A Glossary of a hacker’s dictionary

++++Term++++ +++++++++++++++++Definition
Advanced persistent threat (APT): A strategic cyber attack that infiltrates a system and persists over a prolonged period of time, potentially undetected. APTs may be carried out by a nation state or criminal organization to steal sensitive data or compromise a target system.
Botnet: A large network of virus-infected computers that can be used to generate spam, spread viruses, perpetrate click fraud or conduct attacks on other systems.
Bug bounty program: A program where software companies offer cash rewards to hackers to find and report exploitable vulnerabilities before they can be used by cyber criminals. Facebook, Google, Mozilla Firefox and Microsoft have been known to offer thousands of dollars in return for bugs.
Distributed denial of service (DDoS) attack: An attack designed to disrupt a computer system or website service by bombarding the site with so much web traffic that it crashes. Botnets are often used to carry out DDoS assaults.
Ransomware: Malicious software designed to block access to a system or account until a sum of money is paid.
Social engineering: Non-computer methods of manipulation to obtain sensitive personal information, such as birth dates, or social security numbers. Personal knowledge often used to bypass passwords.
Special phishing: An email masquerading as being from a trusted source or person you know sent with the goal of obtaining sensitive information, often by downloading data-sniffing and computer-controlling malicious software.
Zero-day exploit: A previously undetected software vulnerability that is used to hack into affected system before developers or manufacturers can address or fix the problem.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: The Globe and Mail

Twelve big hacks

Some of the largest hacks in history, by records exposed :

# Name Hacks +++++++++++++++++Expose
1 NYC Taxi & Limousine 173 million Hack exploits poorly anonymized trip details and personal information of drivers
2 Adobe Systems 152 million Hack of company systems exposes informations related to customer orders
3 Shanghai Roadway 150 million Firm may have illegally bought and sold customers’ information
4 eBay 145 million Hack exposes names, encrypted password and personal information
5 Unknown South Korean Firms 140 million North Korean hackers expose e-mail addresses and identification numbers
6 Heartland 130 million Hack/malicious software exposes credit cards at processor
7 Target 110 million Hack exposes customer information by targeting point-of-sale systems
8 Korea Credit Bureau 104 million Insider fraud exposes 104 million credit cards
9 TJX 94 million Hack exposes credit cards and transaction details
10 TRW 90 million Hack exposes credit-reporting database
11 JPMorgan 83 million Hack exposes names, addresses, phone numbers and e-mails of the holders of household and small business accounts
12 Home Depot 56 million Hackers use malware to steal debit and credit card data from point-of-sale systems

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is a Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: The Globe and Mail

Ex-Googlers launch an app to make people talk

An app called Cord, developed by two former Google employees, Thomas Gayno and Jeff Baxter, is hoping to let people quickly record and send their brief voice messages lasting no more than 12 seconds to one or several people at the same time with just a single tap.

“Over the past decade, people are speaking to each other less and less,” Gayno told AFP.

“Increasingly they communicate by text — either by SMS, email or instant messaging. We want to tackle that and web design Toronotoget people speaking to each other again.”

To transmit the voice with Cord, users will simply tap on the face of a visible contact placed in a circle, pressing once to listen to a message or to respond without the requirement of any number or text.

This voice enabled app will certainly play a key role in controlling new devices, from smartphones to wearables and other connected objects, as said by Thomas Husson, an analyst with Forrester Research. “However, I doubt that a service based on the promise of voice-services alone can scale – it will have to embedded among other features in an open way to control new devices.”

The two Google Veterans are hoping that this innovative new app will trigger a renaissance in an increasingly unfashionable method of human communication: talking.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: “http://timesofindia.indiatimes.com/tech/tech-news/Ex-Googlers-launch-an-app-to-make-people-talk/articleshow/44500960.cms”

Bash Bug – A New Virus

A new programming flaw known as “Bash Bug” is reported to give a serious threat to the IT world effecting millions of computers and other devices such as home internet routers and even the systems that are used to run factory floors and power plants.

The Bash Bug also known as “Shellshock”, affects a system software called Bash, which is found on a variety of web design TorontoUnix-based systems, potentially allows hackers to take control of a victim’s computer and run almost any operation, from opening, altering and deleting files to shutting down networks and launching attacks on websites.

Bash is found on Unix-based devices that are running the Linux and Mac OS X operating systems. Devices that use Unix in some form include many servers, routers, Android phones, Mac computers, medical devices and even the computers that create bitcoins. Systems running power plants and municipal water systems could also be affected by the bug, though security experts already recommend that these systems remain disconnected from the internet to avoid opening them to such risks.
Bash is a command shell which “tells the computer to do of what you want do”. Thus, the bug in Bash allows the hackers to take control over a victim’s device.

Thus, Bash is believed to be worse than “Heartbleed, which expose passwords and other sensitive data to hackers”.

As we wait for the development of a fix to this bug, it will be always helpful to run up-to-date security software on your devices.

This post was posted by Daizy for DMG Weblabs, Toronto. DMG Weblabs is Toronto based web design company specialized in creating SEO web sites and mobile ready websites.

