Tumgik
ayushgarg65 · 19 days
Text
How to recover money from online fraud
Tumblr media
you have to go to your nearest police station and request the officer that sir, I have registered a complaint on cyber crime but it is showing pending for two-three days, please check the status of my complaint once. And when your complaint is successfully registered, then What cyber criminals do is that they freeze the bank account in which you transferred the money and if your defrauded money is in that account, that is, suppose if you have been defrauded of Rs 3 lakh and the scammers have withdrawn Rs 2 lakh from that account, now there is only Rs 9 lakh in that account, then What cybercriminals do is that they put that amount on hold and after that you get a message like this that we have put this much money on hold from this account,
Also See This:- p2p trading se bank account kese unfreeze karaye
After that cybercriminals send a complaint to the bank that there is a fake account on which fraudulent transactions are happening and we have frozen this account, you should verify this account as soon as possible, after that as soon as the bank receives this complaint, what the bank does is that it tells the account holder to come to the bank as soon as possible and submit his KYC, now that customer will not take his document and submit it to the bank because it is a fake account and because of this it takes a lot of time and some people think that cybercriminals are not looking at our complaint properly,
They are not working properly and some people leave their complaint there because the bank people give 30 to 35 days to the customer for KYC to submit his document and even then if the bank people get any response If it is not found, what the bank people do is that they send a letter to that customer, if even then there is no response, then the bank people tell cyber crime that no response is coming from this account holder, but what do you have to do after this, if suppose you have been defrauded of 3 lakhs and you get a hold message of 1 lakh, 2 lakh or 3 lakhs, some such message,
Also See This:- freeze bank account ko kese unfreeze karaye
Then what you have to do is go to your investigation officer and ask him that sir can we file an FR for you because until your investigation is not completed, you cannot file an FIR and if your FIR is filed, then what you have to do after that is to get a court order from the court and you must also know that to get any court order from the court, we need a good lawyer, so you can hire any lawyer, even if it is your personal one and if suppose you do not have the contact number of any lawyer and there is no lawyer around you, then you can also request the officer who is looking after your case. This is because they have the contact number of many lawyers and after that you also do not need to go to the court,
The same lawyer will go to the court and bring your court order and now you people must be thinking that if we hire a lawyer then how much money will we have to pay him, see it depends on you which lawyer you choose If you are hiring a lawyer, then you don't need to worry because in most of the cases, the lawyer charges 10 to 15 rupees only but it depends on you that how much fraud has happened with you and the most important thing is that whenever you hire a lawyer, before that keep one thing in mind that the lawyer should have good knowledge about cyber fraud and one more thing is very important that whatever process I told you in this video,
Also See This:- bank account freeze ho jaye to kya kare
You have to do this whole process as soon as possible because the account in which you transferred the money does not have only your money, that fraudster does fraud with other people as well, that's why you have to get a court order as soon as possible because suppose if someone took the court order before you, then the amount that was shown to you in your hold message will go to him and you will not receive any money, that's why I say in every video that you have to file a complaint on cyber crime as soon as possible and suppose you followed the whole process very well i.e. That you complained about cyber crime and you also went to the police station and submitted your documents, still if you do not get this type of hold message,
Then it means that the scammers have withdrawn your fraudulent money from the account in which you had transferred the money or have invested it in bitcoin and this means that now no one can get your fraudulent money back to you and suppose if you get a hold message and after that you go to the officer and request for FR and if their inquiry is also completed, still if they are not doing your FR or you are facing some other problem or your lawyer is not bringing your court order, if you are facing this type of problem, then please tell me by commenting or email, so what should you do in such a case, I will explain it to you guys properly, so I hope you guys must have understood the whole process, I have told you guys, if you complete this whole process then I can give 100% guarantee. That you will get your defrauded money back,
Also See This:- Karnataka cyber cell account freeze
So I hope you guys must have understood, so I had to share this much with you guys because you guys were asking me through so many comments and emails that what to do and how to do it, so I have told you everything, so if you like the video If you like it then please like the video. So thanks for watching this video. I will meet you in the next video, till then Jai Hind.
0 notes
ayushgarg65 · 19 days
Text
New rules Now everyone defrauded money will be returned
Tumblr media
Today's video is very important because many of you ask me in comments and emails that brother I have registered a complaint on cyber crime but what is the further process and will we get our defrauded money back, actually guys, we all know that whenever we are defrauded online, we have to register our complaint as soon as possible by calling 1930 or by visiting the government's official website cybercrime.gov.in and many of you register a complaint by watching YouTube's
Also See This: -bank account freeze by gujarat
But you do not know the further process and due to this you never get your defrauded money back and after that you watch Uber videos like me, comment, email and expect a response and most of all, two types of people comment on me like what is the use of complaining on cyber crime when the defrauded money never comes back and secondly brother I have registered a complaint on cyber crime, now when will I get my defrauded money back You will find many more comments related to online fraud, all of which I am going to answer in this video, so watch this video once because
Who knows, after watching this video, you may get your defrauded money back and after watching this video, all your doubts will be cleared whether you should complain on cyber crime or not. So suppose if any kind of online fraud happens with you, then you get three options to complain online, first you can register your complaint by calling on 1930 or secondly you can register your complaint by going to the official website of the government cy cci.gov.in or you can also register your complaint by going directly to the police station , but I will suggest you people that you go directly to the official website of the government and go there and register your complaint.
