6 August 2022

online scams or frauds | how to take action on it

How to report if you have been online scams or frauds!

Online scams or frauds and how to take action on it and How can report fraud and cybercrime:


You can file fraud or cyber crime to Action Fraud any time of the day or night time with the use of our online fraud reporting device. You also can document and get advice approximately fraud or cyber crime by calling 0300 123 2040.

Table of Contents: Show / Hide

USA        https://www.usa.gov/stop-scams-frauds
India       https://cybercrime.gov.in/
Uk           https://www.gov.uk/report-suspicious-emails-websites-phishing

Search on Google: How to report online scams or frauds USA gov site

What to do in case you suppose you've got been scammed

If you have been scammed, do not forget to report the fraud to the police to see if they can take any movement, as well as to your state customer safety workplace. You can also record scams to the FTC. File a file online with the FTC OK:)

  • Stop all touch with the scammer
  • Do not make any extra bills
  • Contact the financial institution or service you sent money via

1. Stop all touch with the scammer

Once you comprehend you're being scammed, do no longer maintain the conversation. Hang up the cellphone. Don’t reply to emails or letters scammers have despatched you. If you have been scammed online, block the scammer from contacting you.

2. Do not make any extra bills

Some scammers target humans stuck in current scams, e.G by pretending to be an enforcement enterprise that can return all of your money for a fee. Don’t give money to anyone on the promise they will get your misplaced cash back

3. Contact the financial institution or service you sent money via

If you're the victim of a financial rip-off, credit card scam, or identity theft, contact your bank without delay. The faster your financial institution is aware of it, the greater the probability of having the cash back.

How do you take a motion towards online fraud?

  • Step 1: Call consumer care to dam your debit and credit score card. ...
  • Step 2: Collect all of the records related to the web fraud. ...
  • Step 3: Register a written criticism with the cybercrime mobile – online or offline. ...
  • Step 4: Register a cybercrime FIR at your nearest police station.

How do I get my money returned if I got scammed online?

Contact your bank and file the fraudulent switch. Ask if they can reverse the twine switch and give you your money again. Did you send cash thru a cash switch app? Report the fraudulent transaction to the employer at the back of the money transfer app and ask if they could reverse the fee.

What needs to I do if I scammed someone? What can I do if I am a victim of a rip-off?

Report the scam to the police. Ask for a replica of the police report. ...

Contact the financial institutions, credit score card issuers, or companies that can be involved. Tell them approximately the scam. ...

Contact Equifax and TransUnion. ...

Report the scam to government corporations.

Contact your bank straight away to let them recognize what's befell and ask if you can get a reimbursement. Most banks have to reimburse you if you've transferred cash to a person due to a scam.

How do you expose Online scams or frauds? | how to take action on it

If you believe you are a victim of a web-related crime, report it to those authorities:

The Internet Crime Complaint Center (IC3) takes internet-associated crook lawsuits. ...

The Federal Trade Commission (FTC) shares client complaints and online scams with all tiers of regulation enforcement.

Police to Launch Scam Detecting System as Online Frauds Surge

police are launching a new online scam detection system next month to help people check whether any social media shop or online payment account has been invented with fraud this follows a search in online shopping scams.

suspending and deleting accounts from our own detection we also have our dedicated team to work with law enforcement agencies like the conquering police force and hong kong customs to identify suspected accounts.

6 July 2022

How Can Recover Permanently Deleted Files/Folder

In this post Learn about what is records recovery

The way it works, and a way to recover lost, deleted, or corrupted statistics from storage devices. Deletion best deletes the guidelines and no longer the real report, so we can recover the accidentally deleted facts with some of the tools to be had inside the market.

Table of Contents: Show / Hide

⚠ warning This post and videos are only for educational purposes we are not responsible for your mistake  Or we don't recommend you any activity.

What is a data recovery and how does it work? What are records recovery, the way it works, and the way to get better lost or deleted facts?

Data restoration is the procedure of restoring documents on a garage device that could were lost. In many instances, data can be recovered as we will discover quickly. Data recovery is a remaining hotel, however, it is useful given that injuries take place and dropping statistics is unwanted.