Source: “http://timesofindia.indiatimes.com/tech/computing/What-is-Bash-Bug-and-should-you-be-worried/articleshow/43501380.cms”, http://www.cbc.ca/news/technology/bash-bug-aka-shellshock-has-no-easy-fix-1.2779383

 

Precautions to protect from social media

“Every young person one day will be entitle automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friend’s social media sites.”, predicted by Google CEO Eric Schmidt in an interview with the Wall Street Journal in 2010.

webdesign TorontoWe will be surprised to see how much personal information we are posting online and giving details of our personal life on internet. In fact, if we see the social media sites like Face book, Twitter, Instagram, Flickr Photos, LinkedIn and etc, they give all the information about us of who our friends & family are, what are our interests, our relationship status, our professional history, the past and present history of ours, etc., . The photos we are tagged in the social media reveal of what we’ve done, where we were, our favourite vacation spots, etc.  One can access all this digital data information in just one search of our name.

If we need to know about any one, just Google search their name and we will be able to get details of all their social network sites and connections by revealing their personal history. Chances are there that all this digital data can be taken out and could be used to cause problems in our personal day to day life, problems at the time of prospective marriage alliances, could be investigated by potential employers, mined by marketing firms, or even be used by cyber criminals for identity theft.

But, if we take precautions by few quick things, we can protect ourselves from the chaos.

 Manage all your accounts

Find out all your social network sites, online services and smart phone apps –  where you have your accounts.  You can Google your full name, nick names and e-mail addresses to find out the forgotten accounts.  Close the accounts and unsubscribe yourself from the services that are no longer in use. Try website like http://accountkiller.com/en/, http://deleteyouraccount.com/,  and http://justdelete.me/ to delete your accounts and how-to’s.

For the social networks you are using, make sure that your posts and photos are not freely available to the public by changing the settings to private. Do not allow anyone to tag you in the photos. Share your photos only to your close friends. And always be cautious when you share your posts, photos or tweets.

 Avoid being tracked

Every time you  surf the web – even in the privacy of your home, your actions are constantly being tracked. When you are signed-in to your Google, Microsoft or face book, your searches are monitored by Google search and Bing to give tailor-made results. When the shopping websites are being surfed, they leave cookies on your system which are used to provide advertisements in your browsing.

Sign out from all your accounts before browsing websites or using search engines. Uninstall search tool bars that might have been installed. Check the extensions that the browser is running (see browser Help section to know more about extensions),  and disable the ones that you don’t recognize. Try https://duckduckgo.com/ search engine that doesn’t track you. Install the DoNotTrackMe browser add-on (http://abine.com/index.html) that’s available for Chrome, Firefox, IE, Opera and Safari and also as an app for Android and iOS. This add-on blocks ad networks, social networks and data-collection companies from tracking your browsing. It also protects email address, phone and credit card from being used by companies on the web and on your mobile devices. Install the CCleaner from http://www.piriform.com/ to clear temporary files, cookies, browsing, download and form history to protect privacy and to make computer faster and secure.

Useful browser extensions

Disconnect: Blocks trackers from popular sites (Chrome, Firefox, Opera, Safari) HTTPS
Everywhere: Redirects to secure (HTTPS) versions of the sites where possible (Chrome, Firefox)
Adblock Plus: Blocks intrusive ads (Chrome, Firefox, Opera, Safari)

Sources: http://timesofindia.indiatimes.com/tech/

Why do you need a Mobile Website?

When you see people in any public area these days and there’s a good chance you’ll see someone browsing the web on a smartphone such as iPhone or Android. Actually, one fifth of the population accesses the internet every day and that number is on the increase.
In order to provide this rapidly growing base of mobile web users with an optimal experience, increasing number of website owners are pursuing mobile websites ensure that their website is optimized for smartphone display. If the increasing number of mobile web users alone isn’t motivation enough to persuade website owners to embrace the mobile web, there are also a number of advantages worth considering.

Enriched User Experience

Mobile websites are specially designed for handheld devices – nobody wants to browse a desktop website on their smartphone! Research on mobile website indicates that mobile-optimized websites considerably improve user experience and satisfaction, which makes a positive impression when it counts.

Faster Download Speed

Mobile websites are specially designed for mobile standards and best download speed, which means less waiting and more browsing.

Engagement and Context

A mobile website allows you to instantly engage users with mobile-specific features such as click-to-call, mapping functions. Moreover, if you’re a local business, mobile is predominantly significant as more and more visitors will find your site through location-aware technology that connects users to your website when they are in close geographic proximity.

Improved Search/SEO performance

A mobile website provides improved rankings on mobile-friendly search engines such as Google and Yahoo, and also allows placement in a growing number of mobile and local directories.

Portability and Connectivity

A mobile website can be accessed everywhere, any time. This level of persistent connectivity provides an unparalleled opportunity to connect with target audiences in new ways, wherever they may be.
Is your business Mobile ready and geared up for the Mobile world?