Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,184,210 members, 7,923,070 topics. Date: Friday, 16 August 2024 at 06:01 PM

Cybergurutech's Posts

Nairaland Forum / Cybergurutech's Profile / Cybergurutech's Posts

(1) (of 1 pages)

Science/Technology / Email Hacking In Cyber Security by cybergurutech(m): 5:22am On Apr 07, 2019
EMAIL is now a very widely used communication method. If an email account is hacked it can allow the attacker access to the personal, sensitive,
Allowing them to read new incoming and outgoing email send and receive as the legitimate owner. encryption
Email hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.
# Some prevention measures #

Email on the internet sends the Simple mail transfer protocol. While mail can encrypts between mail servers, this is not typically enforce, but instead opportunistic TLS uses the mail servers negotiate for each email connection whether,
Where a mail flow between servers is not encrypted, it could be intercepted by an ISP or government agency and the contents can be read by passive monitoring For higher security, email administrators can configure servers to require encryption to specified servers or domains.
A further layer, AUTHENTICATE RECIEVE CHAIN (ARC), allows mail flow though intermediate mail servers such as mailing lists or forwarding services to be better handled – a common objection to implementation.
They may also have security specialists perform an AUDIT on the company and hire a CERTIFIED ETHICAL HACKER to perform a simulated attack or “PEN TEST” in order to find any gaps in security.
If passwords get leaks or otherwise become known to an attacker, having two times authentication enable, may prevent improper access.
So, What Do I Do If My Email Is Hacked?
If you find yourself a victim of email hacking there are a very important steps you need to take.
But you should have to do these facts very fast.
Change Your Password

Very first thing you must do to ensure the hacker can’t get back into your account. It is essential that your new password is complex and totally unrelated to previous passwords.
Not only that always try to get some unique characters in your passwords like @ and # and $ and % and etc.
Always use at least 8-10 characters with a variety of upper and lower case and throw in some symbols and numbers.
If you find the hacker has locked you out of your account by changing your passcode , you will need to Rechange the password to be clicking on the Forgot My Password in that link.
Let Your Email Contacts Know.

A big part of the hacker’s strategy is to ‘get their claws relatives ’ into your address book with the aim of hooking others as well.
Send a message to all your email contacts as soon as possible so they know to avoid opening any emails (most likely loaded with malware and auto malicious code and activities and sometimes viruses too) that have come from your mail IDS.
Change Your Security Question

If you have a security questions attached with your personal email account, please change it as soon as possible.
And please try to make your question sometimes tricky It is possible that was how the hackers broken into your personal account at the first place.
Not only were the passwords gets steel but the security questions too. If you have a security question related with your account, make response that makes no senses.
This is the perfect opportunity to tell a lie!
Multi Factor Authentication

Yes, multi-factor authentication adds another step to your login but it also adds another layer of protection.
Enabling this will mean that in addition to your password, you will need a special one-time usable code to access.
This usually sent to your mobile devices and sometimes on the where you want it to get it.
Check Your Email

It is not uncommon for hackers to modify your email settings so that a copy of every email you receive can automatically forwards to them.
Not only can they monitor your logins for other sites but they’ keep a watchful over any particularly personal information!
So, check your mail forwarding settings to confirmation no unauthorized mail address have added.
Don’t forget to check your signature to ensure not any spamming has been added. And also ensure your ‘reply to’ email address is actually related to you.
Hackers have been known to create an email address here that looks similar to yours – when someone replies, it goes straight to their account, not to you !
Scan Your Computer any kind of Malware and Viruses

This is essential also. Please ensure it addresses and then change your mail password again.
If you don’t have it – invest it . Comprehensive security software will provide you with a digital shield for your online life.
McAFEE lets you protect all your devices – including your mobile phones – from viruses and malware.
It also contains a password managemet to help you remember and generate unique passcode for all your personal
Change Others Accounts with the Same Password

