line from a poem or prayer or any phrase you can remember. Let's say you pick the poem "Twinkle Twinkle Little Star, How I Wonder What You Are" . You take the first letter from each word in the phrase and get: TtlrhiwwY@ It is strong than "123456" . But you have to need to add some strength by adding some special characters, symbols, numbers, uppercase letters : Tt1$hiWwY@. Now you have a password that's tough for hackers to break but still easy to remember.

Another tips for passwords: Long Passwords that use random words are stronger than using 8-12 characters that include lot of random characters. For example: !@fgh5yr it could be cracked within a few minutes. But L@mbservensquidfortypurpleepsilon takes days or even week to crack due to its length. So create strong unique and long password for every online access. Choose any tactics to create your online passwords , to remember it, and to recall it at any time. If this topic helps you to make and remember Passwords for your online accounts , then share your experience. Read the full article
0 notes
Text
Intel is releasing new firmware updates that should address Spectre vulnerabilities CVE-2017-5715 for Skylake processors.
0 notes
Text
What Everyone Ought To Know About Cyber-Security

What is Cyber ? What is it's Security? And why we have to secure our personal Cyber-Space? According to english dictionary Cyber means - relating to or characteristic of the culture of computers, information technology, and virtual reality. Cyber-Security is the personal behaviours and actions you take to protect yourself in the online world from identity theft, frauds, other crimes for stealing your personal information and data. A large number of people manage their personal online security very badly, and so many organizations do the same. Cyber criminals have a vast range of targets to choose from. There are three types of tactics that cyber criminals use: A Credential Attack: If you have to remember too many passwords, you reuse the same password. Cyber criminals manage to break into the servers for one of your online services. They stole all the username and password details and then use automated tool to decide where else those same details works. This way they stole all of your personal information. A Malware Attack: You are running out-of-date software and your anti-malware is ineffective. You don't know when your screen froze with a ransomeware and demand for money to release your device. A confidence Trick: You received an email that appeared to come from your dealer with a change of bank details for the balance transfer. After the transfer was made, you discovered that the email was a fraud. Protecting yourself from these three types of schemes and staying safe online requires 3 main aspects of personal security: Securing Online Services Securing Digital Device Avoiding Scams Here I discuss about how you can enhance your online anonymity. Here I give the primary, important security steps that digital device users can quickly and easily read and implement. If you carry out all these steps, your security will not be perfect, but it should be adequate to protect you from 99% of cyber threats. Securing Online Services

No more mistakes with password Almost every service seems to want us to set up a separate username and password. Most people now manage 100 or more passwords. The problem is that over 70% of us re-use passwords across all our online accounts. Cyber criminals know that. They harvest passwords from services that have been breached and then use automated tool to find what other services these passwords will unlock. For that reason, it is essential to use a separate, unique and strong password on each different online account of value. Never Lose Your Two-Step-Verification Option. To boost your security, set two-step-verification for your online bank and credit accounts. Every bank's website differs, but you will want to take under your profile or a/c settings. Find the security or privacy section and look for two-step-verification. If you can't find two-step-verification setting, don't worry, contact your bank's customer service. They will explain how to set up this. You also put two-step-verification on your email accounts.
Privacy and Security Settings
All applications like to gather and share as much information about their subscribers as possible. Sadly, cyber criminals can also gather a lot of information about you through the information you allow to be publicly accessible and they may steal it from service providers. However, there are usually a number of security and privacy settings that you can select to increase your online safety. Use Free WiFi Cautiously Use of free WiFi is okay except for checking your email or conducting financial transactions. If you need to use public WiFi, you should have a Virtual Private Network (VPN). This program will encrypt your activities, preventing thrives from watching and recording what you do. Encryption For any online service where you are storing files that you consider to be sensitive in any way, make sure you find out what the encryption options are and apply them appropriately. If there are no 'built-in' encryption options you can encrypt files yourself before you upload them. encryption converts something readable (ciphers something) into something that is not readable unless you have the correct 'key' to unlock and view it. If I store a copy of encrypted documents and images, anyone who accesses them without the key cannot read them unless he or she breaks the encryption or obtains a copy of the decryption key. Make Your Backup Reality Keep your readily accessible copy ( a Backup ) of information store with proper security. If your online a/c become sabotaged or unavailable you can use your backup files. Only Use Secure Devices If you need to go online from a untasted device, perhaps a public terminal at an airport, be sure to change your password as soon as you get back to using a secure device. Your service will be at risk untill you do so. Limit Credit Cards If you must attach a payment method to an a/c, it is highly advisable to make sure that it has strict financial limits. For example, I could use a prepaid credit card to avoid the possibility of any one over-spending its balance. If any one initiated a transaction that tried to break the payment limit, it should be automatically declined. Tighten Your Privacy Settings on Social Media The fun in social media involves sharing news photos with your friends and family. Unfortunately, hackers have taken advantage of people's loose security settings to get their personal information to use in hacks and other frauds. Good cybersecurity requires having strong privacy settings. Take a moment now to check your privacy settings on all your social media profiles. Securing Digital Devices

