Security Risk associated with Free Wifi and countermeasures

Print Friendly

Why would anyone pay for each megabyte when one can use it for nothing? The problem is that many of these “ FREE/Public” Wi-Fi networks do not use encryption mechanisms, and therefore are easier for attackers to break into. Since there is no security validation, anyone connected to the network can connect to router and potentially to other connected devices and get hold of data( passwords, credit/debit card information, names , addresses, frequently visited sites and other sensitive information ) stored on the devices. With data in hand, the attacker is equipped for identity theft or for developing spear phishing […]

Email Safety and Recovery

Print Friendly

Here are some best practices to safeguard your email accounts and recover them when needed. Login to your account: if password has not been changed, it’s easy. If you cannot login, try “Forgot Password” and or any other  recovery options If all of them have been changed, contact the mail provider and report compromise or there is nothing much you can do. Since you cannot proceed further. All you can do is to inform via other means to all your contacts(as many as you know) that your email has been hacked and not to respond to any emails from that […]

Basic Network Security. Tips for Home Users

Print Friendly

Most households now are connected to internet with devices like laptops, tablets, smartphones, gaming devices and TVs accessing wireless networks. First step to keep your home safe from cyber threats is to keep internet-enabled devices running latest (updated, “patched”) operating system, web browsers, security, and other software. Although Wireless technology has made easier for multiple devices to connect to internet, your network could be used to commit cyber crime if you don’t secure your Network and Network devices. Most of the router (gateway to internet) are preconfigured at the factory and are ready for connecting to internet, however default settings […]

Common Malwares in Bhutan

Print Friendly

More than 1,400 different malware families were identified globally by Check Point during a survey carried out in  February 2016 and  39 per cent of malware attacks globally was found to be  caused by the Conficker, Sality, and Dorkbot. The Bhutan Computer Incidence Response Team(BtCIRT) also found out that Conficker and Dorkbot are the most common Malwares affecting Systems in Bhutan. Conficker Conficker is a computer worm that can infect your computer and spreads to other computers across a network , through file sharing or removable drives. This infection allows an attacker to access users’ personal information such as banking […]

SNMP Vulnerability

Print Friendly

Simple network Management Protocol(SNMP) runs UDP port 161 and 162 and is a widely deployed protocol used to monitor and Manage network Devices: to obtain information on and even configure various network devices remotely. It runs on any network device from hubs to routers and network printers to servers. SNMP clients also run in many workstations and Personal Computers. SNMP is also used in most of the network management packages for information gathering. Thought type and amount of data that can be accessed via SNMP depends upon the device on which it runs, it generally provides details of the hardware […]