Friday 20 December 2013

Facts about Cybercrime

some important facts about CyberCrime by  y2kfound

Top 10 Cyber Crime Prevention Tips

  1. Use Strong Passwords
    Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis.
  2. Secure your computer
    • Activate your firewall
      Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.
    • Use anti-virus/malware software
      Prevent viruses from infecting your computer by installing and regularly updating anti-virus software.
    • Block spyware attacks
      Prevent spyware from infiltrating your computer by installing and updating anti-spyware software.
  3. Be Social-Media Savvy
    Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online.  Once it is on the Internet, it is there forever!
  4. Secure your Mobile Devices
    Be aware that your mobile device is vulnerable to viruses and hackers.  Download applications from trusted sources.
  5. Install the latest operating system updates
    Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software.
  6. Protect your Data 
    Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location.
  7. Secure your wireless network
    Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.
  8. Protect your e-identity
    Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
  9. Avoid being scammed
    Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password.  
  10. Call the right person for help
    Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.

Sunday 15 December 2013

Minimizing The Risk Of Identity Theft

How to Minimizing The Risk Of Identity Thief  


Some useful trip prevention measure on Identity Thief 

11 Facts About Cyber Bullying

Cyber bullying” is defined as a young person tormenting, threatening, harassing, or embarrassing another young person using the Internet or other technologies, like cell phones.
The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. Read on to get the facts.




  1. Nearly 43% of kids have been bullied online. 1 in 4 has had it happen more than once.
  2. 70% of students report seeing frequent bullying online.
  3. Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying.
  4. 68% of teens agree that cyber bullying is a serious problem.
  5. 81% of young people think bullying online is easier to get away with than bullying in person.
  6. 90% of teens who have seen social-media bullying say they have ignored it. 84% have seen others tell cyber bullies to stop.
  7. Only 1 in 10 victims will inform a parent or trusted adult of their abuse.
  8. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying.
  9. About 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out 10 say it has happened more than once.
  10. About 75% have visited a website bashing another student.
  11. Bullying victims are 2 to 9 times more likely to consider committing suicide.

Sources: Stop Cyber Bullying, Internet Safety 101Stomp Out BullyingEnd Cyber Bullying

Stand Up to Cyberbullying


Useful tips for the fight against cyber bullying.

Friday 13 December 2013

Salah youtube video & website




Enjoy watching  and subscribe :D 

Cyberstalking


Cyberstalking refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. It is not the mere annoyance of unsolicited e-mail. It is methodical, deliberate, and persistent. The communications, whether from someone known or unknown, do not stop even after the recipient has asked the sender to cease all contacts, and are often filled with inappropriate, and sometimes disturbing, content. Cyberstalking is an extension of the physical form of stalking.
It is estimated that there may potentially be tens or even hundreds of thousands of cyberstalking victims in the United States. A cyberstalker only needs access to a computer and a modem. Due to the enormous amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or key strokes. Information is power, and stalking of any kind is about power and control. There is little security on-line. Turning on a computer can expose anyone to harassment. Everyone who receives e-mail or uses the Internet is susceptible to cyberstalking.
Cyberstalkers use a variety of techniques. They may initially use the Internet to identify and track their victims. They may then send unsolicited e-mails, including hate, obscene or threatening mail. Live chat harassment abuses the victim directly or through electronic sabotage (for example, flooding the Internet chat channel to disrupt the victim’s conversation). With newsgroups, the cyberstalker can create postings about the victim or start rumors that spread through the bulletin board system. A cyberstalker may also set up a web page on the victim with personal or fictitious information or solicitations to readers. Another technique is to assume the victim’s persona on-line, such as in chat rooms, for the purpose of discrediting the victim’s reputation, posting details about the victim, or soliciting unwanted contacts from others. Cyberstalking is a course of conduct that takes place over a period of time and involves repeated, deliberate attempts to cause distress to the victim.
 Several things to do  when being Harassed 
1.  Trust your instincts.If you suspect that someone knows too much about you and/or your activities, it is possible that you are being monitored.
2.  Plan for Safety.Advocates at your local rape crisis center or domestic violence shelter are available to help you develop a safety plan. You can also use national hotlines such as 1-800-656-HOPE, the National Sexual Assault Hotline or a website such as www.fris.org  or www.rainn.org .
3.  Be extra cautious if your abuser is very technologically savvy.
Again trust your instincts. You may want to talk to an advocate or to the police.
4.  Use a safer computer.If you suspect that your computer is compromised, use a computer at the public library, church, or a community center.
5.  Create a new email account(s).Look for free web-based email accounts. Use an anonymous name and don’t provide much information in the profiles that an abuser could use to find you.
6.  Check your cell phone settings.Consider turning it off when not in use. If your phone has GPS enabled, consider turning it off.
7.  Change passwords and pin numbers.Use gender neutral passwords. Try to avoid using birth dates, numbers or phrases that your abuser may recognize. Don’t give your passwords to anyone and keep them in a safe, not easily accessed place.

