SECURITY AND PRIVACY




"Welcome to MaxTechh"

"SECURITY AND PRIVACY"





  • Private Browsing's Secret!  It is not as private as you think!


 Modern browsers offer privacy options under several different names: Incognito Mode in Chrome, Private Browsing in Firefox and Opera, InPrivate Browsing in Internet Explorer and Microsoft Edge, Private Window in Safari, etc.

 Since they all do more or less the same thing, I make a reference about Chrome's Incognito Mode.

 When you open the incognito window in Chrome, the most popular browser, it states in its description that it has some limitations in protecting you from prying eyes.

 But this description is often ignored by more users.

 Surprisingly, almost all users mistakenly feel that in incognito mode no one tracks all their activities.

 As Google explains in incognito mode, this is not the case:

 "Your activity occupied hidden from websites you visit, your employer or school, or your internet service provider"

 This means-

 "That the pages you open in incognito tabs, their history, cookies are not stored on the local PC as soon as you close the browser.

 However, any file you download or bookmark you create will be retained.

 However, you will not be invisible.  Even when you enter incognito mode your browsing will not be hidden from your employer, your internet service provider or those web sites. ”

 So what do private browsing modes actually do?
 There are actually two types of privacy: local privacy and online privacy.

 Local Privacy contains only what your PC can see during your browsing, such as your browsing history, cookies, etc.  You can block it in incognito mode.

 But in this mode, your online privacy is not affected in any way.

 According to a survey conducted in 2018, 65% of users have misconceptions that Incognito and Private browsing modes will hide their identity and browsing habits from governments, organizations, and advertisers.

 Basically, your browser does not save cookies, temporary internet files or your browsing history when you are in incognito mode.

 Its main purpose is to hide your browsing history from others who use the same computer.

 Many users have a misunderstanding of the limitations of incognito mode.  Despite offering explicit warnings when opening the Incognito tab, some people think that it hides their online activity from everyone, including the ISP or the employer, when this is clearly not the case.

 In addition, going to incognito mode software installed on your computer can also threaten privacy protection.

 Parental monitoring software is generally unaffected by incognito mode.

 Spyware that is installed on a computer can also continue to collect your information despite using incognito mode.

 Incognito mode and other private browsing modes are useful and they provide an additional layer of local privacy protection that makes it easy to take advantage of.

 As long as users are aware of their limitations and do not expect a spell that completely hides their online activity, it can be a useful tool that is easy to use.

 So Is There A Way For Online Private Browsing?
 Google, Bing or any other professional search engine you use collects a lot of data about you, including your search history, location.  With this help, they improve their services and relevant ads.

 So are there any such browsers that can take care of your online privacy?

 Yes!  DuckDuckGo does this.  DuckDuckGo does not collect your data and has the ability to block the AIDS tracking network.


  • 11 GOOD habits Which will improve your online security: 


Related image

A good security software can do a lot to improve online security and protect you from the consequences of online mistakes.  But sometimes scammers force you to collaborate with them in some way to gain access to your data and you are (knowingly or unknowingly).

 There is no security software, but good security habits are the best way to protect yourself from these types of attacks.  There are many common-sense rules, which not only keep you safe in the real world, but they can also protect you online.

 However, at the manageable level, it is possible to reduce the number of hazards.  It only helps to develop some good security habits.  None of these tasks are particularly difficult, but you need to do them regularly, only then will they become a true habit.

 So continue to learn what you can do now to make your online experience safer.

 1) Be skeptical:
 This is one of the most important behavioral changes you can make.  Scammers rely on our natural instinct to trust other humans.  Generally, we are afraid of "what people will say" until we are proved to be false.  But by that time, a scan has been done.

 Social engineering attacks rely on this type of trust.  But the heavy dose of caution and doubt can eliminate many scams.

 Double-check suspicious information with its expected source.  Make sure to use the phone number available on the company's official web site, not the email signature that may be incorrect.  Be especially wary of unusual communications requiring immediate resolution.

 2) Double-check the information:
 Most email-based scams rely on users to open their email and follow the instructions given therein.  While many people have been educated about the risk of these phishing attacks, scammers have also become more progressive.

