Aug 03, 2017 at 10:31

As the cases of cyberbullying continue to rise, and children continue to be its most vulnerable targets, we have cyber hacking expert, Amit Dubey enlighten us about some of the very basics for our cyber safety.

It was Sunday afternoon and I got a call from one of my friends, she was very scared as somebody had posted few of her videos on Facebook, since these videos were not recorded by her, she thought that somebody might have set up a hidden camera in her room. While glancing through the videos, I quickly realized that these videos were not recorded through any hidden camera but through her own laptop’s webcam.

There are some serious concerns that thousands of private webcams around the world could be streaming live images to anybody who wishes to view them — without the owner’s knowledge.

But how is a website doing this? The website is exploiting the fact that most users accept the default settings on webcams. People integrate technology into their lives without any thought about the security or privacy settings, blindly pressing “yes” when faced with a piece of technology asking you to stop and consider.

Unfortunately, when the cameras are manufactured in the factory and the developers do the configuration, to make this process easier, each camera is given the same default username and password, to use as a login when accessing remotely.

While users are encouraged to change their password, some don’t. So the camera is made available to the world via the internet, with a default password that is easily known to anyone who has bought the same type of camera (or can read it on the manufacturer’s website).

As the technology is overpowering our lives, we are leaving such loose ends for hackers to peep into our lives, they may not only disturb your life but can also damage your image in public or can cause you financial losses. It’s equally important today to keep yourself protected and be aware about such techniques.

How to Protect Your Cell Phone from Being Hacked

Our mobile phone has become an integral part of our daily life, it contains our intimate conversations, pictures or texts and many other things.

Imagine, if that data be splattered across the Internet for all to see, this is not only an invasion of privacy, but can also be damaging to your personal life and livelihood. Although, numerous politicians and celebrities have fallen victim to having their cell phones hacked, you have the opportunity right now to protect yourself from such hackers. Here, we will learn, how to protect yourself and your loved ones from being the next victims of a cell phone fraud, scandal or the victims of having your privacy invaded by hackers.

  • Proactive Protection Mindset.This isn’t about paranoia––it’s about accepting the reality that sometimes, there are people in your life who might want to hack into your personal details for malignant reasons. For example, people whom you’ve fallen out with or fallen out of love with, people who didn’t like something you’ve said or done, or friends who have turned decidedly unfriendly for one reason or the other. You can’t predict how some relationships may turn out, so be mindful of guarding your personal information properly.
  • Use passwords. You might feel safe in the knowledge that you never share anything worth making gossip from––yet, you’ll still feel disturbed if someone does hack your account. You can use passwords wherever possible to prevent that. People don’t just simply hack into your cellphone because they want information about you, it is more about the detailed confidential information that your cell phone contains; most of the information contained on our cellphones is information that was received from a family member, a friend, or an acquaintance. This is the information that we should be worried about being hacked into and of course there is always the possibility of your financial information being stolen, transferred from your account to another one by SMS.
  • Don’t share passwords with anyone else. Even when you make an exception for someone you trust deeply to help you out in a fix, such as a spouse, change the password after they’ve helped you.
  • Don’t share your phone passwords with anyone at work or in social contexts. Shield input of passwords when in public.
  • Don’t program passwords into your cell phone
  • Don’t keep private data in your phone for a long period of time. If and when hackers compromise your email account, the data will be lost, most probably permanently, and even resetting your password and logging back into your account doesn’t let you access the information you left there earlier.
  • App Store: Don’t download everything you see there. More importantly don’t download apps from ‘unofficial’ stores
  • Permissions: Read the “permissions” screen EVERY time you install an app
  • Banking apps: These are important apps and you should only install them from the official Google Play Store. It’s recommended that you don’t ever install a banking app from a link that was emailed to you or sent via SMS.
  • Don’t do banking transactions on open WiFi Links /Free Wifi.
  • Protect apps: Install ‘App Lock’ to protect individual apps. This can be particularly useful for personal apps such as email, Facebook, Twitter etc and ensure that if the phone does get into the wrong hands, they can’t access the app without the required password.
  • If you’re sharing any devices, be careful with Google Now as it is linked to your Gmail account.

You’re out for dinner with your friends, you’re walking down the street, you reach into your pocket to pull out your phone, and suddenly that feeling hits the pit of your stomach: your phone is missing. Did you leave it at the restaurant? Or maybe at home? Did someone steal it? Your mind races. You have no idea. Fortunately, there are some things you can do in this situation to hopefully get your phone back. We will learn here, soon – how to track your lost Phone?


In Defence of Mediocrity
Somebody has to start speaking up for us, and rather urgently at that!

Mansi Tikko