Also See This: -bank account freeze by agra
I have made a complete video on how to register a complaint , the link of which I will give in the description, you can also register a complaint by watching that video and most of all IMPORTANT: Whenever you register a complaint on a cyber crime website, note down all the details that you are going to fill in there in a notebook before registering them, because after opening the website, when you check your details and fill them one by one, then It will take a lot of time and your page will be refreshed again and again, plus there can be errors too,
So get all the details ready beforehand, after that you have to register the complaint on cyber crime and one more thing to keep in mind is that you should never do it from your mobile because if you register the complaint from mobile, then it will not be visible properly there and you may have to face a lot of problem while going up and down there, that is why take a desktop or a friend's laptop for some time and register your complaint from there and one more thing is also very important, whenever you register your complaint, the address you fill at that time should be your current address, otherwise the police will never accept your complaint and suppose if your complaint is successfully registered, then within 24 hours you get a message like this that we have transferred your complaint to your nearest police station,
Also See This:- bank account freeze by telanagana
The branch that you had given while filling the address and on cyber crime After complaining, you receive a message and an email and a PDF is sent to that email. So what you have to do is to take a printout of that PDF and whatever proof you have, you have to take a printout of each proof and visit the police station which is mentioned in the message. And it is very important to visit the police station. If you do not go to the police station, then your case will be closed. And suppose if you have filed a wrong complaint while complaining on cyber crime, that is, you have missed some details, then what will happen with that is that your status will continue to show pending. If the status of your complaint is showing pending for two-three days, then what you have to do is as soon as possible,
Also See This:- how to unfreeze bank account from gujarat cyber cell
0 notes
ayushgarg65 · 27 days
Text
How hackers operate and hacking as a career option - PART 5
Tumblr media
it's safe And you saw clearly Google's Gmail scanner Can fail in detection We say No one can detect 100% Neither we nor anyone else So instead Wherever there is such a doubt That unknown sender is sending you a file Or something is wrong Then you can watch it In disposable file viewer So what is the advantage Your productivity is the same
That I am able to open all the files But at the same time you can never be hacked So here I have a question So suppose while using disposable browser I put some data in it Like phone number or password So in that case I can be compromised Basically the beautiful part of disposable browser Is that It is a completely private browser Also See This:- Top Property In Advocate Gujarat
So as you do the utility You can go up here And click on the dispose browser It will dispose it completely The second thing you are saying That net banking etc You are probably saying That there is a phishing site or scam site Where you put it So what SquareX does additionally That we do live monitoring For phishing, scamming websites And for all this on your browser So wherever it happens
That this is looking something like a net banking account Or whatever we can block So many features we are actually Roll out progressively So the idea is to protect you even against Spear phishing and all of those attacks So generally is there any sort of data That we should avoid sharing online So I will say See by default principle of least privilege
You should use in such a life Means even in the real world You should not share information With people where you feel that something can go wrong Online is no different So generally what happens I have seen that people are very careless With their documents, with their photographs With all of that, you upload it anywhere You put it anywhere You should probably use caution no matter what, whichever website. Also See This:- Top Bail In Lawyer Gujarat
If it comes in your day to day discipline, then I think there is very little chance or at least it becomes very very difficult for attackers to compromise your personal data online. Okay, Vivek, you have done a lot of work around cyber security. You have gone to a lot of conferences, you have educated so many people, you have educated companies.
But have you done anything on a lighter note? Yes, very good question Fraz. And interestingly, after the company was acquired by Pentester Academy, I had a lot of time and I used to enjoy comic books a lot as a child. So then I thought why not create a comic book where we can put an Indian hacker vigilante. So I made this comic book with the team, Hacker Superheroes of the Digital Age.
We have given free copies in many conferences, but if your viewers want, then you can go to vrncomics.com and download and read free PDFs. So this is the first issue, we have made six such issues that we are going to put progressively. And its theme is very simple, that mainstream media has put a very bad negative connotation if you call it hacker or hacking. Also See This:- Top NI Act 138 In Lawyer Gujarat
Versus what I am trying to do is that I am showing an Indian hacker hero in a very positive light with Indian cultural roots etc. Where he is solving the problems of the world by using his cyber security and hacking skills. And the special thing about this comic is that I have made a very real characterization of hackers and hacking. So the technical details down to the last nitty-gritty thing are very real.
So it's not like in the Matrix that Neo shows his hand and everything is parted and the systems stop. So that is very unrealistic. In this comic book we have even shown the attacks that attackers work like this, hackers understand this thing and then backdoor like this. So it has been a very critical claim so far, people have given very good feedback. So I would love to see, I mean you read it and see, we send you a copy too.
And if your viewers like it, then absolutely they can write in with feedback. And we are hoping that we can make this a monthly series type for as long as we can. Alright great, so thank you so much Vivek for sharing all this information with me and my audience. I personally got to know a lot in today's podcast. And I hope my audience liked this podcast and they also got to know something new. So thank you for being here. Also See This:- Top Cheque Bounce In Lawyer Gujarat
Thank you so much Fraz and again you know honor and privilege is ours. That you gave us an opportunity to share all this with our audience. And we will also request your audience that if there is any interesting attack that you want Square X to solve online, then you can email us. We have an email on our website, we would love to work with you and try to solve all of this. Thank you so much and all the best to everybody.
