Beware the Rise of Ransomware – Norton.com

Photo shows laptop loaded with dollar bill

Photo shows laptop loaded with dollar bills

The latest spin on a ransom note isn’t composed of letters clipped out of a newspaper. Increasingly, criminals are unleashing brash attacks on your PC and its data through a type of malicious software called ransomware.

It’s exasperating enough when your computer is sluggish because of a virus, but what if the virus installs embarrassing pornography on your screen or encrypts your data so you can’t read it? Ransomware attacks often use these tactics to demand you pay a ransom to remove the pornography or to access your files.

READ:Beware the Rise of Ransomware – Norton.com Continue reading

Web App vs Native App: which is best?

Comparison of Mobile VS Desktop Per Number of Global Users (Millions)

Comparison of Mobile VS Desktop Per Number of Global Users (Millions)

If you are on a startup or trying to start a startup  you may get to decide which one you want to work on the app that you start with will lead to the development which is a ladder or the snake which is the pit for your business. Let’s be completely honest: amount of mobile devices are growing up exponentially every year and no one can stop this expansion; even more – Google wants you to become mobile friendly, chastising those companies, who don’t want to adjust their online services for mobile. Custom android app development services or iOS, or even Windows mobile – end-user wants to be more flexible, you should be either. This is all about personal benefits and individual advantages

READ: Web App vs Native App: which is best
Source: CodingSec

Google Rich Cards – Enhance Your Search Results for Higher CTR and Conversions

grich club

Google Rich Card illustration photo

Published by Joydeep Bhattacharya,in Internet

Google Rich cards was launched on 17th of May 2016 through a new markup format which is capable of displaying content (movies and recipes as of now) in a more attractive and visually stimulating manner. The main aim is to provide more visually appealing search results for users.

The announcement by Google is to notify the web community about an upgrade for the current Rich Snippets format, which is widely employed in most of the organic “mobile search results” for movies and recipes to a revamped structure, officially named as Rich Cards

READ: Google Rich Cards – Enhance Your Search Results for Higher CTR and Conversions

What is a Botnet ? How to Detect and Prevent it ?

https://codingsec.net/2016/06/botnet-detect-prevent/what-is-botnetWe here the name Botnet quite a lot in the cyber world, but what is Botnet ? how can you detect and remove it ? Today we will discuss about this topic.
What is botnet ?

A botnet is a network of computers that are compromised and are under the control of an attacker. Every individual device in a botnet is called as a bot. A bot is usually formed when a computer is infected with malware. This malware allows the crooks to control the computer remotely without the knowledge of the owner of the computer. The attackers who control these botnets are referred to as “bot masters” or “bot herders” .
READ:What is a Botnet ? How to Detect and Prevent it ?

The Definitive Guide to CSS Pseudo-Classes

http://www.hongkiat.com/blog/definite-guide-css-pseudoclasses/definite-guide-css-pseudoclassesWhether you are a novice or an experienced CSS developer, you probably have heard of pseudo-classes. The most well known pseudo-class is probably :hover, which enables us to style an element when it’s in the hover state, i.e. when a pointer device, such as a mouse, is pointed at it.

Following the concept of our previous posts on margin:auto and CSS Floats, we take a closer in-depth look at pseudo-classes in this post. We will see what pseudo-classes really are, how they work, how we can categorize them, and how they are different from pseudo-elements.

READ:The Definitive Guide to CSS Pseudo-Classes

Various Types Of Hackers – Explained

http://hackagon.com/types-of-hacker/Hacker is a term we all hear once a day but who is a hacker? Well, Wiki says” A hacker is someone who seeks and exploits weaknesses in a computer system or computer network”. Many people wants to be a hacker for their personal reasons. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and another network and that makes a perfect reason to know about the different types Of Hacker.

Also read: How to Become An Ethical Hacker in 12 Simple Steps
Various Types of Hackers
1. Black Hat Hacker:

A Black Hat Hacker (Also known as Crackers or Dark-Side Hackers) are an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. The general view is that, while hackers build things, crackers break things. They are the bad guys, cyber criminals who have malicious intents. These are the hackers who steal money or valuable data, infect systems with Viruses, Trojans, and Malware etc. These are the ones who gave the world of hacking a bad reputation and it is up to us, the White Hats to bring them down. They use their hacking skills for illegal purposes with unethical goals and sometimes just to watch the world burn.

READ: Various Types Of Hackers – Explained
source: hackagon

Virology – Understanding Computer Viruses

virusOn contrary to popular belief, Hacker’s own machines are often more vulnerable to attacks than the average user. This is especially true of those who are new to the world of hacking because of their more frequent access to remote machines, dodgy forums, open administrative privileges on their own machines and inexperience in covering their tracks etc. Further, those who are experienced often take advantage of the ones who are in the learning stage, trying to get into this field. So, for a newbie hacker, it is of vital importance to learn how to protect themselves to avoid being consumed by their own curiosity by Understanding Computer Viruses.
READ:Virology – Understanding Computer Viruses

How to do SIM card Cloning

simMobile phones are everybody’s need. People mostly do their confidential talks over cell phone’s, But only some know how easy it is to eavesdrop them, there are some tricks and hacks to do that, but the most powerful way is to clone their SIM Card. The Subscriber Identity Module (aka SIM Card) is the transmitter of the signal to the mobile and tower. So let’s understand How to do SIM cloning.
READ:How to do SIM Cloning

Facebook’s latest feature Alerts You if Someone Impersonates Your Profile

http://thehackernews.com/2016/03/fake-facebook-account.htmlOnline harassment has been elevated a step with the advent of popular social networks like Facebook.

Cyber stalkers create fake profiles impersonating other Facebook users and start doing activities on their behalf until and unless the owners notice the fake profiles and manually report it to Facebook.

Even in some cases, cyber stalkers block the Facebook account holders whom they impersonate in order to carry out mischievous tasks through fake profiles without being detected by the actual account holders.

But now, online criminals can no longer fool anyone with impersonation method, as Facebook is currently working on a feature that automatically informs its 1.6 Billion user base about the cloned accounts.

READ: Facebook’s latest feature Alerts You if Someone Impersonates Your Profile

Source:http://thehackernews.com