What is data recovery? Data healing is the method of restoring statistics that have been misplaced, by chance deleted, corrupted, or made inaccessible. In agency IT, statistics healing commonly refers to the healing of records to a computer, laptop, server, or outside storage device from a backup.

How does facts recovery get better? Data restoration is a software-pushed manner that enables you to get better and repair lost, deleted, inaccessible, corrupted, or broken files so you can get again to paintings speedy. As the business landscape" and our lives in preferred" end up more records-dependent, the need to protect records structures grows.

How to Restore Deleted Recycle Bin Files

To get better the deleted file without using any software, you want to right-click the folder from which the file became deleted & click on "Restore Previous Versions". If to be had, choose the date & time of the previous version you want to repair to & open the folder. You can see a list of backup files on the chosen date. Choose the only you require & drag/reproduce it to the preferred area. That's it, you are back with the deleted files.

However, to use this approach, you want to not forget the region of the folder from which files are deleted. Also Windows backup does not shop the backup files in case of the absence of restore factors.

How to Recover Deleted Folders in Windows 10?

There are several situations when users accidentally end up deleting an important folder in their Windows 10 system. For example, you accidentally deleted the folder while cleaning up the hard drive, you’ve formatted an entire drive, which has deleted all the folders inside it, or some virus/malware infection, etc. However, it doesn’t matter why and how the folders were deleted in Windows 10, you’ll be able to recover deleted folders/files with the following 4 effective solutions.

  • Solution 1: Recover deleted folders from the recycle bin

  • Solution 2: Restore deleted folders from the previous version of the folder

  • Solution 3: Recover the permanently deleted folder with Wondershare Recoverit

  • Solution 4: Recover deleted folders in Windows 10 via Backup and Restore

5 Free Ways to Recover Deleted Files on Windows 10

Five ways to recover files on Windows 10 and real quick as always before we get started if you guys have any questions or things you want to see me covered down the line in the future be sure to let us know down below in the comment section but with that being said let's get into the video.

  1. Method 1: Recover deleted files from a Recycle Bin

  2. Method 2: Recover Files Using CMD

  3. Method 3: Use a Data Recovery Software

  4. Method 4: Use File History

  5. Method 5: Use “Restore previous versions” on Windows 10

Method 1: Recover deleted files from a Recycle Bin

  • Double-click on the Recycle Bin to open it.

  • Find and see the files to be recovered. You can use the Ctrl and Shift keys to choose multiple items at once.

  • Right-click on the selection and choose Restore. This will restore the file to its original location. You can also drag the file out of the Recycle Bin and drop it in a new location where it will be stored.

  • Verify the files have indeed been restored to their original or new location

Method 2: Recover Files Using CMD

  1. Open the Start menu. recover deleted files in Windows 10

  2. Type "cmd", right-click on the top match, and select "Run as administrator" to run the Command Prompt with an administrator privilege.

  3. Type "chkdsk X: /f" and hit Enter on your keyboard. Replace "X" with the letter of your hard drive.

  4. Type "ATTRIB -H -R -S /S /D X:*.*" and hit Enter. Again, replace "X" with the letter of your hard drive.

Method 3: Use a Data Recovery Software

Top 5 Best Data Recovery Software

this video, I decided to compile all of the best data recovery software that I've ever used just for you guys. Today, we're going over the top 5 file recovery software solutions that you can use to start getting your deleted or lost files back right now.

Here are my favorite data recovery tools:

  1. Disk Drill (Free & Pro version) official link : www.cleverfiles.com/data-recovery-software

  2. TestDisk and PhotoRec (Freeware) official link: www.cgsecurity.org/wiki/TestDisk_Download Recuva (Free with limits):

1 July 2022

Wireshark Tool | Used to troubleshoot the network problems

Wireshark Tool is Used to troubleshoot the network problems

What is the Wireshark device used for? Wireshark is a community protocol analyzer or software that captures packets from a community connection, which includes out of your pc to your house office, or the internet. The packet is the name given to a discrete unit of facts in an ordinary Ethernet community. Wireshark is the most customarily-used packet sniffer in the world.