0 notes
ayushgarg65 · 27 days
Text
How hackers operate and hacking as a career option - PART 4
Tumblr media
So let's say you think You are connected to coffee shop wifi Or airport But in reality you are connected to an attacker's wifi network Where you are being monitored And attacked So to solve these 4 things For that we made SquareX And we made SquareX In a very simple way It's a browser extension
So if you install it It keeps monitoring things And as soon as it sees That there is any problem with malicious It immediately detects the attack and stops And to your point If you have got an unknown attachment Or a link to an unknown website Then you can open SquareX's Disposable browser file viewer And you can open it seamlessly
Also See This:- Cyber Crime Advocate In Gujarat
So as you showed us the demo Can you show us one more demo Of how to use all these things So Fraz, we have built All these things in a very simple way So your audience Can go to squarex.com SQRX.com So there we have given a link For SquareX extension On chrome store
So if you click on it you will go to the chrome store And on chrome store you can already see That over 90,000 people Have installed Actually now it's almost 130,000, 140,000 Rest of the stores we have bought And it's a very easy way To go ahead and install SquareX You can just click add to chrome
So it will add extension there And at that point of time You can pin the extension I was logged in before So I am automatically logged in Anyone can create a free account On SquareX That makes it very easy to use So now I am going back To the first example So you will notice that There are a couple of attachments on this email And if you see Scan by Gmail is clearly saying There is no danger, no problem, no malware You can open it without any hesitation Right?
So let's say if we download it And after that If I go to a popular site By doing virus total So what does virus total do? If you upload a file on virus total So virus total scans Against all known anti-viruses And tells Is there any malicious in this file or not So you immediately see 7 out of 60 have basically said There is some malicious in it And they are saying that MS office is some agent Generic malware Also See This:- Bank Account Unfreeze Advocate In Gujarat
Which basically means there is some macro based malware And here If you notice incredibly So dozens of other Anti-viruses are actually Saying that this is absolutely safe There is no problem So you can immediately notice What is the issue in this Right? So in this way attackers Can send you files And you will feel that there is nothing wrong There is no vulnerability,
Let's open it So this is where SquareX comes So you have installed SquareX So you have to enable settings So if you go to settings There is a lot of things like download interceptor If you enable all these Then you will get live security When you are surfing online And you will notice That this is the scan for malicious Documents As soon as I click on this you will see Scanning will come here and then we will see what happens
So you notice It scanned for 2-3 seconds And by the way what is the beauty of our solution This whole scanning job you are seeing Is happening on the browser And this persists So in the sense that If I refresh the page Then you will see that it immediately Catches that these are malicious documents So let's see what is malicious in this
So if I click Immediately it says This is malicious and these are technical details So given that your audience is technical This will be interesting Let's click So as soon as I click it is telling you that this is a malicious macro Which is actually trying To download and run an executable And this is a very typical Method for us for people to get compromised What will they do They will open such a document, there will be a macro run They will go and get malware or ransomware And execute it As we saw in the previous demo Now The tricky part is that the detection is done But a lot of people will say I have an urgent mail, Also See This:- Court Marriage Advocate In Gujarat
I have come from a recruiter I have a job offer What should I do And actually legitimately Issues can be because you imagine That a recruiter himself got compromised So all the mail that is sending This is going to be an issue And that is really where we have done Productivity first solution is made So it is very simple Even now if you say that I have to see this file So you can click Open in safe file viewer
So there are two options in safe file viewer One is that you can open office 365 Online with which we have integration So what will happen if you click this We are uploading this file In office 365 online So you can view it natively Without fear that you will get Hacked or anything like that
So If you see now You can see the whole file But there is no risk of hacking Similarly If you have more attachments So what we have done General purpose safe file viewer If you click on that So we open cloud sandbox We put this file in it And you can use viewer And see that file there So see you can see excel In our disposable file viewer
So once you see this Did everything So you can go to settings And you can click on dispose In disposable file viewer As soon as you do this The whole sandbox gets destroyed And the files inside it get destroyed So going back over here Third option Which is sometimes possible That we can clean up that file Which is in this case We can remove that malicious macro completely
So if I click on clean up file There are two options One you can make pdf Second is we will remove the macro So let's try So in this case we have cleaned up the file Let's see if it is genuinely cleaned up We can go to virus total And we can upload this cleaned up file So you notice Now No antivirus Is picking it up because There is no malicious macro in it So interestingly We gave one more option The pdf one So there are two ways Also See This:- Couple Protection Advocate In Gujarat
You can click and make pdf in clean up file Second we know That a lot of times people need The same different documents in pdf So what we did We gave you an additional option Enable it in extension So you can convert it in gmail or pdf So as soon as you click We are converting it completely In pdf And when it is ready You can open pdf
