blog.czarsecurities.com
Security still an important reason for people not using E-Commerce portals! – Czar Securities
https://blog.czarsecurities.com/1285/security-and-e-commerce
Security still an important reason for people not using E-Commerce portals! August 11, 2015. While I was handing over my credit card to the waiter in a restaurant, my mother was staring at me in shock. She asked me. What if they draw out all the money from your account? Just then a question came to my mind; we rarely do even think twice before handing over our credit cards to a waiter or a store clerk, then why do we often feel jittery while purchasing something online, or going for online banking? Augus...
blog.czarsecurities.com
Featured – Czar Securities
https://blog.czarsecurities.com/category/featured
US Central Command Accounts Hacked. January 13, 2015. The US. Central Command that supervises operations in the Middle East had to compromise their Twitter and YouTube account for 30 long minutes as they were brutally hacked on Monday (12th January 2015) by people demanding to be sympathetic toward the Islamic State militant group being targeted in American bombing raids. US defense officials however mentioned …. Read the full article. Czar’s Year Long Journey. November 19, 2014. Read the full article.
blog.czarsecurities.com
Videos – Czar Securities
https://blog.czarsecurities.com/category/videos
Videos describing exploits, vulnerabilities, hacks and patches. Day to day security tips for netizens. Protecting WiFi from Hackers. January 15, 2016. In our last post we talked about how hackers can hack WiFi. To complete the series, today we will be talking about WiFi security and steps of protecting WiFi from hackers:. WAYS TO PROTECT YOUR WIFI. Give Cryptic Administrator Username and Password:. Read the full article. These 8 Mistakes will lead to your social media account getting hacked. Czar Securit...
blog.czarsecurities.com
#Cyber Security – Czar Securities
https://blog.czarsecurities.com/tag/cyber-security-2
8220;9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick! November 16, 2014. Working as a Self-employed Security Researcher is Amazing, Thrilling, Challenging, Impacting, and Self Disciplinary focus coordinated multi-tasking problem tackling monster is what Shritam Bhowmick thinks a 9-5 job never will! Read the full article. Theme by Anders Norén.
blog.czarsecurities.com
NSA Spying – A Myth or Reality? – Czar Securities
https://blog.czarsecurities.com/1245/nsa_spying
NSA Spying – A Myth or Reality? June 2, 2015. We all enjoy privacy in our personal matters. But when it comes to our cyber life, we hardly care whether we are being spied or tracked. Why is it so? Most people in our country believe that working in a secluded room with a personal computer is all they need to maintain privacy. Well… the actual situation out there in cyberspace is quite grave and you might just turn out to be an arbitrarily chosen victim. It reveals that the US government, with assistance f...
blog.czarsecurities.com
U.S. Central Command Accounts Hacked – Czar Securities
https://blog.czarsecurities.com/1193/u-s-central-command-accounts-hacked
US Central Command Accounts Hacked. January 13, 2015. The US. Central Command that supervises operations in the Middle East had to compromise their Twitter and YouTube account for 30 long minutes as they were brutally hacked on Monday (12th January 2015) by people demanding to be sympathetic toward the Islamic State militant group being targeted in American bombing raids. US defense officials however mentioned that operational military networks were not compromised and no heavy data breach occured. The F...
blog.czarsecurities.com
CMD – You companion for network information – Czar Securities
https://blog.czarsecurities.com/1100/cmd-companion-network-information
CMD – You companion for network information. April 11, 2015. Here we are back again with some more new stuff to learn. In our first article. We went through an Introduction to CMD, its benefits and limitations. In second article. We went through the basic CMD commands like creating, copying, renaming, deleting files using CMD. In this article we will get into some networking stuff like looking up IPs, checking your internet connection and much more. Ping www.google.com. Ping 172.19.1.235. Pathping www...
blog.czarsecurities.com
Kathakali Banerjee – Czar Securities
https://blog.czarsecurities.com/author/kathakalibanerjee
Author: Kathakali Banerjee (page 1 of 2). Protecting WiFi from Hackers. January 15, 2016. In our last post we talked about how hackers can hack WiFi. To complete the series, today we will be talking about WiFi security and steps of protecting WiFi from hackers:. WAYS TO PROTECT YOUR WIFI. Give Cryptic Administrator Username and Password:. Read the full article. Most Common Ways by which Hackers Hack WiFi. January 9, 2016. So, here are a few methods hackers use to hack WiFi:. Read the full article. Here a...
blog.czarsecurities.com
SSL is nothing more than “False Sense of Security” to Website Owners – Czar Securities
https://blog.czarsecurities.com/1289/ssl-is-false-sense-of-security-to-website-owners
SSL is nothing more than “False Sense of Security” to Website Owners. August 11, 2015. While you might be overwhelmed by the fact that an E-Commerce portal is secured by SSL. And hence you can perform your online transactions without any worry, the truth is that SSL isn’t the end of the road. It often misleads people into thinking that an SSL secured website means that it is completely safe in every way. But. SSL only ensures the security of the information while transmission. So it can be seen that the ...
blog.czarsecurities.com
Wordpress Security for Bloggers – Czar Securities
https://blog.czarsecurities.com/1203/wordpress-security-for-bloggers
WordPress Security for Bloggers. February 24, 2015. The main security risk of having a website is being hacked. Many believe that since their website is not in limelight, or since it does not hold any sensitive information it is not a target of the fraudsters. We are not safe, not at all with a CMS (content management system) at hand. In this article we shall discuss three most famous and widely used CMS, their recent security attacks as well aa methods to strengthen our relationship with them. On April&...
SOCIAL ENGAGEMENT