Table of Contents: Show / Hide

Which device is used for network troubleshooting Wireshark? Wireshark is known as the world's main network traffic analyzer. It's a great device for machine administrators and IT experts for troubleshooting community mistakes in actual time. Wireshark speedy detects community issues such as latency, suspicious pastimes, and dropped packets.

So big disclaimer this post -is in no way intended to promote cybercrimes all the tools that are shown in this video is open-source and not created for the sake of learning and understanding different aspects of cyber security.

using any of these tools to attack an individual or organization without their consent is illegal and you will face some serious legal actions for the same because that would be considered a cybercrime so be responsible if you want to test any of these tools test them on yourself and not on others.  I am not responsible for any of your actions so let's get started.

Wireshark Basics // How to Find Passwords in Network Traffic

so for today's video, I'm gonna be giving you guys a quick overview of Wireshark some of the things that you can do to monitor your at-home network, and a quick demo to show you how you can find passwords in HTTP traffic.

so for those of you that don't know Wireshark is a free open source software that you can use to analyze packets, there is both a Mac and a Windows version that you can download it's a super simple process basically what you do is you download the image file from the website you're a few clicks away and then it is right there in your applications.

monitoring your network is very very important regardless of whether you are managing a server farm or if you're just focusing on your at-home network when you are at home it's important to just fire up Wireshark and see what normal traffic looks like that way when something happens you'll be able to identify that anomaly.

What is Wireshark?

A Wireshark is a very handy tool it is very useful when it comes to networking it helps researchers to do some data analysis when it comes to the networking traffic or it can also be used by hackers for security purposes.

Now whenever we have this data that belongs to different layers they have a name can be a message it can be just anything, for example, we have segments we have different names that belong to different layers than we have datagrams we have packets we have frames and we have bits so as I said initially each and everything is in what we can see and what is readable what is discernible but as they move downwards the data how bit how the data travels when it moves from one computer to another this is this logical model and the data flows downwards

How to Install Wireshark 

In this video, I'm going to show you how you can download and install why shark on your operating system Wireshark.ORG is a free and open-source packet analyzer used for network troubleshooting analysis software and communication protocol development, and also education so let's see how we can install why sharks 

so first of all open your favorite browser and search for Wireshark and most probably the first link which will appear here will be from Wireshark.org just click the first link which is for the Wireshark dot orgy and once you are inside the Y Shack dot o-r-g website you just need to search for the Downloads button which is here in this case so I'm going to just click on the Downloads.

Wireshark Tutorial for Beginners

A Wireshark tutorial for beginners that shows users how to track network activity, view specific frame, TCP, IP, and HTTP information, view specific packets being sent and received on the network, view information within those packets, and spot malicious or suspicious network behavior.

How to: Use Wireshark

The very important and very useful tool is called Wireshark. now if you don't know about Wireshark a packet capturing tool that you can use to package packager capture incoming packets that your network interface or wi-fi card or Bluetooth card can see over the air over the ethernet wires or um you can also analyze packets.

so we're going to be doing a little bit of both today Wireshark does have some sample packets that you can analyze look at test your skills to see some stuff and then also just to see what this packet captures should look like for different internet protocols and stuff like that.

Top 10 Wireshark Filters // Filtering with Wireshark

In this video, we're gonna take a look at the top 10 Wireshark filters that I like to use for setting display filters. So probably the reason you're here is that from time to time we might need to set a filter and we don't quite know what the syntax is for it.

So here are some common ones that I like to use and no doubt they will be of use to you as well.

Filtering with Wireshark is here:

  • A station filter or an IP filter [ IP.addr == ].
  • Set a filter for a protocol [ TCP or DNS ].

18 June 2022

A Worm Attack is a malware program that attacks the host computers

A wormAttack is a malware program that attacks the host computers.

So big disclaimer this post -is in no way intended to promote cybercrimes all the tools that are shown in this video is open-source and not created for the sake of learning and understanding different aspects of cyber security.

using any of these tools to attack an individual or organization without their consent is illegal and you will face some serious legal actions for the same because that would be considered a cybercrime so be responsible if you want to test any of these tools test them on yourself and not on others. I am not responsible for any of your actions so let's get started.

