Saturday, August 15, 2020

safe banking system

How to keep the banking system safe?


 The security of the banking and financial system has been debated from time to time. But the truth is that there is still a tendency to be sensitive to security only when big banking frauds occur and to ignore small incidents.


More cyber attacks or attempts are being made in the financial sector. But such incidents are rarely public. Banks do not disclose such incidents on the grounds that their reputation, prestige and distrust in the service recipients will decrease.



In some cases, even looting crores of rupees, banks consider 'hiding privacy' as a solution. Hackers have started targeting ATM switches or servers. Although they have come to the realm of investing in security in recent times, they do not seem to be ready to avoid the danger in time.


It is a fact that some banks and financial institutions are not even following the instructions given by the National Bank to adopt the security system. The concerned institutions need to be serious to keep the banking system safe.


How to keep the banking system safe?

The network and system related to the card should be supervised regularly.

Arrangements should be made to audit the information system related to the card annually.

Arrangements should be made to conduct Vulnerability Assessment and Penetration Testing (VAPT) of the card related system on a semi-annual basis.

Arrangements should be made to conduct quarterly risk assessment of the card related system and discuss it in the risk management committee of the concerned bank.

Arrangements should be made for regular centralized monitoring of ATMs connected to ATM amnesty. In addition, arrangements should be made to conduct such monitoring regularly even on Saturdays and other holidays.


Licensed financial service providers should arrange for cyber security insurance to minimize potential losses from cyber security risks.

In order to control the transaction limit through card, all banks and financial institutions should take the service of determining the transaction limit from Visa, MasterCard and other payment system operators.

Banks and financial institutions and PSO-PSPs should make arrangements to secure important infrastructure of information technology system using privilege access management.

Banks operating in compliance with Payment Card Industry and Data Security Standards (PCI-DSS) and operating ATM switches should make arrangements to audit PCI DSS annually.

Friday, August 14, 2020

'Master Mind' - hacking Twitter!

 17-year-old 'Master Mind' shocks the world by hacking Twitter!


U.S. prosecutors on Saturday charged three people with involvement in a recent Twitter hacking case. The timetable of the hack has also been made public in a court document issued by the Ministry of Justice.


The document also details how US investigators tracked down the suspected hackers. According to court documents, the entire hacking activity started on May 3.

A teenage clerk from Tampa, Florida (who had been living in California) gained access to a portion of Twitter's network on May 3.


But what happened between May 3 and July 15 is still unclear. However, Clark initially failed to gain access to the Twitter admin tool used to kill the account.


But on the second day of the Twitter hack, according to the New York Times, Clerk initially had access to Twitter's internal slack workspace, not Twitter.


New York Times reporters quoted a hacker community source as saying that the hacker had found the login details of a Twitter tech support tool. From there, he broke into a slack channel of the company.


On the day of the hack, a picture of the tool, which controls all Twitter accounts, was leaked online by Twitter employees. However, the login details of the tool were not enough to access the back end of Twitter.

According to Twitter's blog post, Twitter's administrative back-end is protected by two-factor authentication. How long it took the clerk to do all this work is still unclear.


But according to Twitter researchers, the hacker used a "phone spare phishing attack" to trick Twitter employees into accessing their accounts and break two-factor authentication.


All of this happened on July 15. It was the same day that the company that hacked Twitter made it public.


Shortly afterwards, the clerk, who reached out to OG Users' Discard Channel from Kirk # 5270 ID, talked to two people and asked for help in monetizing Twitter's access, according to an FBI chat.


OG Users Discard Channel is a special forum where hackers buy and sell social media accounts. Through the channel, the clerk claimed that Fazeli (22 years old) who used Rolex # 037 ID and Separd (19 years old) who used Angius # 0001 ID were Twitter employees.


He asserted that his confession had been obtained through torture, and that his confession had been obtained through torture.


The clerk also sold access to various short-form Twitter accounts to Separd. 


The clerk thus reassured both of them about their access level. The trio then agreed to post an ad to promote the clerk's ability to hack Twitter accounts on the OGUser Forum.


Many people are believed to have bought access to their Twitter accounts after the ads were posted. A record message posted on YouTube by a U.S. Attorney's Office official states that investigators are monitoring several users involved in the hack.


