Friday, 13 April 2018

BEST FIREWALL FOR YOUR FIRM
Image result for firewallImage result for firewallImage result for firewall
I’ve seen the main facts about Security in the last months, and I still get amazing on how enterprises are being affected by several kinds of attacks. When taking a time to analyze it, we can figure out the main problem for all of these issues – a complete lack of strategies, good practices and architecture for cybersecurity.
I don´t want to blame several great Security Leaders and Corporations, because these leaders are always working on this kind of awareness, however, the culture they work to implement are not properly followed by its employees. In some cases, do the right thing is something that other levels of the companies have a problem to do and go forward, and unfortunately, great names of cybersecurity area in some companies will pay the price for this lack of commitment.
The question in this case is… why does it happens? Obviously we are always dealing with people with a huge technical knowledge and with a high skills at several social engineering methods. In some cases, even we get some old-fashioned threats, some users are caught due to the high social engineering method used to go further in the threat purpose.
At this time we get in the part where your Information Security Team needs to assume the responsibility to create an awareness to all users in the Company to avoid future problem related to Security and a complete and great Information Security Program is the way to move on! After all, you as a Security Practioner have the tools and the knowledge for this.
We can defined it like a place where people feel safe because a wide steal wall is around then avoiding external attacks or stealing attempts. Suddenly something happens and that incorruptible place is invaded and you don´t know what was the root cause for that. After some research you realize a tiny hole in that steal wall which gave to external attacks the possibility of little by little creating a big problem and putting your place as a target.
Maybe that´s the reality of your Company. Even having the best equipment, the best IT and IS professional stuff, if  you don´t have processes, responsibilitiy definition or environment analysis, Surely you will be the next target, soon or later.
How are your environment built? Are you aware about the flow of your network? Servers and workstations are installed according the the best security practices? Security should be considered at the beginning of any project and it´s the key for the success and avoid several problems and costs.
Take a time to create all possible documentation of your environment, assets and processes. use the concepts of RACI Matrix to keep clear who is responsible for each part of the environment. Below a link where you can better understand what RACI Matrix is and how it can help you:
Define an access control policy just to make sure that only authorized people are having access to the critical places and  having the proper access to files and folders.
It´s also important to take note of the main Active Directory Groups – the ones with access to sensitive documents and information in your network. Each department needs to have an owner to control who can have access to its information.
Your company also needs to have a DLP Policy, starting at Human Resources department. Every employee must sign a document of confidentiality to avoid a leakage of sensitive corporate information. Also take care of external devices or pen drives which can be used to steal sensitive data. Most of companies are blocking any kind of USB Storage, allowing it only for authorized people using corporate devices.
Avoid giving users access to their personal emails – it´s a way to steal data.
What´s the core business of your company? Which Security Rules you need to work with? ISO, PCI, etc. Follow a method that fits to your business and goes deep inside to guarantee the most level of security. It´s just some points you should follow when creating a security program to your company. We have several others I will discuss here in future opportunities!
That’s my first contribution for Cybrary Op3n Initiative! It was a pleasure to be part of this! Hope to come back here and write more about security!

Image result for social engg attack Social Engineering & Online Fraud

Image result for social engg attackImage result for social engg attackImage result for social engg attack
Today, we introduce a new and essential subject for beginners and for a professional start in the hacker world. What is internet fraud? It is a term that refers to any tricks or schemes that are used online. For example: E-mail, websites, chat rooms and more. Internet fraud aims to deceive users for many harmful purposes such as Personal Information, Credit Cards, and Social Engineering, which is a set of techniques used to get people to do something or give secret information.
“Using Social Engineering Hacker” Social engineering is sometimes used in online fraud to achieve the intended purpose of the victim. The main aim is to ask simple and very trivial questions for the victim by telephone or e-mail with a famous impersonator or authority that allows the hacker to ask questions without arousing suspicion. “Types and forms of online fraud” 
  1. Forging e-mail 
  2. Forging web pages 
  3. Trick financial transactions: where the fraudster send an email containing a large proportion of the phantom money and to receive it must do some things, including sending money for the treatment of the transfer, for example
  4. Mouse click deception: a website that asks the victim to click and register on the ads on the site in exchange for a certain amount The goal of this trick is free advertising free of charge. So, my brothers and sisters that the field of the hacker does not mean only espionage and overcome protections, but it is associated with many sciences and huge. Unfortunately, this content in our Arab world is not relevant because most of the learning and Iqnh converted from a positive benefit to destructive means. I am innocent before God Almighty of any adverse action. We hope you have benefited from this information.
Greetings from the Virtual Justice System (VJS).

Thursday, 12 April 2018

BLUETOOTH WAR IN WINDOWS 10
Image result for bluetoothImage result for bluetoothImage result for bluetooth

Often it means to connect some gadgets with each other, and this is the very last option when you want to transfer files, and all other options are dead.
We, humans, are moving very fast to an era which is wireless as many of us are moving towards latest gadgets like smartphone, laptop, tablet and many more, moving from traditional computers. And the main feature of this most recent gadget is that we can connect headphones, speakers, mouse and other peripherals wirelessly and all credit goes to BLUETOOTH.
Bluetooth is a wireless technology which is available everywhere in the world from small to large devices and machines. And of course, our WINDOWS 10 is also the latest OS and supports Bluetooth connectivity. But before I tell you about Bluetooth connectivity in Window 10, make sure that your computer’s hardware is compatible. So today, in this post I’ll let you know about how to wirelessly connect your devices to a Windows 10 device.
About Windows 10 Bluetooth
As Windows 10 is the latest operating system from the MICROSOFT Company, it has the most graphical user interface than any other operating system made by MICROSOFT. Being the new OS, it supports connectivity to other devices form your device, and you can share files, songs, etc.
In Windows 10 the user interface for Bluetooth settings is very simple. Once you look at the interface, you’ll find it easy to connect other devices.
How to Turn On Bluetooth on Windows 10?
Enable Bluetooth in windows 10
Follow these steps to enable Bluetooth:
  1. Click on the windows icon situated in the bottom left corner.
  2. Then on the left side, some options will appear. Choose Bluetooth from them.
  3. Once you clicked Bluetooth, a toggle button will appear on the right side.
  4. Then click on the toggle button to make it on. As soon as you click the toggle button, your computer will start searching for any nearby devices.
  5. Make sure your other device which you want to connect has Bluetooth on.
  6. Available devices will be listed on your windows screen.
  7. Choose your preferred device, then click on “PAIR”.
  8. A passcode will pair, and both the devices connect.
  9. And that’s it how you have to connect wireless devices.
How to remove a Bluetooth device from Windows 10
  1. Go to the settings or press the windows icon + I.
  2. Then on the left side, some options will appear. Choose “bluetooth” from them.
  3. Once you clicked “bluetooth”, the devices which are connected will list up on your screen.
  4. Select the device you want to remove, and confirm YES.
  5. And now the device is gone.
If your windows Bluetooth is not working
Then check the wireless drivers in the device management section.
For device management section right click on the windows icon on the bottom left corner. Then verify all the drivers are working correctly. Check all network adapters also below the monitor’s option.
Final words
That’s all about connecting a device to your Windows 10 PC. I hope that you have got all of the required information. It’s a straightforward procedure to connect a wireless device. With a simple interface, the windows 10 O.S gives you the easiness to enjoy the connectivity. 

AN OFFICER AND A SPY – ROBERT HARRIS SUMMARY WRITTEN BY-SURYA PRAKASH PATTANAYAK This novel was written by Robert Harris. It has w...