 To avoid these, there is a need to always look at such email messages with a deep fear.  If you can understand what the email is asking you to do, you can avoid the scam.

 For example, are you being asked to log into your bank account immediately?  If yes, do not follow any link in this email.  Instead, type the bank's web site into your browser and open it and then login.  If you are unsure about the origin or validity of an unexpected email, communicate with the sender to confirm its authenticity.

 3) Wait a bit before clicking:
 Phishing scams are one of the biggest threats.  These are misleading emails and text messages that come to you by clicking on a link to a malicious site or downloading a malicious attachment.

 Many phishing scams have their own strategies, but they depend on what you click.  You have a chance to think before clicking such a link.

 In this way, a phishing email can say that there is a problem in your Amazon account and you must click on this link immediately to verify it.  Or maybe it says that you can win a free iPad if you sign up immediately.

 You can usually avoid these scams by pausing a second to think.  This is why you should get used to pausing a second or two before clicking on a link.

 4) Create a Strong Password and Security Question:
 Securing your online account is as important as securing your Windows account.  The first step should be a strong password and security question.

 When you are creating an online account, you may be in the habit of rushing to finish it quickly so that you can start using the site.  This is the reason why many people use weak passwords like their name or mobile number in passwords or use passwords of other accounts here.

 Both of these make you insecure.  Hackers can crack an easy password in minutes.  If the hackers got your password then it can be easy for them to access all your accounts.

 This is why you should get used to creating a unique, complex password.  These may take longer to create, but they protect your information.  Of course, you should also find a good way to remember them.

 5) Use Two-Factor Authentication:
 Whenever you create an account on a new website, or every few months when you visit an old website, you should get used to looking at the security settings of your account for a few minutes.

 Often you can also get additional security features to turn on, such as two-factor authentication, which will make you secure.

 Two-step verification is an additional security layer that keeps your account secure, even if your password is as strange as "41 $ & 8) 1 @ 01gr" or as stupid as "admin @ 123".

 This system becomes active when you try to login to your account from an unknown device.  Since the system does not know if it is a hacker, or the owner of an account using a different device than normal, it "alerts" you by sending an SMS to your cell phone with a code.  Only after entering this code will your account have access.

 Two-factor authentication means that even if a hacker receives your password, they will not be able to login to your account without access to your phone.

 6) Don't get carried away by emotions:
 Modern online romance scams are predetermined and organized crimes that steal millions of rupees of vulnerable, lonely people on the Internet.

 Scammers use the emotions of users for a perfect Cyber ​​Crime: they sit safely abroad on computers, hunt on social networks, and they are rarely caught.

 Victims are often severely damaged - both financially and psychologically.  And they are so embarrassed that they are reluctant to come forward and complain, even when they feel they have been scammed.

 If you have to be safe, then the habit of giving money on social networks and transacting your personal information will have to be changed.

 7) Do not keep sensitive information in the cloud:
 Nowadays services like Google Drive, OneDrive and Dropbox may be convenient, but they are still vulnerable to being hacked.  So not storing your sensitive information on the cloud is the best way to stay safe.

 8) while using internet banking;  Check "https: //" in the address bar:
 Make sure that you use the habit of using Internet banking, always check that you have opened the right site in your browser.  All banking site addresses are now started from https: //.  S means more secure.

 9) Use a unique password for every login:
 Use a different username and password for each of your online accounts.  Otherwise, once one of your accounts gets hacked, hackers will have to work less to hack your other accounts.

 I know how difficult it is to remember a different username and password for each account.  But a solution for this is already available to you.

 10) Always clean your browser cache:
 Never underestimate how much your browser's cache knows about you.  Can save cookies, search and web history, your home address, family information, and other personal information.

 Always keep clear of all your information which may be hidden in your web history.  If you are using a public computer, this is a good habit.

 11) Turn off the 'Save Password' feature in the browser:
 What can your browser know about you?  Many browsers offer some password management solutions.  But I would never recommend using this feature.

 I think you should never save your password in the browser if you want to be safe.

 I am surprised that by default browsers still prompt you to save your web password. Turn off this feature immediately.