 One of the three parties had posted a cryptocurrency scam message on July 15 by purchasing access to the celebrity's authentic Twitter account.


Such messages were seen on the accounts of celebrities including Barack Obama, Joy Biden, Bill Gates, Elon Musk, Jeff Bezos, Apple, Uber, Kanye West, Kim Kardashian, Michael Bloomberg, Floyd Mayweather.


In which users were requested to send Bitcoin to different addresses. According to court documents, 12.83 bitcoins, or about १७ 117,000, were found in the hacker's operating wallet in the scam.


In the course of the investigation, the cryptocurrency exchange company Coinbase intervened in the matter and stopped trading at the scam address on the day of the hack. In the end, the मर 280,000 that went into the scammers' accounts was saved.


By then, the subject was known to be hacked. Twitter staff blocked the clerk from tweeting on his official Twitter account.


According to the investigation, the clerk had access to Twitter's admin tool and communicated with 130 accounts. In 45 of them he had reset the password and in 36 he had access to secret messages.


On the second day of the hack, Twitter went to the administration and filed a criminal complaint against the hack. The FBI and the Secret Service then launched an investigation.


According to court documents, the FBI obtained users' details and chat logs from Discord using data and news shared on social media.


The FBI used a copy of the OG user's forum database, which was leaked last April, as some hacker ads were also posted on OG users. The database contained details of users registered in the forum, including email and IP addresses, as well as personal messages.


The FBI was collecting data from Coinbase with the help of the Internal Revenue Service and the address of Bitcoin where the hackers were involved. After studying the data from these sources, the FBI was able to track the identities of the hackers in all three directions. It was linked to email and IP address.


For example, the FBI tracked down Fazelli after he linked his discarded username to an OGUser. This was an operational security upset mistake of Fazeli.

Similarly, Fazeli also made many mistakes in hiding his identity. Initially, he used the address [email protected] to register on the OG Users Forum, but later he used the address [email protected] to hack a Twitter account called Foreign.


He used the same two email addresses in his Coinbase account. Which was later certified by his driver's license.


In addition, Fazeli used a home connection to access all three sites. The three services Discard, Coinbase and OG user's connection log showed his home IP address.


Another person, Separd, had a similar weakness. He had infiltrated the OG user with an ID named Cheiwan. According to investigators, on the day of the hack, Separd was able to access his discarded account with the help of an advertisement posted on the OG user's site.


After that, the researchers got the confirmation from the leaked database of OG user. There, Cheyenne was buying video games from a Bitcoin username, and fortunately on the day Twitter was hacked, Separd was connected to the same address.


Like Faizelli, Separd also uses the actual driver's license to manage the accounts at Coinbase to authenticate his various accounts. However, the FBI has not linked the clerk to the Kirk hashtag 5270 Discarded User.


But according to details released by various US government sources on Saturday, Clark appears to be the man. Hillsburg State Attorney Andrew Warren claimed that the 17-year-old Tampa teen clerk who was arrested on Saturday was the mastermind of the hack.


In a press release issued from the northern district of California, the administration told the state attorney that the clerk was a juvenile. The hacker, who was arrested by Florida, revealed his name was Graham Evan Clerk.

Thursday, August 13, 2020

Binod - Twitter

After all, who is 'Binod', how did he come to be trending on social media?


'Binod' has been trending on social media including Twitter for the last few days. Now you may be wondering, is humor also a trending topic?


But for a while now the word has been on the list of top trending on Twitter. #Binod (hashtag in humor) There have been tens of thousands of tweets so far. Now it is being talked about everywhere.


Famous companies are now sharing their posts using the same trending. There are many mimes coming on Twitter and Facebook linking to humor.


The word is now appearing everywhere in social media posts, mimes, and in the comment section of any post. But some of us don't know who this trending 'joke' is and how it suddenly became trending.


Vinod's full name is Vinod Tharu. It has a YouTube channel, but no videos. Her YouTube activity is also limited. He goes to other people's videos and writes his name 'Binod'.


Recently, a YouTube channel called Slay Point made a video. In which the comments coming on the YouTube channels were roasted about how meaningless they can be. The faces of Abhuday Mohan and Gautami Kawale seen in the video go to comment on the YouTube channel.


