Skip to main content

Posts

Change Language in Google Account

When we create an email address, sometimes we do not consider the language preferences. Afterward, when we log in to a google account, context will be shown as unfamiliar. So we can change the language preferences of google account by following steps.  1.  Click on the Google profile and select google account 2.  Select data & personalization settings. 3. Scroll down and go to general preferences for the web. And click language. 4. If you need to change the default language, click on the pen sign. 5. If you want to add more languages, click on add other languages.

Cyber Chef - Bake your data!

The cyber chef is a security tool which uses for encoding, decoding, encrypting and data analytics. It is available on GitHub ( https://gchq.github.io/CyberChef/ )  and provides services from simple encoding process to complex encryption process. It was implemented for the British government as a  part of MI5 and MI6 project. However, now it can be used by both technical and non-technical personnel without the knowledge of algorithms. The cyber chef is a freely available web application that can be used online. The offline version is also available to download. The cyber chef has some features to complete conversion tasks. Input –  Where to paste or write text that wanted to convert. Up to 500mb file can be dragged to the input field. Output – Where converted text is displayed. Recipe – where tools used for converting are dragged and dropped. Operations – Contain all the operations. These operations covert input text into selected form and display in ...

Melissa - Nothing but a virus

Melissa refers to a virus, that Written in macro language (visual basic for application languages that use to create MS excel and other word processing software) and disseminates through e-mail attachment. It was the first malicious software which contains the virus, worm, and Trojan as one package and it was found in 1998-1999 span. Melissa has the capability to affect over 1 million computers within 3 days. Once your device is infected by Melissa, receiving emails will be blocked. The email which carries out the Melissa virus has subject line as “important message from someone” and body text starts with “here is that document you asked for… don’t show anyone else”. The email attachment typically stars as ‘LIST.Doc’. When the recipient opens the email or clicks on the attachment, the software will be immediately activated. Then it sends the same email to the emails addresses which are in the victim’s mail address book. And also it copies itself to documents that are in infected...

Phishing - Hook for your data

Phishing is a trap to get your sensitive data through email which seems, it is from a trusted and well-known sender. This fraudulent attempt is done by online scammers (cybercriminal) to steal your identity and passwords to do crimes. The term “Phishing” was first used in 1996 that occurred in Usenet newsgroup called AOHell. Since the earlier hackers are called “Phreaks”, the ‘f’ in fishing replaced by ‘ph’. Even phishing attacks start to propagate through email, now it held by phone calls too. Mostly the attackers target a certain group or individual, Instead of sending emails to a large number of people. And those email seems like it is from reputed organization. Phishing emails make recipient panic by saying that your account has been hacked or there is an unrecognized activity occurred in your account and forced them to change their credentials using a given link. On the other hand, victims encourage to click on the link by saying that they have won a reward . When the receiv...

Flame - Cyber Espionage

                           Flame is the most sophisticated and powerful malicious program that created to target Iranian uranium enrichment process. It creates a backdoor to access a computer on a network and spread via shared files and USB drives. Flame steals data from the affected computer and monitors every activity of the user on the computer. It was 1 st found in Iranian oil network. Flame is considered as another dangerous cyber weapon and used as cyber espionage by attackers. Flame initially spread through a spear phishing email and website. Moreover, it can be spread via infected USB drive and infected PC in LAN. The worm is a 20MB file that contains encryption algorithms, multiple libraries, SQLite3 databases, 20 plugins – provide the platform for attackers and some code written in LUA language which vulnerable to Microsoft Windows computer. When flame infects the computer, all data files w...

DUQU - The RAT

                Duqu is a remote access Trojan (RAT) that contain multiple malicious files which can attacks computers, as a word document. It attacks industrial control equipment manufacturers  (gas, electric and water)  and collects all intelligence information in the compromised computer (ex: user credential, manufacturing details) illegally.  It uses kernel drivers to decrypt and loads encrypted dynamic link library (DLL). These kernel drives act as an injection engine to load DLL. The encrypted files are stored as a .pnf file in the kernel, which is normally set up information file extension in Microsoft Windows system. Since it is remote access Trojan, it will allow the machine to download and run additional programs. Duqu is looking like somewhat Stuxnet worm. Its kernel drives have a digitally signed certificate same as Stuxnet. Consequently, all data can be stole and computer is remotely operated by an a...

Stuxnet - The First Digital Weapon

                    Stuxnet is a file type worm which exploits zero-day vulnerabilities to attack computers. This is considered as the very first digital weapon that not only harms to computers but also the physical aspects which run by computer commands. It especially targets on centrifuges which produce enrich uranium to make nuclear weapons. It was first found as a result of US and Israel project to derail or delay Iran’s process of nuclear weapon manufacture. How does it infect?                The worm is spread by USB drives and it harms to the machine which runs on Microsoft Windows platform. It pretends to seem like reliable by presenting a digital certification and it cannot be identified by a malware detecting tools or security experts. Stuxnet search for the PLC (Programmable logical controller) which is the manufacture of the Siemens. PLC is used...