So see it is ready You click So the whole 66 page pdf is made So It is very simple The vision of SquareX is That we want to ensure That we are an in browser security product And that in browser security product Will keep monitoring websites File, network Content And finally will figure out If there is something malicious in it It will block it
So before closing this demo I will show you one more thing, disposable browser We showed you the file But now imagine If you got any unknown suspicious link What will you do So I will show you a simple example Let's say You are going to google.com And there You searched for hacking website Maybe you want to learn But what is the issue You are scared yourself That I am going to hacking website
So what we have done is Any website You think there is some problem with suspicious You right click Say I want to see it in SquareX Open in SquareX And there we give you option In which country you want To make a disposable browser in cloud And show you through it So as an example if you click Singapore So immediately We create a disposable browser in cloud And in that browser We opened this website You see There is no difference You can go full screen If you want And in that You can open multiple tabs Wherever you want And you see this browser Which is running in Singapore
So in this way What we have ensured That malicious website got file You can open without fear In your existing browser But with zero chance of you getting infected And the difference is Your existing antivirus Works in probabilistic model What is the meaning of that They see the file, site And say I think this is malicious Or this is safe Now that probabilistic model Doesn't always work And best example I showed you in Gmail Google is one of the top companies In the world They are not able to detect malicious samples
So that's why the biggest realization of SquareX Is that We should move from probabilistic To deterministic model Deterministic model means That even if the file has virus Malware or ransomware You can still open it With zero risk of getting infected So how are we making SquareX product Progressively That we see any file, website We will run our analysis
Wherever we feel there is some doubt Immediately we will ask you To open it in your browser And that way You are still doing your job You are still visiting the website You are still downloading files Your productivity is not stopping While you are 100% safe And even if we are downloading We are downloading after cleaning Exactly And the best part is Imagine It doesn't even matter if the file Now has an AV Because if you are viewing the file As we showed You can't get infected And that is really where we are moving from Like existing AVs work Probabilistic detection They say I have seen the file It might be from malicious No,
0 notes
ayushgarg65 · 28 days
Text
How hackers operate and hacking as a career option - PART 3
Tumblr media
I don't remember where they said That we can detect fine grain attacks So today Chrome, Firefox, Safari What do they do? By safe browsing Where primarily known bad sites Are immediately blocked And known bad files are also blocked And they try to use Heuristics, AI etc But They don't have this priority Their priority is software If there are security bugs
Then we will fix it But if user with his stupidity If he does something by clicking Then we can't take his responsibility That's not something We can protect against So Vivek, me being an influencer I get a lot of emails And some emails are fake Where some links are given Some files are attached And I have heard instances Where an influencer His account is hacked Or threatened to delete On YouTube and Instagram Also See This:- Top NI Act 138 In Lawyer Gandhinagar
So how do these attackers Attack us through emails So if you see Fraz What do you depend on for security You got an email on your Gmail So you immediately go to Gmail And see if there is an attachment So you see on it that Gmail says I have scanned And Gmail says that this attachment And if it is working Then you download it And open it So as an influencer How many people will email you That Fraz wants to collaborate with you Here is the attachment Where we have written the details And students can send recruiters
There are many other use cases So what do attackers do First they sit And make a malicious document Let's say word file It is an Excel sheet And using that First they figure out How to fool Gmail's defenses Hotmail, Outlook, etc So that they can't detect That there is malicious malware After that They send you that file Saying that this is the attachment Now you see Gmail didn't say anything Then you open it Malicious attachment is executed Your account is taken over
If you want I can show you An interesting video demo How it happens So I will share the screen For a second So Fraz If you see Gmail's account is visible And if someone sent you a mail That this is confidential employee data Or something else So at this point You open it And you see There is an attachment Immediately you notice Scanned by Gmail That we detect malware So you get the feeling That nothing can go wrong Because Gmail has allowed It is not saying that there is malware And this is the most common Way to get comfortable Also See This:- Top Bail In Lawyer Gandhinagar
That there is nothing wrong So now you see That in this one We download this attachment By breaking off Chrome has also allowed And now when we open it At this point a malicious macro Is executed And even though this excel sheet Looks like a normal excel What attacker has done Is that in the macro It is downloading and executing So this is what happens You open the excel sheet Macro is executed You will see a black screen For a couple of seconds At that time It has run a command And got a payload from its server And that payload Runs and takes your computer in control So in this case You will see that it has downloaded A well known ransomware And this is basically
The whole screen of WannaCry So this ransomware is the most common Isn't it? So this is an example And this is how easy it is For attackers to compromise Social media celebrities Their managers As well as individuals Because you depend Today that we security Depends on Gmail and all A lot of people don't even take AVs Saying that if we use Mac Then we can never get infected Or if we use Linux Then we can never get infected And on Windows you depend On Windows Defender But attackers can evade All of these today How did you like this demo?