Table of Contents: Show / Hide

what is a computer worm when someone mentions worms you will probably think of the wriggly creatures that children play with and adults use as bait when fishing like them or not worms are completely harmless unless you're thinking of computer worms they may not be as destructive as computer viruses but computer worms can be just as dangerous?

What is a computer worm?

a computer worm is a malicious piece of software that replicates itself from one computer to another with the goal of overtaking the entire network of computers most worms are designed to infiltrate systems by exploiting their security failures while very few also try to change the system settings even if they don't they are still very dangerous as they take up a lot of bandwidth and other valuable resources.

What is a Computer Worm and How Does it Work?

Just like you wouldn’t want a worm in your apple, you don’t want one in your computer. Computer worms can wreak havoc on your computer network, and work to spread the destruction to others. How? In computer networking, a worm is a man-made, malicious software program whose primary function is to infect other computers while remaining active on infected systems. Watch to find out how exactly computer worms work.

How do you protect against computer worm infections? Let us know in the comments below, and remember to give this video a like.

Stuxnet Worm: One of the World's First Cyber Attacks

A new type of weapon, a digital worm, was used in the first cyber attack known to have caused physical damage in the real world. While they have not admitted to it, the United States and Israel allegedly created Stuxnet in order to slow Iran's effort to build nuclear weapons. The worm targeted the computers that ran the machines used to turn uranium into nuclear fuel. The Stuxnet worm spun many of the centrifuges out of control, blowing them up, all without the Iranians figuring out what was causing the explosions. Eventually, though, Stuxnet got loose and spread across the world, infecting computers in more than 100 countries.

worm was quickly noticed and the operation was publicly exposed. Cyber experts were alarmed by Stuxnet and feared its potential for destruction. While this worm only attacks specific equipment related to Iran's centrifuges, experts fear that the same digital technology could be used to manipulate the computers that run a huge swath of industrial activity and infrastructure projects like factories, dams, and electrical grids.

Disrupting or destroying any of them could cause enormous physical damage and could potentially kill large numbers of people. This has led some to suggest that cyber weapons have the potential to be weapons of mass destruction. And just as international treaties were created to control nuclear weapons.

Many countries and individuals are calling for treaties to control the use of cyber weapons. But that is unlikely to happen anytime soon because cyber weapons pose unique challenges.

6 June 2022

A Steganography: How Hackers Hide Malware in Image | how can protect from Hackers yourself

How Hackers Hide Malware in Image | how can protect from Hackers yourself

 How comfortable is steganography? When steganography is used by itself, it is security through obscurity, that could cause the name of the game message to be revealed. If you need to cover a message from adversaries, however also protect it in case it's far found, it's great to mix steganography with cryptography.Hackers have found a brand new manner to hide malware via a technique that specialists have defined as "stunning." Experts located that hackers had been the use of Windows occasion logs as an area to hide their malware.

Table of Contents: Show / Hide

So big disclaimer this post - is in no way intended to promote cybercrimes all the tools that are shown in this video is open-source and not created for the sake of learning and understanding different aspects of cyber security. using any of these tools to attack an individual or organization without their consent is illegal and you will face some serious legal actions for the same because that would be considered a cybercrime so be responsible if you want to test any of these tools test them on yourself and not on others. I am not responsible for any of your actions so let's get started.

Can you disguise malware in a photograph? Steganography is a technique that hackers will preserve to apply to hide their malware due to how tough it's miles to discover. Image steganography will virtually be utilized by hackers to cover malware in photographs because there may be no way to tell if the image incorporates malware or is no longer without additional investigation.

Network Security: Steganography Topics discussed:

  • Introduction to the basics of Steganography.
  • Differences between cryptography and steganography.
  • Historical usage of steganography in various forms.
  • Drawbacks of steganography and its explanation.
  • Combining cryptography and steganography in achieving a greater level of security. 

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.Cryptography or cryptology is the practice and study of techniques for secure communication in the presence of third parties called adversaries. 

More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages; various aspects of information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include military communications, electronic commerce, ATM cards, and computer passwords.