Added by : Marshall University  

Phishing

Phishing is a method used to obtain personal and financial information from unsuspecting individuals. While pop up messages on websites and instant messaging programs, like AOL IM, are used in phishing scams, the most common means of acquisition is by misleading emails from a third part

Prevention
  • Don’t reply to email or pop-up messages that ask for personal or financial information, and don’t click on links in the message. Don’t cut and paste a link from the message into your Web browser phishers can make links look like they go one place, but that actually send you to a different site.
  • If you are concerned about your account, contact the organization using a phone number you know to be genuine, or open a new Internet browser session and type in the company’s correct Web address yourself.
  • Use anti-virus software and a firewall, and keep them up to date.
  • Don’t email personal or financial information.
  • Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  • Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them.

Analysis
Phishing is a significant crime because it has an extremely large market to target. Online bill pay, Internet shopping, and email are examples of daily occurrences that provide potential trails for stammers to follow.As current or potential future web developers, the knowledge of phishing presence and the capabilities of its evolving scams need to be taken into consideration when creating sensitive websites, as with the heavily bombarded eBay, Paypal, Yahoo, Visa, and Citibank to name a few.

As conclusion, From the first media presence of phishing, as mentioned in the Florida Times-Union newspaper in March 1997, this ever growing problem continues to evolve and match any precautions taken by its opposition. Despite the fact that these scams are getting more believable, it remains important that phishing is reported and stammers find themselves empty handed.
Considering phishing scams have only been present for nine years, with the more recent two and a half years of sophisticated traps, there has been a significant level of danger for Internet users. While organizations like APWG (Anti-Phishing Working Group) are keeping up with phishing scams, knowledge must spread through the general public of these occurrences.

By Seth 

Internet Relay Chat (IRC)

It is a very popular method of instantaneous communication over the internet. The majority of this communication is done with text in a chatting channel. Users use an IRC client to connect to an IRCserver, which then allows a user to connect to a chat channel or individually message other users.
IRC has been popularized by the media as being a haven for hackers and illegal file-sharing. While this occurs to some extent, the average IRC user uses IRC to chat with people from around the world. Topics of discussion vary from politics to technology to anything the mind can think of.
Unlike popular instant-messaging tools such as AIM, MSN, or Yahoo Messenger, individual IRC servers are run by independent volunteers. Like other popular instant-messaging tools, connecting to an IRC server is free of charge.

General IRC Information
- IRC, utilizing the TCP/IP protocol, makes use of a client/server model for its communication.
- A user uses an IRC client, such as mIRC, to connect to an IRCserver. A user chooses their own particular nickname to use when connecting to an IRC server.
- An IRC server is a server run by volunteers. It allows clients to connect free of charge. After a connection is established, a user may join or create IRC channels.
- IRC servers are connected with each other to form IRCNetworks.
 - Depending on which IRC server a user joins, he/she will be connected to a vast network of other users. - This can include people from Europe, Asia, and everywhere else in the world. There are current “four big networks,” these are known as: EFnet, IRCnet, QuakeNet, and Undernet.


