Sr. No: 1
Bangladeshi hacker TiGER-M@TE made a world record in defacement history by hacking 700,000 websites in a single shot.
Sr. No: 2
In 2007, a new fleet of Apache helicopters arrived at an American base in Iraq. Some soldiers took photos of the flight-line and uploaded them to the Internet. The enemy found geotags inside the Exif data of the photos and conducted a mortar attack that destroyed four helicopters.
Sr. No: 3
IPv6 addresses are made up of 128 bits and thus allows 2^128 i.e. 3.4×10^38 addresses. A theoretical maximum of 340,282,366,920,938,463,463, 374,607,431,768,211,456. That’s over 340 undecillion addresses, which is reportedly enough to assign one IP address to every single atom on the surface of the earth!
Sr. No: 4
According to a survey conducted by a global research firm “Ipsos”, India has the highest number of child cyber bullying cases in the world at 32%, amongst children who have access to internet or mobile phones, compared to 15% in US and 11% in Great Britain.
Sr. No: 5
Cyber scams are commonly known as “Nigerian 419” scams as people believe they originate from Nigeria. The “Section 419” of the Nigerian Penal Codes deals with cheating like famous “Section 420” of the Indian Penal Code.
Sr. No: 6
Income Tax Department, Government of India:
Always check before you click - Trust only these sources
@incometax.gov.in, @incometaxindiaefilling.gov.in, @tdscpc.gov.in, @cpc.gov.in, @insight.gov.in, @nsdl.co.in, @utiitsl.com
SMS Source Code:
ITDEPT, ITDEFL, TDSCPC, ITDCPC, CMCPCI, INSIGT, SBICMP, NSDLTN, NSDLDP, UTIPAN
www.incometaxindia.gov.in, www.incometaxindiaefiling.gov.in, www.tdscpc.gov.in, www.insight.gov.in, www.nsdl.co.in, www.utiitsl.com
Sr. No: 7
Why 2FA is Must?
Phishing attack, data breaches, shoulder surfing etc. can compromise your user-name credentials. To render such attacks useless, 2FA - two factor authentication - is the average user's best friend. Otherwise, a single mistake can result in account's breach. So, setup 2FA on Facebook, Instagram etc.
Another step towards improving online security is use of hardware security key on new devices for log-in. It renders stolen passwords and even intercepted text messages useless.
Sr. No: 8
Are Scanning QR Codes Safe?
QR codes can encode a lot of information, but can also perform hidden unauthorized actions like connecting to a Wi-Fi network or navigating to a malicious link. This makes scanning a QR code risky, as there is no way of reading the information contained inside it, before exposing the device to the unsuspecting payload.
If you scan a QR code that seems suspicious, you must pay attention to what the code executes.
Sr. No: 9
Chrome Extension “Password Checkup”:
The new google chrome extension called “password checkup” is a must for every privacy enthusiasts. Once the extension is installed, it checks any login details against a huge database of 4 million user name and passwords, and warns it if finds a match. Thus, it checks whether the user password has already been compromised in a previous data breach.
Sr. No: 10
RBI Warning About “ANYDESK” App:
On Feb, 2019 RBI alerted banks about fraudulent transactions on the Unified Payment Interface (UPI) platform. RBI’s cyber security and IT examination cell warned user that a mobile app “AnyDesk” was targeting the mobile phone of customers.
It seeks permission to access control the phone like any other application. However, when the permission is granted by a user, “AnyDesk” app allegedly steals confidential data on the phone to carry out fraudulent transactions through other payment apps available on the phone.