Skip to main content

Fingerprints || Part 1 || Introduction

How to Avoid Common Cyber Attacks in day to day life?



By,

We all are living in the digital era, where we are bound to use the smart devices in our day to day life for almost every work. Life has become so comfortable with these smart devices and digitalization of the technology, in the banking sector, purchasing and selling industry, social media sharing, and other information sharing. With this tremendous digitalization comes the great responsibility of the users and the service providers to keep the data safe as far as possible. Below are some standard techniques to avoid yourself being a cyber victim of bullying or hacking.



Avoid unnecessary file transfer and follow Links while chatting online: 

Do not follow any links that you receive from strange people as it may contain viruses or code that may allow someone to hack your device. In is always recommended to check the folder with anti-virus software before you open any file received through emails, especially from strangers.

While Chatting Online: 

Always tell your parents / authorities if someone upsets you or makes you uncomfortable when chatting. Most importantly, never give your pictures or any type of personal data to strangers. It may look lucrative for time being, but in long run it may create a big issue.




Do not give your personal details: 

such as your name, location, credit card information, etc. during chat, because the other person may be too physically or digitally watching the conversation.

Internet chat documentation for future references: 

Always try to document your chat and online conversation for future reference. By using the information you received during an online conversation, you will be at ease to catch the person who interacts with you, if he misuses the information or does any crime.

Never meet a weird cyberpalist:

The person you meet online every day may or may not be the right person. He may give wrong information about his details. `so, be careful in meeting a stranger on the internet. If you choose to meet, do so in a public place and take along a friend.



Avoid Providing third person's information without their consent while you are in chatting: 

Children love using chat rooms, they should be aware that people are strangers in chat rooms and may not be honest guys. The privacy policies may not disclose information you are sharing through a conversation. Never talk about your personal information like your name, home address, email phone, etc.

Avoid Chatting with Unknown Person: 

Never entertain chatting with an unknown person. Avoid adding an unknown person as friends. This will definitely be a breech in your privacy and may harm you. As I said before, it may be exciting for a while but hard paying later-on. 

Restrict access to your profile picture by enabling profile picture sharing only to contacts: 

Whatsapp has become a universal messenger nowadays with the help of mobile numbers. You can check the profile photo of any particular user. This may not be safe if the number falls in to wrong hands. They may misuse your photo and can harm you mentally. To avoid this, set the privacy settings of your profile photo only to my contacts.

Always Logout when you use WhatsApp web: 

Many people prefer to use WhatsApp web as a matter of ease at larger screens and others. On your laptop or computer, when you use WhatsApp web, always disable “Keep me signed in” in options before scanning the QR. By doing this, you will be logged out after a certain time of inactivity.

Always take back-up of your important files: 

If you are a typical home computer user, back up any critical file as and when they are changed and do the full back up once a week or month. Keep the back up into a separate location so that you will have at least one back up even in case of a disaster.

Do not leave your laptop at the airport, library or cafeteria unattended: 

Make sure you enter a key to sign in to your laptop. Please keep your device traveling with you. Do not use your mobile devices in public areas and use non-traditional bags to look after your laptops.  

Think twice before your Post: 

Most of us like to share our daily lives on social media. I have seen people taking number of selfies every day and posting them freely (openly) on social media. The only requirement here is to keep account private and adding people whom you know to your social networks. This will avoid you being a victim of online stalking.




Delete chain-emails and spam as quick as possible: 

Do not forward or reply to any of them. Avoid sending out separate alerts and receiving reward chain emails. Many of these email types are scams. Some of them are dangerous. By sending them to others, you contribute to the problem and become an email bullying executor.




Comments

  1. Great job for publishing such a nice article. Your article isn’t only useful but it is additionally really informative. Thank you because you have been willing to share information with us. Indian forensic organization

    ReplyDelete
  2. Thanks for publishing such detailed informative article. cyber crime has become a big concern nowadays. We need to be aware and have how to deal with such frauds. If someone have any issue regarding cyber attack, Cybersniper is the best cyber security services in Pune.

    ReplyDelete
  3. MyaccountAccess Com - My Credit Card Account Access login. To get to your My Account Access Card, you'll at first need to register at the official website of myaccountaccess. How to access myaccountaccess - My Account Access Login

    ReplyDelete

Post a Comment

Popular posts from this blog

Crime Scene Search Methods

The Crime Scene is search for the physical evidences (visible or invisible). There are various types of search methods employed by the investigating officers and the forensic scientists at the scene of crime. The searching methods mainly depends on: Type of Crime (Rape, murder, burglary, theft, etc.) Nature of Crime (Homicide, suicide, or accident) Size of the crime scene (macroscopic or microscopic) Location of the crime scene (indoor, outdoor, combination of indoor or outdoor, or any remote area like underwater, desert, etc.) Complexity of the crime scene  Before deciding the search method, all the investigators and the forensic experts must follow the general guidelines (check list) to observe the crime scene after due recording: 1. Are the doors and windows locked or unlocked? Open or shut?  2. Are there signs of forced entry, such as tool marks or broken locks? 3. Is the house or the crime scene is in good order? If not, do

Introduction to Forensic Ballistics

By Dr. Bhoopesh Kumar Sharma Forensic Expert & Associate Professor Introduction to Ballistics: The term ballistics refers to the science of study of the action, motion and  behaviour  of a projectile during its flight in any given medium. The flight path of a bullet includes:  • Travel down the barrel  (Internal Ballistics), • Path through the air  (External Ballistics),  and  • Path through a target  (Terminal Ballistics) Forensic Ballistics: Is that branch of forensic science which deals with the examination of the firearm and related evidences encountered at the scene of crime in a shooting incident, and their linkage to the firearm, and Identification of the shooter. A ballistic expert need to answer the following questions: 1. Type of The Firearms used 2. Identification of the Firearm 3. Individual Characteristics of Firearm 4. Range of Firing 5. Direction of Firing 6. Identification of the Shooter 7. Medico legal aspects: - Suic

How to Write a Forensic Report/Analysis Report/Forensic Opinion?

By, Dr. Bhoopesh Kumar Sharma Forensic Expert & Associate Professor In terms of the participation of the forensic practitioner in the case, the forensic examination report is a critical and primary element. Whether you're writing for a client, a lawyer, or your supervisor, most of us need some scientific way to communicate our results. Forensic Reports/Opinions are needed: In Criminal and civil investigations The forensic science acts as an aid to guide the investigator or jury to reach to a conclusion   To provides  decision-makers with facts needed to decide the matter  and to ensure a successful investigation. To link the evidences with the crime and the criminal (or suspect) T o prove or disprove the fact in issue T o exonerate the innocent from the case General  Structure of a Forensic Report      Title of the Examination report- It means whether it is toxicological/handwriting  opinion/ballistics etc. with proper legal section of the evid