Analysis
  • IRC has been utilized by all sorts of people for all sorts of purposes. Whether it be a teenager trying to download the latest version of Photoshop, a gamer discussing the latest strategies with like-minded individuals, a hacker trying to infiltrate other users, or a Christian sharing their faith, IRC serves millions of users everyday.
  • Unlike instant-messaging tools such as AIM/MSN, IRC provides users the ability to chat with hundreds of users simultaneously.AIM/MSN fosters individual relationships whereas IRC is more community based. In addition, most AIM/MSN users know each other in real life, whereas most IRC users have never met or will ever meet each other.
  • IRC is a mostly “lawless” area of the internet. An average user would be able to find MP3’s or applications to download if they tried hard enough. However, channel operators and channel communities are effective at maintaining and self-policing their individual channels.
By Brian H 

Software Piracy

software piracy as “the illegal copying, distribution, or use of software.” Piracy includes casual copying of particular software by an individual or business. With the advancement of technological tools software piracy has increased worldwide. You may be thinking, what does this have to do with me? Unfortunately, software piracy affects all of us in more ways than one. For instance, software piracy hurts the economy because revenue is lost. Second, the software industry is affected because limited numbers of jobs are available. Lastly, consumers end up paying higher prices for software programs. Not being educated about software piracy will not exempt you of civil and/or criminal penalties if found guilty.


Issues

As stated earlier, software piracy is illegal. Ironically, many who pirate software are fully aware of the legalities, though they are able to rationalize continuing the practice. Some have difficulty understanding the distinction between freeware, shareware and commercial software. Others believe students won't be able to take advantage of the many technology-based educational opportunities without access to unaffordable software. Since software budgeting is often inadequate, and occasional upgrade of hardware makes older versions of software obsolete after several years, some think the only "solution" to the problem is to pirate newer versions of past purchased software. Finally, some people don't believe that software piracy is truly stealing because there is no loss of a tangible product involved in the act of piracy.

Ways to Deal With / Minimize Software Piracy

  • Have a central location for software programs. Know which applications are being added, modified or deleted.
  • Secure master copies of software and associate documentation, while providing faculty access to those programs when needed.
  • Never lend or give commercial software to unlicensed users.
  • Permit only authorized users to install software.
  • Train and make staff aware of software use and security procedures which reduce likelihood of software piracy.                
  • Written by David M. Stone University Laboratory High School 
  • Denial of Service Attacks

    A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include

    • attempts to "flood" a network, thereby preventing legitimate network traffic
    • attempts to disrupt connections between two machines, thereby preventing access to a service
    • attempts to prevent a particular individual from accessing a service
    • attempts to disrupt service to a specific system or person
    Not all service outages, even those that result from malicious activity, are necessarily denial-of-service attacks. Other types of attack may include a denial of service as a component, but the denial of service may be part of a larger attack.
    Illegitimate use of resources may also result in denial of service. For example, an intruder may use your anonymous ftp area as a place to store illegal copies of commercial software, consuming disk space and generating network traffic. 
    1. ImpactDenial-of-service attacks can essentially disable your computer or your network. Depending on the nature of your enterprise, this can effectively disable your organization.
      Some denial-of-service attacks can be executed with limited resources against a large, sophisticated site. This type of attack is sometimes called an "asymmetric attack." For example, an attacker with an old PC and a slow modem may be able to disable much faster and more sophisticated machines or networks.
    2. MODES OF ATTACKDenial-of-service attacks come in a variety of forms and aim at a variety of services. There are three basic types of attack:

      • consumption of scarce, limited, or non-renewable resources
      • destruction or alteration of configuration information
      • physical destruction or alteration of network components


      1. Consumption of Scarce ResourcesComputers and networks need certain things to operate: network bandwidth, memory and disk space, CPU time, data structures, access to other computers and networks, and certain environmental resources such as power, cool air, or even water.