Time consuming but very worthwhile! Ensure you change any other different accounts that use the same username and password as your hacked email.
Hackers love the fact that many of us use the same logins IDs for many others accounts, It is a guarantee that they will try your info in other email applications
And sites such as PayPal, Amazon, Netflix – FACEBOOK AND Snapchat AND INSTAGRAM ALL THE SOCAIL MEDIA ACCOUNTS !
Creating a New Email Address

If you have been hacked several times and your email provider isn’t mitigating the amount of spam you are receiving,
then consider starting a fresh but don’t delete your email address!
This could mean a hacker could spam every site they can find with ‘forgot my password’ request and try to impersonate you – identity theft!
Your email is an important part of your online identity so being vigilant and addressing any fallout from hacking is essential for your DIGITAL REPUTATION.
And even though it may feel that ‘getting hack’ is inevitable, you can definitely reduce your risk by installing some good quality security software on all your devices.
Comprehensive security software such as MCAFEE TOTAL PROTECTION will alert you when visiting risky websites,
warn you know when a download looks ‘dodgy’ and will block annoying and dangerous emails with anti-spam technology. Mcafee have that type of techniques and tricks in their antivirus software.
Get more fro source: https://www.naijaprides.com/2019/04/email-hacking-in-cyber-security.html?m=1

Webmasters / Www.naijaprides.com/2019/04/how-hackers-hack-bank-accounts-and.html?m=1 by cybergurutech(m): 3:56am On Apr 07, 2019
Most people studying hacking have a keen interest in learning how they can hack bank accounts.
They become discouraged with the prevailing perception that it is almost impossible to hack credit cards, debit cards, or net banking passwords, which is true to an extent.
Today I will discuss with you why hacking bank account information is tough and considered to be almost impossible.
We will also discuss the different, contemporary methods that hackers use to hack bank accounts.

All of these online transactions involve money, meaning they’re using banking information, credit or debit card payments, or simply net banking.
Most banks use SSL (Secure Sockets Layer) connection and at least 128 or 256-bit encryption for online banking and transaction purposes.

An additional layer of security that companies are introducing is called “transaction PIN layer” which means that for each and every online transaction you have to enter your password
And that during transactions you have to enter a PIN, a type of password between 4 and 8 characters in length.
Thus, banks do a lot of work to protect your credentials from the eyes of the world that may wish to gain access to your vital information.
The attacks successfully targeted online bank account holders in Germany by using call-forwarding features built into the SS7 protocol
When mobile phone users travel abroad, the SS7 administrative data network allows local phone networks to verify that the user’s SIM card is valid,
But that SS7 functionality can also be abused. In the case of the German online bank attacks :
Phishing attack:

Fake emails tricked victims into visiting lookalike bank websites, where they were directed to enter all login,
And related information required to initiate a money transfer, including their account number.
Account password and the mobile phone number they registered with the bank to receive a one-time mobile transaction authentication number (mTAN),
Which must be entered into the bank’s website to approve money transfers.

Call forwarding:

Using a mobile telephony network located abroad, attackers instruct it – via SS7 – to forward all calls and SMS messages
Sent to a victim’s mobile phone number to an attacker-controlled number.
Fraudsters can then log into a victim’s account, initiate a money transfer and then receive the mTAN required to approve the transfer.

In other criteria, it appears that the telcos are “effectively modifying how SS7 works,” says Woodward, who’s also a cybersecurity adviser to the EU’s law enforcement intelligence agency, Europol.

“That’s good. We can only hope that other telcos follow suit.”

“Mounting Security Concerns“

The SS7 protocol dates from the 1970s and its authors assumed that only a closed group – comprising large telecommunications firms
Would be able to provide telephony services, Woodward says.
Then the internet and voice over IP communications came along, creating all sorts of inexpensive telephony networks.
Could accessed and legitimate features potentially used for unintended purposes.
Ways in which SS7 could exploit began coming to light in 2008 when German researcher Tobias Engel demonstrated.
Related research appears to have surged after 2013 when former National Security Agency contractor
Edward Snowden leaked information showing that the intelligence agency was using SS7 to help spy on targets.

Read more ....
Source: www.naijaprides.com/2019/04/how-hackers-hack-bank-accounts-and.html?m=1

(1) (of 1 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 36
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.