Controlling Installation Privileges Most malware cannot install itself if you are not logged in with administrative permission. If you set up a separate administrative a/c and most types of malware try to get into your system, you will receive an unexpected prompt asking you to entre your administrative password. This way you can prevent a large number of attempts to install unwanted or malicious software. Install only trusted software. Updating Software Keep your device (smart phone, laptop, computer...) up to date with the very latest updates. If some programs no longer receive support and updates, this means this device will have security gaps. Install Antivirus Software Now In order to safely run your digital device, you must install antivirus software. In addition to your antivirus protection, you can add a free malware removal program call Malware bytes that works on Windows and Mac. Don't forget that your smart-phone and tablets need good antivirus protection. Add Passcode To Your Devices In early days of smart phones, a 4-8 digit passcode secured your phone. But now both Apple and Android have boosted their security option. New iPhones running: SO9 or higher have 6-8 digit passcode by default. This offers greater hacking protection. Android phone offers a lock pattern, 4-digit passcode, or up to 16 character password. Security expert warn that others could guess your pattern by seeing finger prints on the phone. The 16 character password provides the most security. Securing Connections ( USB and Router ) USB devices give an easy way for malware infections to spread. If a USB device has been plugged into a digital device with an infection, it can transfer that infection to the other devices to which it is attached. Be carefull with USB devices. Set up the strongest password for your Wireless Internet Connection. Device Firewall Another important security measure is a device firewall, which is like a digital brick wall. The only electronic information that can pass through it must meet certain criteria and pass certain tests. Many operating systems and device firewalls as standard. This security technology is also included with many anti-malware solutions. The key step is to check to see if your device has a firewall and to make sure it is turned on. Because there are so many devices, the simplest way to check is to Google your operating system with the word "firewall" and find out what the option are. For example, Windows includes Windows Defender as a built-in firewall option, and there are also additional enhanced firewall products available. Avoiding Scams

Cyber criminals develop many types of ploys and scams to try to get you to reveal information about your access. Many of these scams are just like the confidence tricks of odd-like lottery scam or the rich prince scams, they prey people's' tendencies to trust others or to seek easy money. Create A Secret Email Address Create a secret email address for your financial accounts. Make sure your secret email address reveals nothing about you: your first name, last name, personal information in your username. Set up it with the strongest possible security settings. Scam Email And Websites ( Phishing ) The term Phishing is used to describe the ways in which cyber criminals try to entice you to release information or give them unintended access to something you actually want to keep secure. If you receive a unsolicited communication you should always regard a suspicious communication. If you have any doubts - do not go ahead to open the email or click on a link. Phone Scams - Vishing and SMiShing Increasingly, Phishers target smartphoes and tablets by sending text messages with malware links, a fraud called "SMiShing". When you suddenly receive a text message link from your phone company, you cannot decide its legitimacy. Don't click , call the company directly or visit its website on your own to pursue the matter. Some Phishers rely on less-technical schemes to get your personal information. They calls ( Vishing ) you impersonating a business or organization and ask for your personal information so they can later use it to compromise your identity or financial accounts. If you get an unsolicited call and doubts its legitimacy, ask to call them back. Hang up the phone, look up the company's customer service number, and call that number directly. Read the full article
0 notes
Photo

Sending and receiving any information over the Internet is somewhat similar to travel through unsafe territory.
0 notes
Photo

We use online money transfer, bill payment, submission of income tax and value added tax (VAT), but how far we know about its security? Are we vulnerable to the hackers?
0 notes