Yes, in fact I use Mac And I am pretty sure That I will install anything So Mac has provided me so much security That no one can hack me And we also trust Gmail That Gmail has already scanned All the files Before we download them Correct, so truthfully If you see Gmail is an email provider They don't say That we 100% ensure That your attachments will be safe And nothing will go wrong What has happened is Since the last 15-20 years
We have been using Gmail So we have an inherent assumption That Gmail will do it perfectly And that is what attackers exploit That you trust that If you see a document in Gmail Nothing can go wrong Just download it and open it Which is what we just showed is not true at all Okay Vivek, so let's talk about solutions Tell us ways to be safe Which emails we should open Which websites we should not visit What are the ways we should follow to be safe on internet Yes, so basically
If you see The tricky part is Almost a massive company Even like Google can today be tricked by an attacker That they have sent an attachment That Evades all the security So truthfully If I tell you What people need to do is Use isolation solutions Like two different isolation solutions are available Remote browser isolation and remote file isolation And in that Like you have seen an attachment So that attachment Rather than you download it locally And read it You basically open that attachment in a sandboxed cloud viewer Which you can see So that even in the worst case Also See This:- Top Property In Lawyer Gandhinagar
If there is malware in it Then that cloud will be executed on the sandbox Which later gets destroyed So your own computer Can never be infected So my recommendation for everybody is You get an attachment Try to open it in Google Docs Or to open it in online sandboxes You get links from an unknown sender So try to open it In disposable browsers Rather than Doing everything on your native system Alright, so what I mean to say is Instead of downloading files and opening files In our system,
We should open it in a cloud So that our system doesn't get compromised Correct Because in the cloud it is technically Executing on someone else's computer Nothing is happening on your local computer Because once your local computer gets compromised Then the attacker Can monitor you completely Can turn on your microphone You already know in how many cases You know, the camera also turns on Where unfortunately The victims are blackmailed Everybody's starting point Is this simple file Which you download and open You will forget that you did this And after 15-20 days all of a sudden You will see that you are getting this threat Somebody is asking you to pay ransom Or else I will release your video And God knows what not That is terrible So Vivek,
You are also working on such disposable browsers For a long time So tell us about that How can we use it So Fraz, actually I have been in cyber security for almost 20 years Out of which I have been an entrepreneur for 10 years And what I noticed there That this is a huge problem That end users, consumers, enterprises Are facing So because of that When we started SquareX We wanted to solve this consumer problem First of all So what we did for that Whenever you are on a browser There are 4 things About which you actually have to worry One is malicious files So like I showed you the demo It has ransomware, it has a backdoor Second is malicious website So this is where Somebody has attacked you That it looks like a banking site That you have put your credentials Or some malicious JavaScript Third is malicious content So that is where Some scams are sending you mail You know all those variations And fourth is malicious network
0 notes
ayushgarg65 · 28 days
Text
How hackers operate and hacking as a career option - PART 2
Tumblr media
Yes, yes So there are many But I will give you an interesting example There was an attack on Google By doing an Aurora attack And the way the whole attack had happened That you see A company like Google recruits thousands of people
So their HR team Goes to them in thousands of regimes Every single day So what did the attackers do They made a malicious document Which bypasses the non-antiviruses And people generally feel That I have installed AV Now I am fully protected The truth is This does not always happen Attackers figure out ways to bypass anti-viruses So what did the attackers do They made a document For one of the jobs Which Google had put out And they sent it to the HR team Now HR team has a job Hundreds of resumes come Open the resume quickly See what is relevant So internally pass the team Otherwise you will write to the candidate. Also See This:- Top Court Marriage Lawyer In Gandhinagar
You will write that you are not a good fit So because of that Someone opened the resume in the HR team As soon as they opened The attacker's malicious code Was executed as a macro And then it took over The HR person's computer So that computer By using a foothold By doing a lateral movement In cyber security After that the attacker Infected the other computers Eventually they managed To even get to a developer system
From where they stole and posted source code of a lot of Google products publicly So this is an attack And I specifically said Google Because most people think that a company like Google Cannot do any attack So if Google can be compromised Then the other normal companies Are nothing So when I took the computer In my 7th class So antiviruses were very famous Quikheel, Avira, AVG Were a lot of antiviruses
Because these antiviruses Can't protect us completely That's a very good question So if you see Antiviruses are very good at Protecting against known malware And its meaning basically is Imagine an attacker Used that virus or malware And already attacked people Finally the sample reaches And they take out its signature In your daily signature update You get the signature So after that they will catch you But you immediately think By the time the attacker Is running these attacks Versus when the AV company gets the sample. Also See This:- Top Couple Protection Advocate In Gandhinagar
They make the signature So what happens in between So there a lot of AVs say That we do heuristic based detection We do AI based detection But truth be told Sometimes it works But how does an attacker work Let's say you use AVG Or Norton So the attacker will make A virtual machine in his test bed And install it After that he will start Making malicious files And keep testing Is he able to evade Norton Or AVG And as soon as he gets an evasion He will target you
So it's a very scientific process Where The AV companies unfortunately Are at a loss And the reason is that the attacker Only has to win once While AV companies have to win always So mathematically Over a very long period It's very difficult So that's why AVs are good For known malware, known attacks But beyond that There are a lot of samples That get skipped And if we get time later I will show you some interesting things Okay, really excited for that But before that tell me
What is the significance of incognito mode If we are using incognito mode in our browsers Are we safe on the internet So what incognito mode does It ensures that on your own computer When you surf any website In incognito mode In your computer All the files and cookies All of them get deleted When your incognito session is over But when it actually Comes to online Websites itself There is no big difference for that website Even then it can serve you malware.