  •  The best way to encrypt your USB Drive data and password protect:
Image result for usb drive protect


 Nowadays USB pen drives have become the best source to store information.  With the OTG adapter coming in, you can use the same pen drive on your smartphone and PC.

 USB pen drives are small, portable and universal resizable.  These features make it a perfect carrier for data.  However, due to their portability, they are also easy to lose.

 Therefore, you should always store your sensitive files on the USB stick.

 But how will you protect your sensitive data after the USB pen drive falls into the wrong hands or is lost?

 Unfortunately, as you protect your PC or phone with a password, you cannot protect your pen drive.  For this, you will need tools that encrypt the data.

 There are many freeware encryption tools that you can use to protect your data.  Most, however, require Administrator Writ to run on any computer.

 Tools like these are not a viable solution if you have to securely transfer data to a computer where you do not have administrator rights.

 Rohos Mini Drive:

The encryption tool Rohos Mini Drive protects files on your flash drive, but unlike other tools like TrueCrypt, VeraCrypt, it creates partitions that you can access without administrator rights.

 Free Edition can create up to 8 GB of hidden, encrypted, and password-protected partitions on your USB flash drive.  This tool uses automatic on-fly encryption with AES 256 bit.

 After that, you can access your Secure Protected data anywhere on any PC.

 First, download Rohos Mini Drive from the download link given above and install it on your PC.

 Note: Once you have created an encrypted drive, you can uninstall Rohos from your computer if you wish.

 Once the USB installation is complete, there is no need to place it on your computer.

 The first time you open this program, it will automatically detect your USB drive and will ask you to set a password for it.

 When encryption is set, you will see a new file on your USB stick.  This is the program required to launch a secret program that is now present on your USB drive.

 You can open your encrypted partition by double-clicking on the Rohas mini file.

 You can store your sensitive data in this partition and simply access it on any PC from Rohas mini file and for this, you do not even need to install this program on other PC.


 Encryption means arranging the data so that only the author's person can read it with the secret code or password.  Encryption is the most effective way to protect data.  Computer encryption is based on the science of cryptography, which will remain in use as long as humans want to keep information secret.

 Windows Vista, Windows 7 Ultimate or Windows 8 Pro already has a feature to encrypt called BitLocker.  But here the purpose is not to encrypt the whole disk, and you just want to encrypt the file or folder.  In my previous post, I had given information about the TrueCrypt software which is right for this purpose, but now its support has stopped.



  • Right-clicking and encrypting your personal folder for security:

 AES_EncryptionAES Crypt is free open-source software to encrypt files completely, easily and securely, using the Industry Standard Advanced Encryption Standard (AES).

 After installing it, right-click on the file you want to encrypt and choose the option of AES Encrypt.  Now a small window will open where enter the password and click Ok.  To decrypt this encrypted file, right-click and select the option of AES Decrypt.

 ES Crypt is available for many operating systems such as Microsoft, Mac OS X, and Linux.

 AxCrypt:
 AxCryptRightClickAxCrypt is a highly secure data encryption app that provides AES-128/256 file encryption and compression for Windows.  Its interface is very simple and with Windows Explorer, it integrates without any configuration.

 AxCrypt is a secure way to send documents with shares and emails with attachments.

 It integrates with Windows to compress, encrypt, decrypt, store, send personal files.  To encrypt a file or folder, just right-click it and select "encrypt" in the option of AxCrypt.



  •  10 Easy (But Important) Tips to Secure Your Cashless Transactions:


 The world is progressing towards a cashless economy.  As a result of the demonetization campaign, people are now using cashless transactions for online banking, shopping, bill payment, ticket booking, etc. but now tea, bhelpuri, and vegetable ones are also adopting digital transactions.

 10 Best Transaction Options Available in India -

 Check
 demand draft
 Net banking / online payment
 Debit Card / ATM Card
 Credit Card / Travel Card
 Gift Card / Prepaid Card
 E-wallet
 Unified Payment Interface (UPI)
 Aadhaar Enabled Payment System (AEPS)
 Unstructured supplementary service data (USSD)

 This payment option is an authorized payment system in the country and the Reserve Bank of India has taken several steps to make it safe, secure and efficient.