Destroying hidden records

At times when it's far acknowledged or suspected that the hidden facts exist, destroying the content in order that it can't be recovered any extra from the quilt is sufficient to defeat the reason of steganography.Can antivirus come across steganography? Image steganography detection One of the reasons steganographic assaults are so difficult to uncover is due to the fact they come as 0-day threats, making detection difficult for antivirus and next-gen antivirus gear that depend on chance intelligence and signature databases.

Hide Payloads for MacOS Inside Photo Metadata

Hidden payloads are a common method hackers use to infect a target with malicious or otherwise irregular code. In previous episodes, we've covered how to access photo metadata and how to conceal information by way of steganography. In this episode of Cyber Weapons Lab, we'll take things a step further by showing you how to execute code hidden within an image.

Steganography explained | English | Ethical hacking

so in this video we will discuss one of the basic concepts in cyber security when you try to study certification such as certified skill hacking or security plus you often will hear about the concept of steganography and in this video, we will discuss what is steganography from the practical point of perspective and this video is considered the very very basic video in regard of discussing this wide-angle term so basically steganography.

Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Training

This Steganography Tutorial by Edureka will help you understand how to hide data from plain sight using various techniques and tools.

Below is the list of topics covered in this session:

  1. What is Steganography?
  2. History of Steganography
  3. Basic Steganographic Model
  4. LSB Steganography
  5. Demo: LSB Steganography
  6. Demo: Steganographic Tools

5 June 2022

SQL injection vulnerability is a code ( technique that might destroy your database. 1=1 )

SQL injection is a code technique that might destroy your database.

in this post, we will learn about sequel injection one of the most common and dangerous methods hackers can use to attack your website.

Table of Contents: Show / Hide

this is the vulnerable application we'll be trying to hack with a sequel injection attack here are the application logs watch what happens here when we interact with the vulnerable application.

So big disclaimer this post -is in no way intended to promote cybercrimes all the tools that are shown in this video is open-source and not created for the sake of learning and understanding different aspects of cyber security.

using any of these tools to attack an individual or organization without their consent is illegal and you will face some serious legal actions for the same because that would be considered a cybercrime so be responsible if you want to test any of these tools test them on yourself and not on others. I am not responsible for any of your actions so let's get started.

SQL Injection Attacks - Explained in 5 Minutes

in this lesson we'll talk about how to execute and mitigate web application attacks such as SQL injection command injection and cross-site scripting.

structured queried language or SQL is used to query operate and administer database systems such as Microsoft SQL server oracle.

so on one of the most common SQL attacks:

  • is the SQL injection attack a successful SQL injection exploit can read sensitive data from the backend database it can also modify or delete data or execute administration operations.
  • sometimes it can even issue commands to the operating systems.

4 Types of SQL Injection

The best way to protect yourself from SQL injection attacks is to understand how they work.  In this video, we look at 4 different types of SQL injection and how to make your queries injection-safe.

SQL Injection for database value change

A SQL injection assault is one of the maximum normally used hacking strategies. It lets in hacks to get admission to facts from a database that is otherwise now not publically available. Owing to its simplicity, SQL injection is one of the most popular databases hacking strategies.

What is SQL injection How does it influences your records? SQL injection also referred to as SQLI, is a not unusual assault vector that uses malicious SQL code for backend database manipulation to get admission to information that become not intended to be displayed. This data can also consist of any variety of gadgets, consisting of sensitive business enterprise statistics, consumer lists, or private patron details. advanced SQL injection

How to Prevent an SQL Injection. The best certain way to save you SQL Injection assaults is input validation and parameterized queries including organized statements. The software code must in no way use the input without delay. The developer ought to sanitize all enter, no longer best web shape inputs together with login bureaucracy.

What are 3 exceptional strategies to prevent SQL assaults? Fortunately, there are ways to protect your website from SQL injection assaults.

  • What is SQL injection?
  • SQL injection prevention techniques.
  • Input validation.
  • Parametrized queries.
  • Stored methods.
  • Escaping.
  • Avoiding administrative privileges.
  • Web utility firewall.