This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Security Alert. Show all posts
Showing posts with label Security Alert. Show all posts

Beware of Dangerous Black Pins in Cyber CPUs



If you visit a cyber cafe and find any black pin attached to your CPU as shown in the picture, kindly do not use that system.
PLEASE SHARE: Dear friends, If you visit a cyber cafe and find any black pin attached to your CPU as shown in the picture, kindly do not use that system.
This pin is actually a connection which save all your data you enter into the system. Thus, it is a risk to your privacy over the net. Risk to passwords, banking or any other personal data you enter. Its a very powerful hardware keylogger, it records each and every action you make on the system. So, If you use internet cafés then you may have to ask to see the back of the PC...
Its a very powerful hardware keylogger, it records each and every action you make on the system. So, If you use internet cafés then you may have to ask to see the back of the PC...
Its a very powerful hardware keylogger, it records each and every action you make on the system. So, If you use internet cafés then you may have to ask to see the back of the PC...

Hoax or Fact:
It is a fact, but a viral rumor to create panic.




Analysis:
Hardware keyloggers are components that log your keystrokes, and they do look like the one shown in picture. But they come in various shapes and colors,





and are an old and costly means to hack the user information. Instead of these hardware keyloggers, there are many effective software keyloggers available that are less costly and can be easily installed in cyber systems. The point here is that cyber cafe owners not always seek to such illegal and insecure means to risk their customer base. The aim of this message is only to spread unnecessary worry and panic among cyber users. Data hacking is an infrequent problem
However, cyber cafe users are always advised to be careful when they are using shared computers. It is better to avoid entering private sensitive information into them.

Also Read = 

How To Detect  Keylogger Hardware

How To Detect Keylogger Hardware



Detect keylogger hardware to prevent your sensitive personal data from falling into the wrong hands. If criminals get your personal data, they can use it to open accounts and transfer money from existing accounts.
Run anti-spyware software to learn how to detect keyloggers.
A good anti-spyware or anti-virus program may be able to detect keyloggers. Keyloggers typically hide in sneaky places, and a good anti-virus program that constantly updates its virus definitions can keep track of the latest keylogger tactics. Also, keyloggers function in ways that send red flags to anti-virus programs, so installing these programs, keeping their virus definitions up-to-date and running them regularly can help you detect software keyloggers.
Check your Task List and Startup items to find keyloggers.
If you press the Ctrl + Alt + Del buttons simultaneously, it brings up a Task List, which outlines all the applications and processes currently running on your computer. Many of these processes are normal, and your computer requires them to function. However, keylogging software has to show up on your application or processes list, so do a Web search for any unfamiliar processes or software to determine whether it's a normal part of Windows operation or whether it may be a keylogger. Likewise, you can run the msconfig utility to determine what starts up when you boot your computer. Once you launch msconfig, look for anything unfamiliar that might be a keylogger.
Have an active, secure firewall to stop keyloggers from transmitting data.
Software keyloggers require an Internet connection to transmit the data they gather from your computer. If you've got an active, secure firewall, keyloggers may not be able to transmit data, thus forming an effective way to block keyloggers. Some firewall programs even alert you when unfamiliar programs attempt to use your Internet access, so you can use this feature to discover whether keyloggers exist on your computer. Maintain an active firewall to help protect yourself from potentially dangerous keyloggers.
You can't detect some types of keylogger hardware.
Hardware keyloggers can be a bit more difficult to detect than software keyloggers. In most cases, hardware keyloggers don't require an Internet connection to transmit data, because they function by storing the data on a little hard drive packaged with the device. If a keylogger is not a software program on your computer, the only way you can detect it is by physically locating the hardware device.
Keylogger hardware come in two forms: adaptors that sit between your keyboard and your computer, and electronic chips that are placed inside your keyboard. If you're a savvy computer user, you may be able to spot the physical adaptor between your keyboard and computer. However, a hardware keylogger chip that's physically built into your keyboard is impossible to detect unless you disassemble your keyboard and know exactly what you're seeing, so you may not be able to detect this type of keylogger.