Which you download Run it and you will be exploited Attackers can send you spear phishing attacks Which you can open in incognito There is no difference simply because You are still viewing a website Where you may feed your credentials So incognito mode is Not good for anything Let's say you have a common computer 10 people are using it In your home or cybercafe So open it there You want to ensure that your history is not saved Or your files are not saved Which is good for that But removing that Online is not helpful From a security angle It is not helpful from a privacy angle
Also See This:- Top Cheque Bounce In Lawyer Gandhinagar
That if cookies get deleted They can't track you after the session But there is no big contribution In the security of incognito mode Okay and what about VPNs Yes VPN is a very good question Because I feel like everybody Buys VPNs right Everyone has bought subscription So there was a time Where IP based anonymity Was there So it used to happen that If you change your IP People couldn't find you But truth be told Now if you see Almost everybody is Behind an ISP or behind a very big NAT Where hundreds of users are the same
So now you barely get unique IP Online So IP based anonymity is dying And VPNs were built for an era Where IP based anonymity Was the important thing Today if you ask how you track sites Then you track with browser fingerprinting So if you use the same browser on VPN Same Chrome, Firefox, Brave Whatever So using browser fingerprinting Sites can still know What is your true identity Based upon hundreds of data points They may have collected Over months or even years
So the second usefulness VPNs are doing is If you want to watch Netflix or something else You can change your country Truth be told Now most of these online Streaming providers have started To cut down So I feel this is my take on it That in next 4-5 years People will start realizing That original promise of VPNs Is not being met We need to look towards other technologies Let's talk about browsers So many big companies are building browsers
For example Google's Chrome browser So why are these companies not working towards providing a security So actually If you see Google as a browser vendor It is providing you a browser which is a software So if browser Specific exploits Like buffer overflow vulnerability Format string vulnerability
They resolve all those things Because they are software bugs Now the issue is Google, Firefox, Apple for Safari None of those Business logic attacks Fishing scams, spear phishing They can never guarantee that we can detect Because imagine Once Google started claiming
That if you use Chrome You will never become a phishing attack victim And if this happens People will start suing And this happened in US a couple of times So a long time ago Google made a tool By doing an XSS Auditor Which could detect cross-site scripting attacks And attackers Abused that tool in such a bad way That it can't detect That after that In recent memory
0 notes
ayushgarg65 · 28 days
Text
How hackers operate and hacking as a career option - PART 1
Tumblr media
So have you ever hacked someone in your campus? So on camera I can't say it specifically How do hackers attack individuals and enterprises? What do they look for? So if an attacker reads that He knows that if he will mail you as a recruitment agent Then you will open his attachment 100% Ok tell me an example where a very big company has been attacked After that the attacker infected the rest of the computers And eventually they managed to even get to a developer system From where they downloaded the source code of a lot of Google products And published it publicly
So this is an attack And I specifically said Google Because most people think that no one can attack company like Google So I remember that When I bought a computer in my 7th class The anti-viruses were very famous Quikheel, Avira, AVG, there were a lot of anti-viruses So can't these anti-viruses protect us completely?
Also See This:- Top Lawyer in Gandhinagar
Attacker only has to win once While AV companies have to win always But before that tell me What is the significance of incognito mode? If we are using incognito mode in our browsers Are we safe on the internet? After that the attacker can monitor you completely Can turn on your microphone You know how many cases You know the camera is turned on Where unfortunately the victims are blackmailed Everyone's starting point is this simple file
Which you download and open So you will forget Hi everyone, welcome to a new episode In today's episode we have a cyber security expert along with us Vivek Ramachandran who has 20 plus years of experience Working in cyber security domain He is the founder of Square X Which is a browser based cyber security solution And before this he was the founder of Pentester Academy Where he educated a lot of people around cyber security Including your Fortune 500 companies He is a well known speaker in worldwide cyber security conferences Like Defcon,
Hacktivity and Blackhat So it's going to be fun in today's podcast We will ask a lot of questions from Vivek And we will also ask him how to enter into this field What are the benefits if you become a hacker? So it's going to be an interesting podcast Watch till the end And if you are new to the channel, subscribe So let's start the podcast now Hi Vivek, how are you?
Very good Fraz, thank you so much for having me on the show I am very excited So Vivek, in many movies and TV series A software engineer is portrayed as a hacker Many people think that by learning a programming language They will become a hacker This thought comes to mind once in a while So how did your journey start as a hacker? Yes, very interesting question I was also a software engineer I was preparing for my IIT entrance At that time there were a lot of web attacks on Yahoo etc
Also See This:- Top Cyber Crime Lawyer In Gandhinagar
So when I read the news articles I found out that there was a German hacker He was the one who wrote the tool through which it happened So I became very curious about what tool it was How it was written I downloaded it So at first of course I didn't understand anything Because I was just going into engineering Then I saw that it was written in C It was written in assembly
So I started learning all of that Then when I reached engineering in IIT At that time barely anyone used computers on my batch By the way, this is year 2000 So I already had a lead in computers That I knew a little more than others So to fulfill that lead I started going online The underground forums were online At that time there were a lot of good texts available On cyber security, hacking etc
So after learning from there I started learning And at that time we had such a big land So many students So of course there For entertainment and all that I used to use exploits Sometimes I am breaking here and there Within the campus And then the initial fascination Became interest and passion And finally that became my whole career For the last 20 years So have you ever hacked anyone in your campus?
So on camera I can say it specifically But it happens Let me give you an interesting example At our time people used to download movies And bring them on DVDs And store them on their computers And many times people didn't share them with each other So at that time I used an exploit And enabled the sharing of their hard drives So that the movie is available and I can download it So this was at least the most interesting hack I did on campus Where all the movies that came on DVDs At least I made a storehouse on my computer Interesting So Vivek you have educated many people Around cyber security So many people want to know What is cyber security as a domain If you want to do a job
Also See This:- Top Bank Account Unfreeze Lawyer In Gandhinagar
So Fraz I will say that Cyber security is one of the most exciting Was upcoming from the last 7-8 years And now it has accelerated a lot And the reason for this is basically Whether any new technology comes Its cyber security angle will definitely be there Because a few years ago there was IOT So IOT was security Now there is AI So prompt security After that LLM model security So no new technology comes And finally people have to learn its security angle So the good news is Security is always a second order function of technology
So technologies can come and go But security is always evergreen as a field So what I have seen is People who get into cyber security And do it well They can literally build a life long career And it is never connected to any technology Nothing comes You can learn that cyber security angle And you will be relevant Pretty much forever Vivek many people who see me are freshers And they want to know How to enter into cyber security What is that path With which they can become a hacker
Yes very good question So my advice is Before this I used to run a company Pentester Academy almost for 10 years Where we used to teach cyber security The company was acquired So whatever I enter I will tell them First of all learn the fundamentals of computer science and networking Because security being second order As long as your fundamentals are clear It is very easy to build and understand on it
After that at least one programming language If you want to learn it JavaScript, Python, Go Whatever you want to learn Take one language and learn it very well So if your foundation is built Then you can actually go into very basic What is called pen testing Which is tools Nmap, Metasploit You can use all these and see How to do network scanning After that how to do basic exploitation And then you can build from there But I have always seen that Whose fundamentals of computer science and networking are good And one programming language is reasonably good Those people find it very easy to transition into cyber security Ok great Let's talk a little more about hacking How do hackers attack individuals and enterprises What do they look for Very good question Actually if you see In the world of hacking
The very important principle Go behind the weakest link So if you are an individual So the most technically What do hackers do They understand that ok How is this person What does he do online And where can you attack him It is a very simple example Let's say you are a student and you are looking for a job And you have put it on your LinkedIn That I am looking for a job If there is a good recruitment agency
Then please connect me friends Ok So now if an attacker reads that He knows very well that If he becomes a recruitment agent and mails you Then you will open his attachment 100% So you imagine There is an MS doc file In which he has put a malicious macro And then he mails you as an individual To say that Ok there is a very good job offer in this You immediately respond with details So no matter what One person will open that mail 100% And that is really where Where has hacking reached nowadays That first understand your target Based upon the target Find the weakest link Where you can force him To open a document To visit a website And attack from that place
So I can give one example For example Like our parents are of age Who are starting to use the internet So for them The best target is That you have won a lottery ticket Or paytm today Or someone online Your big gift hamper is going to come So you can call here Or send us an OTP So I think In the case of individuals Always targeting on Where that individual is most vulnerable What is he looking for
Second, if you take enterprise Then the same thing actually percolates You imagine domeone is working well So of course When you are working somewhere The best for you is That someone contacts you And says that Google wants to offer you Or Google's recruitment is going on So using the same recruitment scam You can be targeted again
So I will say That 90% of attacks today are happening That target the individual On their email On their WhatsApp, SMS, Telegram And all these things And that is the starting point Where larger attacks are built Ok, you tell me an example Where a very big company has been attacked
0 notes
ayushgarg65 · 29 days
Text
What is Cyber Security With Full Information?
Tumblr media
With the growth of technology, computers and internet are being used in almost every field today. In today's time, all our work is done through the internet, whether it is the work of a government company or a private company, money transactions are also done online, that is, every type of data is being exchanged on the internet in some form or the other and the devices used such as computers and laptops, tablets, mobile phones or all other smart devices remain connected to the internet.
The level at which the internet is being used all over the world and millions of users use it every day, so in such a situation it is very important that attention should also be paid to the security of use on the internet because every day there are reports of people becoming victims of fraud, hacking, virus attack and data factory on the internet, that is why it has become very important to provide security to the data of the users.
Also See This: - Best Lawyer in Gandhinagar
Tumblr media
Cyber ​​security is used to protect internet users from cyber crime, in which security is provided to the user's data. You all must have heard about cyber security, but perhaps you will have complete information about it,
So we thought why not in today's video we will tell you about cyber security What is cyber attack, how many types are there and what are the benefits of using it , all the information related to this should be brought to you, but before that all of you are welcome to the support channel and to know about cyber security , do watch this video completely.
So first of all we will know what is cyber security. Cyber ​​security is a type of security for the system connected to the internet. Cyber ​​security is made up of two words, first is cyber and second is security. So whatever is related to internet information technology computer networks application or data, we call it cyber which is related to security security, which includes system security network security and application for information security.
Also See This:- Best Cyber Crime Lawyer In Gandhinagar
Tumblr media
To strengthen cyber security, data of hardware and software is made more secure through the internet so that there is no theft of data in any way and all documents and oil are safe. Today cyber security is being done to prevent cyber crime all over the world. On the basis of cyber security, any organization or any user can protect their data .
Hackers access the computer of the user organization without permission with the help of electronic tools, then steal important files and data and demand money in return . Committing any kind of crime using the Internet is called cyber crime and those who commit this crime are called unethical hackers.
It means harming someone by using the Internet in a wrong way or crimes committed through the Internet are called cyber crimes. Cyber ​​criminals use computer and Internet technology to access all such important data related to personal information and many other things. They also use the Internet dangerously to create many types of martial software. Also See This:- Best Bank Account Unfreeze Lawyer In Gandhinagar
Tumblr media
So , blackmailing, stalking, copyright, credit card theft, fraud etc. come under cyber crime. Cyber ​​security has been created to protect the data of Internet users from such crimes and cyber crimes. For cyber security , computer and Internet exports are used by which cyber security is done.
Cyber ​​security means that our files kept online, mobile data, all our information given online should be safe. Apart from this, network and The application should also be secure and now we will know how many types of cyber attacks or cyber crimes are there,
today we are seeing that the world is immersed in the Internet in such a way that it is doing every work through the Internet, more and more companies are storing more and more information on the computer database and we all shop online with the help of our credit card, then our data and information is at risk, there is a risk and there is no way to guarantee that our information will always be safe, that is why to prevent cyber crime,
A separate law of cyber security has been made in every country, the purpose of which is to curb the high-tech crimes happening through the Internet, but it is very important for all Internet users to know how many types of cyber attacks are there so that we can immediately inform the officials working for cyber security,
So let us now know about different types of cyber attacks, the first is the virus, you must have heard about the computer virus, which is a type of malicious program that is specially designed to protect the victims. The virus is made to harm the computer. Also See This:- Best Court Marriage Lawyer In Gandhinagar
Tumblr media
It spreads throughout the system by clicking on itself at the right time and can infect the computer system and steal data without the permission or knowledge of the user. The second adware is a group of malware that is known to generate popup messages.