 Payments through check and demand draft are the safest, but for this, you need to visit your bank.  Online transactions or net banking are used to transfer e-payment or direct accounts.

 The central government is now taking several steps to promote digital payments in which the use of cash is minimized.

 But as the world is progressing towards this cashless economy, here cybercriminals have also got an opportunity to target these users.  They are now using the latest technologies to attack users, online shoppers, and bankers.

 Cyber ​​Criminals are now looking for new opportunities to steal your financial details.  You must have heard in the recent news that 32 lakh ATM cards of State Bank of India were hacked.

 This is why users' data security is being questioned.  But we also have some responsibility in online transactions to keep security measures in mind.

 How hackers attack on cashless or online transactions-
 Understand some of the techniques hackers are targeting to make cashless transactions-

 1) Nowadays, in every public place, you get free WiFi.  When you turn on WiFi at a mall, railway station, cafe, airport or other public places, you may see much WiFi with the same name.  At such times, some of these may be created by fake and cybercriminals to target users.

 2) Fake offers and discount email hackers send multiple users simultaneously, which has a link to shopping.  This link takes you to a fake or infected website.  Giving financial details here can put you at risk.

 3) Phishing sites of banking, e-commerce or shopping are created, which look exactly like the original.  The login details and other information you enter on such a website directly reaches the hackers.

 4) Hackers create different types of apps, which can be similar to Origin apps.  By using such an app, hackers try to steal your login ID/password and other banking information.

 Many fake BHIM apps have come to the Google Play Store, which are confusing the users.  As the popularity of the BHIM app is increasing, the number of fake apps is also increasing.

 5) In many ways fake messages are being sent on WhatsApp too, which have a fake link.

 5 WhatsApp scams and fake messages you need to be careful and avoid

 How To Secure Cashless Transactions?
 1) Never click on the banking or shopping website link included in the email or text message you receive.  Instead of clicking on such links, manually type the URL of your bank.

 2) After opening the online banking site, https is always placed before its address.

 3) Always download online payment apps like Banking, Paytm and Bheem from Google Play Store.  But before downloading, please confirm their publisher, as Play Store also has many fake apps.

 4) Always keep a strong password for your banking or online payment.  If you want to learn how to create a secure password and how you can actually remember it, click this link.

 Easy tips to create a secure password that you can actually remember

 Learn how to manage all your passwords with these best free password manager

 5) Change the PIN number of your online banking or debit card from time to time.

 To make your online transaction more secure, use two-factor authentication.  Before making an online payment, an OTP appears on your registered mobile number, which is entered only after the final payment is made.

 6) Do not use a cyber cafĂ© computer for online payment.  They can have a keylogger on their computer, which can capture the password you typed.

 7) Do not use an unsecured Wi-Fi network for online payment.  By doing this, hackers can steal your information.

 8) Install the best antivirus on your PC.

 9) Sometimes installing just one antivirus is not enough for PC security.  In addition, you should also install anti-spyware and malware software.

 10) If you pay online from Android mobile, then you should install antivirus in your mobile as well.

 It is important to change some of your habits -

 1) Social networking has become a craze nowadays, and everyone is able to add a lot of personal details in the process of updating their profile and status, so that they can get in trouble, such as their entire birth date.

 2) You get many emails every day, most of which are spam mails.  But there are some matches which do not look like spam but they have a suspicious link.  Now it is not necessary that you see all the links in the email.  Check any link in the email before clicking it.

 3) Keep your personal details at any time on your smartphone.  Especially credit cards and banking information.  If you have stolen a mobile, this information will easily come in the hands of the thieves.

 If you are regularly using public WiFi on your smartphone or laptop, your personal data is in danger.

 4) Whenever after eating the food in the hotel, we give our debit card and PIN number to the waiter to pay with the card.  Even if the balance in your account is low, it can be a threat to your safety.

 5) While making payment with debit card, enter the PIN number of the card by your hand.

 If you think this post is useful, then do share it with your friends and colleagues so that they too will be safe while transacting online.

                           THANKS FOR VISITING MY BLOG


SHARE

Max-Techh

. ’Blogger ’’

    Blogger Comment
    Facebook Comment

1 comments: