Posts

BlackRock Scam Explained: How a Telecom Giant Fell for a Phishing & Investment Fraud

Who is BlackRock? BlackRock is a renowned global firm with major operations in New York and London. While it is often associated with finance, in this context we refer to BlackRock’s telecommunication partnerships and its global influence—similar to what Airtel holds in India. However, unlike Airtel, BlackRock recently became a victim of a massive investment and phishing scam. Phishing and Investment Scam: What Happened? According to reports, Indian-origin telecom executive Bankim Brahmbhatt has been linked to an alleged multi-million-dollar fraud involving BlackRock. Here’s how the scam is believed to have unfolded: Brahmbhatt reportedly approached BlackRock claiming he had substantial investments from companies that were mutually associated with the firm. By building trust and maintaining regular communication with BlackRock, he managed to secure a loan of nearly $500 million . To support the claim, spoofed emails were allegedly sent to BlackRock from addresses mimicking o...

The Dark Side of the Internet: Understanding Online Bullying and Abuse

Introduction Nowadays, even children have the technology that was once only accessible to industry giants and MNC's. The difference is of maturity. This technology was once used to be for a good because as it was in safe hands, but as of now, it is seen that the the tech, the internet or the social media has both pros and cons.  If used in a good way, this may take us to reach great heights, but if used wrongly it may lead to paths which are unethical. Cyberbullying is one of the most used malpractices across the globe. What is Cyberbullying? - The practice of bullying a person or an organization by sending messages, mails or social media content of an intimidating, mocking or threatening nature. We don't know what kind of pressure of is on the person or organization who is facing cyberbullying until and unless we are a victim.  Real Life Example We already have some cases where people have some it. One of the case I recently came across is about an employee working in an MNC ...

Emerging Cyber Crime !!

 In India, cyber crime has emerged a lot. From password hacking to national cyber crime, Cyber crime has evolved a lot. Nowadays money is been transferred by hackers to their account from people accounts unknowingly that this is a crime . This type of Hacking or Hijacking of money of people's bank accounts by hackers is a cyber crime which must be reported in the cyber cell. In India it can be reported on the contact number 1930. MY OWN EXAMPLE Speaking about the last week, my father received a call which said - ' we are speaking from khufiya(undercover) agency, is it your son, he is going to be kidnapped and it can be stopped if my father gave the ransom amount', here my father scolded them knowing that this is a fraud call. But he took notice and asked about me from my mother. After I got to know about this, knowing this is a scam call I reported this in cyber cell (1930). Cyber cell not only takes action on the report but also spread awareness about such incidents. Again...

Find out what the Dark Web is and How you can access it ?

Image
 Dark Web is a World Wide Web content that exists on dark net ( network that use the internet but require a specific software ). Deep and Dark web are applications of integral internet features to provide privacy and anonymity. Is it safe to use Dark Web? A person with an ordinary knowledge about techy things should never go to Dark web because he will not be able to protect his own identity. Hackers are looking for such people who are noob. After getting into dark web they can steal your identity and use it for their work and it may be an illegal work too. And why you want to browse the dark web,there's no need. You may also get some virus in your device and your all data can be hacked in just few minutes. Difference between Deep Web and Dark Web- The deep web contains internet content you can't find through search engines, while the dark web is a hidden network that requires a special browser to access. Surface Web The portion of world wide web that is readily available to th...

Dumpster Diving

 The government's nodal agency CERT-In has warned against 'Dumpster Diving', which refers to fraudsters searching through a person or an organisation's trash to obtain sensitive or valuable information for malicious activities. It suggested using a shredder to destroy documents, installing security cameras or employing security personnel and disposing electronic devices properly to avoid misuse. What is dumpster diving? Dumpster Diving is a Physical Attack in which a person recovers trash in hopes of finding sensitive information that has been merely discarded in whole rather than being run through a shredder, incinerated, or otherwise destroyed. Technique A cyber attack where the attacker gets their hands on sensitive documents or data you carelessly threw into the trash bin. Solutions to it- ·        Know why someone target dumpsters on your property. ·        Light up the waste collection area. ·  ...

NETWORK SCANNING

  NETWORK Scanning ·        Network scanning refers to a set of procedures used for identifying hosts, ports and services in a network. ·        Network scanning is one of the components of intelligence gathering which can be used by an attacker to create a profile of the target organization. The purpose of scanning is to discover exploitable communications channel, probe as many listeners as possible, and track the ones that are responsive for an attacker’s particular needs. Types of scanning ·        Port scanning – Lists the open ports and services. ·        Network scanning – Lists the active hosts and services. ·        Vulnerability scanning – shows the presence of known weaknesses. SCANNING TOOLS ·        Nmap ·        Hping3 ·    ...

Password Hacking !!

  Password Cracking It is one of the most enjoyable hacks. The password cracking may not have a burning desire to hack the password of everyone. The actual password of the user is not stored in the well-designed password-based authentication system. Due to this, the hacker can easily access to user's account on the system. Types of Password Cracking ·        Non electronic: It doesn’t require technical knowledge. §   Social Engineering §   Shoulder Surfing §   Keyboard Sniffing §   Dumpster Diving ·        Active Online: An active attack is a network exploit in which a hacker attempts to make changes to data on the target. §   Dictionary attack §   Brute-Force attack §   Rule Based attack ·        Passive Online: A network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. ·  ...