        1. Bandwidth ConsumptionAn intruder may also be able to consume all the available bandwidth on your network by generating a large number of packets directed to your network. Typically, these packets are ICMP ECHO packets, but in principle they may be anything. Further, the intruder need not be operating from a single machine; he may be able to coordinate or co-opt several machines on different networks to achieve the same effect.

          Prevention and Response
          Denial-of-service attacks can result in significant loss of time and money for many organizations. We strongly encourage sites to consider the extent to which their organization could afford a significant service outage and to take steps commensurate with the risk.
          We encourage you to consider the following options with respect to your needs:
          • Implement router filters as described in Appendix A of CA-96.21.tcp_syn_flooding, referenced above. This will lessen your exposure to certain denial-of-service attacks. Additionally, it will aid in preventing users on your network from effectively launching certain denial-of-service attacks.
          • If they are available for your system, install patches to guard against TCP SYN flooding as described in CA-96.21.tcp_syn_flooding, referenced above. This will substantially reduce your exposure to these attacks but may not eliminate the risk entirely.
          • Disable any unused or unneeded network services. This can limit the ability of an intruder to take advantage of those services to execute a denial-of-service attack.
          • Enable quota systems on your operating system if they are available. For example, if your operating system supports disk quotas, enable them for all accounts, especially accounts that operate network services. In addition, if your operating system supports partitions or volumes (i.e., separately mounted file systems with independent attributes) consider partitioning your file system so as to separate critical functions from other activity.
          • Observe your system performance and establish baselines for ordinary activity. Use the baseline to gauge unusual levels of disk activity, CPU usage, or network traffic.
          • Routinely examine your physical security with respect to your current needs. Consider servers, routers, unattended terminals, network access points, wiring closets, environmental systems such as air and power, and other components of your system. 
          • Added by Carnegie Mellon University

    Sunday 8 December 2013

    American singer Leandra Ramm cyberstalked 6 years by Singaporean

    38-year-old Colin Mak Yew Loong admitted in court, Wednesday, to 31 counts of criminal intimidation of American singer Leandra Ramm from 2005 to 2011.




    SINGAPORE: For six years, American singer Leandra Ramm was terrorised by a Singaporean cyberstalker who developed a deadly liking for her.
    On Wednesday, 38-year-old Colin Mak Yew Loong admitted to 31 counts of criminal intimidation of Ms Ramm from 2005 to 2011.
    Ms Ramm's nightmare started in 2005 when she was featured on CNN, and caught Mak's attention.
    The two had never met but Mak contacted her, purporting to champion her music career.
    Then the 29-year-old singer stopped responding, and Mak began sending death threats via emails and voice messages.
    Besides harassing Ms Ramm, Mak also admitted to 11 other offences, including intentional harassment, criminal trespass and stealing biscuits from a kindergarten.
    Of these, Mak had targeted two other foreign musicians for offences relating to harassment and criminal intimidation.
    In both instances, he developed fixations on two women, aged 28 and 30.
    The prosecution proceeded on 17 of the 42 charges.
    In his submissions, prosecutor Alan Hu said this is an "aggravated case involving numerous charges".
    He stressed that the offences were committed over a long period of time and asked for a global sentence of two to four years' jail.
    When asked for his response, Mak told the court he deeply regrets his actions as he was "deeply troubled" and had lost control at that time.
    For criminal intimidation, Mak can be jailed up to seven years and fined on each count.
    He is expected to be sentenced on December 13.

    Analysis
    This is an interesting case base on cyber staking. it show that cyber stalking is areal problem in our society. The Accused was a 38yr old man who was stalking an American singer through cyberspace. After 6 year of crime he was Arrest and sentences to  7 years jail time. 

    Monday 2 December 2013

    HACKER

    Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems.

     The term hacker is used in popular media to describe someone who attempts to break into computer systems. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient technical knowledge to understand the weak points in a security system

    There are some possible characteristics that qualify one as a hacker:
    • A person who enjoys learning details of a programming language or system
    • A person who enjoys actually doing the programming rather than just theorizing about it
    • A person capable of appreciating someone else's hacking
    • A person who picks up programming quickly
    Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.