news details |
|
|
Importance of Technology in our lives | | Yasir Altaf Zargar | 3/23/2015 10:58:16 PM |
| The inventions of science and technology bought massive changes in our lives. The world is changing at a speed we could never have imagined it before. With the increase in technology we are bound either to use it or to behave like Stone Age man. The day by day increase in technology changed the whole system, from letters to e-mails, from shopping to e-shopping, from books to e-books, from newspapers to e-newspapers and from banking to Net banking. We can say the vocabulary got changed and new words were bought with same meanings. The human life became hypnotised with the new creations of science and technology. Today we can check bank balance, buy things, read e-books, all it just need one click. The invention of "Smart" things i.e. smart phones, smart TV's made our life progressive. We can grab information of anything, can read about constitution, can read about diseases, can get suggestions and we all can remain in-contact with each other just inside a box. The cyber world became so popular we could have never imagined. Today we start believing more about virtual life than that of real life. Al it is because of chat clients and social networking portals. On one side life is progressing with the change, but on other side it is affecting our moral life. With the change in our lives, we all need to upgrade ourselves, so to adapt the technology. In Kashmir the life is changing too. But with the change we also need to learn about cyber-attacks. The virtual box is full of criminals and fraudster's. They attack innocent people who lack technical knowledge and rip their money with so call "Social Engineering attacks", "Phishing - Vishing attacks and the last one RAT attack".To make Kashmir secure from these fraudster's I would like to define you, so that you will not become victim of theseattacks. 1:-"Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email." 2:- "Another one which is mostly used by fraudsters is Vishing or voice Phishing.Vishing or voice phishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit." In simple language we often see our phone receives several messages regarding "You won 10000$, for this please send us your bank account number and password". 3:-Social engineering is a non-technical method of intrusion, hacker's use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter. 4:-The 4th one which sounds ugly to us is RAT attack. It does not mean rat (mouse). It stands for "Remote administration tool". A remote administration tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. The RAT is used in order to hack some one's computer, once the rat gets installed in your computer, we can say the computer has another owner which is accessing and running it remotely. So whatever you will do will be monitored by criminal who attacked you. How can we secure As well we know no bank wants to know your password, your personal details. Nobody wants to give money to others. The world is greedy, then how one could donate money to another for no reason. Ifanybody calls us regarding bank details, we need to inform bank regarding such cases. If we receive messages, emails which ask information, simple delete it. Never give attention to it. We need to install good antivirus on our computers so as to secure from RAT. In order to install any software, 1st we need to scan it and then install it. "Tail Piece." The world is greedy. We can say the fraudster's attack one pond which is full of fishes. As we know each and every fish is not smart. Some of them get caught, which become slaves of fraudsters and get scammed. Author Yasir Altaf Zargar is a writer and Security Analyst from Srinagar and the first Kashmiri to be Acknowledged by Google ,Yahoo, Microsoft, Nokia,Adobe, Apple.He Tweets as @zargaryasir. |
|
|
|
|
|
|
|
|
|
|
|
|
 |
|
|
|
STOCK UPDATE |
|
|
|
BSE
Sensex |
 |
NSE
Nifty |
|
|
|
CRICKET UPDATE |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|