x

Like our Facebook Page

   
Early Times Newspaper Jammu, Leading Newspaper Jammu
 
Breaking News :   Back Issues  
 
news details
Importance of Technology in our lives
Yasir Altaf Zargar3/23/2015 10:58:16 PM
The inventions of science and technology bought massive
changes in our lives. The world is changing at a speed we
could never have imagined it before. With the increase in technology we are bound either to use it or to behave like Stone Age man. The day by day increase in technology changed the whole system, from letters to e-mails, from shopping to e-shopping, from books to e-books, from newspapers to e-newspapers and from banking to Net banking. We can say the vocabulary got changed and new words were bought with same meanings.
The human life became hypnotised with the new creations of science and technology. Today we can check bank balance, buy things, read e-books, all it just need one click. The invention of "Smart" things i.e. smart phones, smart TV's made our life progressive. We can grab information of anything, can read about constitution, can read about diseases, can get suggestions and we all can remain in-contact with each other just inside a box. The cyber world became so popular we could have never imagined. Today we start believing more about virtual life than that of real life. Al it is because of chat clients and social networking portals. On one side life is progressing with the change, but on other side it is affecting our moral life. With the change in our lives, we all need to upgrade ourselves, so to adapt the technology. In Kashmir the life is changing too. But with the change we also need to learn about cyber-attacks. The virtual box is full of criminals and fraudster's. They attack innocent people who lack technical knowledge and rip their money with so call "Social Engineering attacks", "Phishing - Vishing attacks and the last one RAT attack".To make Kashmir secure from these fraudster's I would like to define you, so that you will not become victim of theseattacks.
1:-"Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.
In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email."
2:- "Another one which is mostly used by fraudsters is Vishing or voice Phishing.Vishing or voice phishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit."
In simple language we often see our phone receives several messages regarding "You won 10000$, for this please send us your bank account number and password".
3:-Social engineering is a non-technical method of intrusion, hacker's use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.
4:-The 4th one which sounds ugly to us is RAT attack. It does not mean rat (mouse). It stands for "Remote administration tool". A remote administration tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. The RAT is used in order to hack some one's computer, once the rat gets installed in your computer, we can say the computer has another owner which is accessing and running it remotely. So whatever you will do will be monitored by criminal who attacked you.
How can we secure
As well we know no bank wants to know your password, your personal details. Nobody wants to give money to others. The world is greedy, then how one could donate money to another for no reason. Ifanybody calls us regarding bank details, we need to inform bank regarding such cases. If we receive messages, emails which ask information, simple delete it. Never give attention to it. We need to install good antivirus on our computers so as to secure from RAT. In order to install any software, 1st we need to scan it and then install it.
"Tail Piece."
The world is greedy. We can say the fraudster's attack one pond which is full of fishes. As we know each and every fish is not smart. Some of them get caught, which become slaves of fraudsters and get scammed.
Author Yasir Altaf Zargar is a writer and Security Analyst from Srinagar and the first Kashmiri to be Acknowledged by Google ,Yahoo, Microsoft, Nokia,Adobe, Apple.He Tweets as @zargaryasir.
  Share This News with Your Friends on Social Network  
  Comment on this Story  
 
 
top stories of the day
"Out of 1410 units established under SFCP, 305 were non-existent"
Mass copying turns into Rs 5 Cr industry in Doda, Kishtwar
SVO registered 215 cases, 157 pending
After Sapphire, Tourmaline, Aquamarine rocks surface in Padder area
Man who dragged JU to court, heads varsity's legal cell
KPs remind BJP its commitment on Temple Bill
Political interference mars GMCH functioning
Stopping cross border terror prerequisite for peace: Mufti to Pak
NC-Congress coalition's failure to hold civic polls: J&K lost Central allocation worth Rs 170 cr
Long delays in recruitment process: PSC points fingers at official inadequacy
Fair sex pins hope on Mufti Govt, wants representation in vital sectors
Geelani, Mirwaiz welcome, Malik tight lipped
CM takes cognizance, cancellation of all appointments likely after session
Once deputed, 2 BJP ministers opted for alternative Information Officers....
No woman SHO in 10 Jammu districts
CEO ERA, Tehseen, Renzu, Mughal among suspects
CEO Budgam faces axe
Punish those who killed pandits or we would approach international bodies: KPSS
174 govt schools in JK are without students
Martyr's family prefers ‘action’ to dialogue with Pak
KAS preliminary exam on April 5
AFSPA would be revoked gradually: Mufti
Agencies sound alert about possible infiltration along borders
Top Army commander reviews security situation in J&K
Uproar in LA as Opposition demands compensation to avalanche victims
Rs. 1.5 Lakh each to kin of deceased: Govt
Six months on Dal inhabitants yet to receive relief for damages suffered during Sep 2014 flood
 
 
 
Early Times Android App
STOCK UPDATE
  
BSE Sensex
NSE Nifty
 
CRICKET UPDATE
 
 
 
 
 
 
 
 
   
Home About Us Top Stories Local News National News Sports News Opinion Editorial ET Cetra Advertise with Us ET E-paper
 
 
J&K RELATED WEBSITES
J&K Govt. Official website
Jammu Kashmir Tourism
JKTDC
Mata Vaishnodevi Shrine Board
Shri Amarnath Ji Shrine Board
Shri Shiv Khori Shrine Board
UTILITY
Train Enquiry
IRCTC
Matavaishnodevi
BSNL
Jammu Kashmir Bank
State Bank of India
PUBLIC INTEREST
Passport Department
Income Tax Department
JK CAMPA
JK GAD
IT Education
Web Site Design Services
EDUCATION
Jammu University
Jammu University Results
JKBOSE
Kashmir University
IGNOU Jammu Center
SMVDU