That comment was nothing but the name 'Binod'. Suddenly, the video they made went viral. And it was the users of social media who made it trending by writing 'Vinod' in social media posts and comments.


Thus, a flood of posts and comments with hashtag jokes started coming and this name became trending. It didn't take long for the joke to go viral.


The word became so viral that even brands like Swiggy, Tinder, Netflix, Paytm started posting it with the same viral name.


Similarly, a Twitter user by the name of Gabbar Singh asks Fintech startup company Paytm that he can keep humor by changing the username of Twitter. Paytm immediately accepts the request and immediately jokes about its username.


Famous streaming platforms Disney Plus Hotstar also started mimes with this name.

Swiggy, a food ordering app, was celebrating its anniversary. And he tweeted, "We think the first person to call us tonight at 12 o'clock will be Vinod."


Similarly, Netflix India has written a tweet in praise of Arman saying that he has been commenting on every one of his tweets for the last one year. Airtel India tweeted to its followers asking them to start talking and comment on the response they receive every time they receive a call.


Amazon Prime Video India also joined the trending. Not only that, but the Mumbai Police also got involved in it. Linking to Binod, spreading online security awareness, he tweeted, "Dear Vinod, we hope your name is not your online password."


It's going viral right now, change the password right away! '


Similarly, many brands, celebrities, police were all posting on the hashtag Vinod. This trend of India gradually spread to Nepal as well.


Even Nepali brands and users are having fun using this word to the fullest.


Corona's epidemic thus made a meaningful comment to a user who was under a kind of stress, a fast way of conveying meaningful messages and entertainment.

Wednesday, August 12, 2020

Want to extend battery life!

Do this! Tired of running out of battery quickly or want to extend battery life?

If the laptop is new then there is no problem of battery backup. But gradually the problem of battery backup on the laptop begins to come. This does not mean that the quality of the laptop is not good.

But the thing to keep in mind here is that even the way you use a laptop determines the battery life to a great extent. Here are some tips to help you get started if you have problems with battery backup every day. From which you can greatly improve the battery life of your laptop.

Don't make the brightness of the display too much

Most of the time when working on a laptop, the brightness of the display does not need to be kept at the maximum level. If the brightness level is at its maximum, it can affect the battery as well as your eyes.

Most laptops have two keys on the keyboard, which can be used to raise or lower the bristles level. If your laptop doesn't have such buttons, go to Settings, System Display, and Adjust Brightness.

Use the Microsoft Edge browser

The browser you are using on the laptop is also affecting the battery. Many mimes have been created in Microsoft's Internal Explorer.

But Microsoft claims that its Edge browser saves more battery life than browsers like Google Chrome, Firefox and Opera Mini. This means that Edge Browser may be a solution for you in terms of saving laptop battery.


Don't wait for the battery to run out

The habit of most people is to keep the charging cable connected to the laptop at all times or to connect only when the battery is very low. But for longevity of the battery, you must improve this kind of habit. Keep the laptop battery between 40 and 80 percent as much as possible.

Turn off keyboard backlight

Even if your laptop has a backlight, you don't really need it. If so, it is better to close it.

Where lighting conditions are good, there is no need for a backlight on the keyboard. You can turn it off by simply pressing a function key on your keyboard. Or you can turn it off from Windows Mobility Center.

Long battery life

If you are doing office work regularly, you are not using heavy software on your laptop. If so, you need to switch to Best Battery Life or Best Performance Mode.

All you have to do is go to the taskbar and click on the battery icon there. Choose the right balance between best performance and battery saving.


Battery saver mode

On Android and iOS devices, when the battery charge drops below 20 percent, the battery saver mode is automatically activated. Laptops also have similar features.

For this you can go to settings, system and battery. When battery saver mode is activated, email and calendar syncing, push notifications, and apps running in the background are all disabled.

Unplug unnecessary device

If you are not using a device such as a webcam or external hard drive, it is advisable to unplug such devices. You can also disconnect the mouse while the laptop is in sleep mode. Because it also consumes battery.

Turn off Bluetooth, WiFi

If you are not using it, you can also turn off Bluetooth and WiFi. In this case, you have the option to turn it on when you need it. In this way you can save and extend the battery life of the laptop.