Adware creates a software using tempting ads and when a user downloads that software, it accesses the user's computer with the help of that software and then either deletes important data or data or steals the data. The third is Trojan Horse.
Trojan Horse is also a malicious program that presents itself as harmless or useful software . Trojan takes control of our system and executes malicious actions. Trojan Horse cannot create its own copy like other viruses, but it can install the virus in the system.
A virus can delete the files and data of the system, steal important information and passwords and lock the system. And the fourth is Ransomware, this method is a virus. Which is used by criminals to attack people's computers and systems.
Also See This:- Best Couple Protection Lawyer In Gandhinagar
Tumblr media
Which causes a lot of damage to the standing crop in the computer, then after that the criminal takes bribe from the person whose computer system has been damaged in this way and only after that leaves his system, at number five is Shimmles, Shimmles is generally used to steal personal information from the user and this method is profit in which proud emails are sent to people so that it seems that this mail has come from a good institution,
The purpose of such mail is to steal important data like credit card information or login details. Cyber ​​​​security allows us to secure our networking system in which we have to work with important or sensitive data. The primary role of cyber security is to protect confidential data, money is to be developed only by authorized users and now we will know what is the benefit of using cyber security.
Cyber ​​​​security has many benefits, by which the network can be protected from external threats on the Internet at every level, so that a common user can do his work on the network and Internet by being safe. Cyber ​​​​security also has some other benefits like that cyber Security protects the organization or users' network from external attacks and also ensures that the user gets good performance on the Internet and feels safe about his important data. Also See This:- Best Cheque Bounce Lawyer In Gandhinagar
Tumblr media
Data is provided security, which reduces the risk of important data being stolen or written. Thousands of types of databases are stored on the Internet, such as patient data, student data, business data, etc. So, keeping all this highly sensitive data safe from unauthorized access so that it cannot be misused can be guaranteed by using cyber security.
Cyber ​​security is also important because government, military, corporate, financial and medical organizations collect a lot of data and keep the data in their system computers and other devices. Some part of this data can be very important, the theft of which can have a profound effect on someone's personal life.
That is why data is kept safe with the help of cyber security . Damage caused by malware can be avoided, due to which there is a risk of all types of threats like virus, spyware, ransomware, adware and further now we will learn about career options in cyber security as people's dependence on computers and Internet increases.
Also See This:- Best NI Act 138 Lawyer In Gandhinagar
Tumblr media
Cyber ​​crime is increasing day by day, due to which the demand for experts in this field has increased who are cyber security experts and who have knowledge of cyber law. The law and police are there to stop the crime happening among the people but they have failed to stop cyber crimes, due to which many possibilities have arisen for cyber experts in this field.
If you also want to work in this film, then after passing 12th, you can take admission in any of its courses. For those who have already taken a law degree, it can prove to be an excellent fielder. There is a list of different types of jobs in the cyber security sector such as Cyber ​​Security Officer Computer Prime Investigator Cryptography and Network Security Engineer Security Architect Security Analyst Security Consultant Source Code Auditors etc.
India is the third largest user of the Internet and in recent years cyber crime has also increased manifold. Many steps have been taken by the government to provide cyber security. To move towards adopting cashless transactions, many steps have been taken.
Due to this, it is necessary to ensure cyber security in India. That is why great computer experts are hired to prevent cyber crime so that no one can hack important files and important data remains safe. Hope this information about cyber security has been useful to you and you would have got to understand a lot.
Also See This:- Best Bail Lawyer In Gandhinagar
Tumblr media
What is your opinion about this video, you can tell us by writing in the comment box. Also share what you want to know about further. If you liked our video, then like it and share it as much as possible so that this information can reach other people as well. Don't forget to subscribe to our channel and press the bell icon to be the first to see our videos. Thank you and do
0 notes
ayushgarg65 · 1 month
Text
Kya Disputed or Complaint Amount Return Karne Se Bank Account Unfreeze Ho Jata Hai
0 notes
ayushgarg65 · 1 month
Text
Bina Aapki Marji Ke Complainant Ke Account Mein Fund Transfer
0 notes
ayushgarg65 · 1 month
Text
Bank Account Freeze Court Recovery Order | Cyber Cell Se Account Kasie Unfreeze Karen
0 notes
ayushgarg65 · 1 month
Text
Mask Aadhar Kya Hota Hai | Hotal Ko Apana Aadhar Card Dena chahiye Ya Nhi
0 notes
ayushgarg65 · 1 month
Text
FINO Bank Account Freeze By Cyber Cell | FINO Bank Account Kaise Unfreeze Karen
0 notes
ayushgarg65 · 1 month
Text
Police Bank Account Kab Tak Unfreeze Karte Hai | Gujarat Cyber Crime Lawyer
0 notes
ayushgarg65 · 1 month
Text
Kya Koi Bank Account Hai Jise Cyber Cell Freeze Na Kare | Advocate Gujarat Cyber Crime
0 notes
ayushgarg65 · 1 month
Text
Zomato aur Swiggy Se Kaise ho rahe hain scam | Zomato and Swiggy Scam
0 notes
ayushgarg65 · 1 month
Text
Bank Account Freeze Reason | Account Block Reason | Money Transaction Mixmatch
0 notes