Posts

Type of scam

Image
  Phishing This is an email scam where you appear to get a message from a legitimate source, such as your bank, HMRC, PayPal, Apple or Amazon. The message will encourage you to click a link and log into your account, normally by telling you your account has been locked or there's a large transfer of money. In reality, the link in the email goes to a fake website which collects your information. Another version of this scam involves an email attachment - perhaps a coupon or form you need to fill in - which is in fact a computer virus. How To Spot It Look at how you're addressed in the email. Scammers will use a general greeting such as Dear Sir, Dear Madam or Dear Customer. Legitimate emails will use your name. The email address the message has been sent from. Open the email and expand the pane at the top of the message and look at the email it was sent from. If it's a real message, it will come from a recognisable address - such as 'noreply@bank.com'. Scammers won...

Hacking kese sikhe

Image
  What is Hacking? Gaining access to a system that you are not supposed to have access is considered as hacking. For example: login into an email account that is not supposed to have access, gaining access to a remote computer that you are not supposed to have access, reading information that you are not supposed to able to read is considered as hacking. There are a large number of ways to hack a system. In 1960, the first known event of hacking had taken place at MIT and at the same time, the term Hacker was organized. What is Ethical hacking? Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system or data. Ethical hacking is used to improve the security of the systems and networks by fixing the vulnerability found while testing.  Ethical hackers improve the security posture of an organization. Ethical hackers use the same tools, tricks, and techniques that malic...