Posts

Showing posts with the label hacking

Isn't someone spying on you by hacking your mobile phone? Check it out like this

Image
 Isn't someone spying on you by hacking your mobile phone? Check it out like this In the current era of internet, the incidents of mobile phone hacking are increasing day by day. In addition, technology has started to be used in every field, due to which the risk of being targeted by hackers has also increased due to the fact that mobile phones are used for various purposes. In this case, your mobile is a hacker and no one is monitoring it? Today we are telling you about some of the signs that appear when a mobile is hacked, based on which you will be able to know to some extent whether your phone has been hacked or not. 1. Battery discharging abnormally If your phone's battery drains or runs out quickly, it can also be a sign that the phone has been hacked. Because the phone's battery may have been consumed more due to the spying app running in the background. So it is important to pay attention to the battery of the phone. You need to keep the details of the apps on your

These are 15 tips suggested by Nepal Police to prevent Facebook ID hacking

Image
 These are 15 tips suggested by Nepal Police to prevent Facebook ID hacking Recently, in the context of the increasing incidence of Facebook account hacking, Nepal Police has given various suggestions to avoid this problem. By releasing a video on Wednesday, the police has suggested ways to avoid account hacking. According to the statistics of Nepal Police Headquarters Cyber Bureau, out of 9013 complaints filed in the previous financial year (2079/80), 6782 complaints were related to cyber crimes committed through Facebook. Similarly, 140 complaints were received from the marketplace, 220 regarding gift fraud, 1230 regarding hack and fraud, and 27 regarding beneficiary. Till this period of this financial year (2080/81), 8628 complaints have been lodged with the Cyber Bureau, out of which 6915 are related to cyber crimes committed by Facebook. Similarly, 340 complaints have been received from market placement, 225 from gift fraud, 378 from hack and fraud and eight from beneficiary. In r

Hacker hacking Facebook account by tagging in obscene posts, what to do to avoid?

Image
 Hacker hacking Facebook account by tagging in obscene posts, what to do to avoid? Lately, Facebook account hacking and spreading malware in the form of obscene content has increased. In this case, first of all, the hacker sends a phishing link to the Facebook user. After clicking on such links, they (the link clickers) account is taken over by the hacker. And from the said account, links to obscene posts are also shared. In such a post, obscene captions or photos are placed outside. However, there is malware inside. After the hacker takes over the account of other people, he posts such content by tagging more and more friends. Everyone who is friends with the people tagged in the shared post will see the content. If your friend is tagged in such a post and opens the link to see what's inside, their account will also be taken over by the hacker. We tested one of the links (shown in the image below) spread by the hacker. After clicking on the link, the access to the account was lost

10 Tips to Avoid Mobile Hacking

Image
10 Tips to Avoid Mobile Hacking With the development of technology, people's lives have become easier, but the risks are also increasing along with it. Technology is also working to destroy people's privacy. The most important thing we need to remember to protect privacy is mobile. Our life now depends on the mobile we carry. Even the smallest details used in daily life are in our mobile. If the mobile is lost or hacked, our personal data can easily get into the hands of others. 1. Use strong passwords or biometric authentication Although it sounds normal, the password used in our mobile plays a very important role in the security of the mobile. Today mobile companies have started using biometric authentication system. It is useful to use biometric authentication i.e. your fingerprint or Face ID for mobile security. But this feature may not be available in all mobile phones. In this case, you should use a strong password. The use of passkeys to replace passwords is also increas

Iranian hacker hacking Gmail account and reading user's emails | When was your phone made? Here's how to find out

Image
Iranian hacker hacking Gmail account and reading user's emails A hacker group protected by the Iranian government has been found to be automatically downloading and reading emails sent to Yahoo and Outlook along with Gmail.

What is Ethical Hacking? How is it different from other hacking?

Image
What is Ethical Hacking? How is it different from other hacking? As the scope of technology and the digital sector grows, so does the attack on this sector. Formerly limited to the Local Area Network (LAN), the area has now expanded to mobile devices, wireless networks, and the Internet of Things. Institutions are also adopting various measures to solve various problems related to technology. However, the increasing scope of technology has also increased the range of attacks.