Skip to main content

Posts

Showing posts from January, 2019

Chrome API Update Remove ADS Blocker With Other Extension

Chrome API Update Remove ADS Blocker With Other Extension Google has announced making some changes in their Chrome API that threatens user privacy. As per its planned API update, it will restrict ad blockers. In fact, the upcoming Chrome API update will not only limit ad blockers, but may also kill numerous other plugins and extensions.previous year, Google publicly shared its plan regarding some changes in the Chrome API. This Chrome API update plan revealed changes in Chrome Extensions platform that would kill ad blockers. Precisely, the changes referred to restricting various extensions’ abilities. According to Google, the changes aim at providing better security, privacy, and performance. “In Manifest V3, we will strive to limit the blocking version of web Request, potentially removing blocking options from most activity.  Content blockers should instead use demonstrativeness.The latest demonstrativeness API will be used as the primary content-blocking API in exten...

Web Applications And Mobile Applications Compromised Your Privacy Policy Of Your Personal Information

A privacy approach is a declaration that reveals many of the processes a party collects, uses, reveal, and manages a customer or client’s information. period of time we install applications in mobile or sign up for social network and dating websites etc.We never read the privacy approach, fairly we Click " I AGREE" and Install Applications. Let me read out many Interesting facts about Mobile Applications to Dating websites privacy policy that user forgets to read.  Required Privacy approach issue, latest Facebook admitted that Cambridge Analytica may have got 37 Million More Facebook Users information through with previous 50 Million pretentious Facebook users.   Location Information that permits us to regularly control your location,  counting your location relative to and within third-party retailer locations, so its suggested to turn off your locations if applications are not in the range.gather of device usage of information, operating system detail...

Dangerous Mobile apps

Dangerous Mobile apps The Following Applications Are chinese applications which are use your personal informations or data and sell it or miss use of your personal informations.Follow the applications list. 1. Weibo 2. WeChat 3. SHAREit 4. UC News 5. UC Browser 6. BeautyPlus 7. NewsDog 8. VivaVideo-QU Video Inc 9. Parallel Space 10. APUS Browser 11. Perfect Corp 12. Virus Cleaner (High Security Lab) 13. CM Browser 14. Mi Community 15. CacheClear DU apps studio 16. DU Battery Saver 17. DU Cleaner 18. DU Privacy 19. 360 Security 20. DU Browser 21. Clean Master - Cheetah Mobile 22. Baidu Translate 23. Baidu Map 24. Wonder Camera 25. ES File Explorer 26. Photo Wonder 27. QQ International 28. QQ Music 29. QQ Mail 30. QQ Player 31. QQ NewsFeed 32. WeSync 33. QQ Security Center 34. SelfieCity 35. Mail Master 36. Mi Video call-Xiaomi 37. QQ launcher This type of applications extrct your informations or miss use of your informations. When you install...
" New Android Trojan Steals Photos, Contacts, Recording Of SMS and Phone Calls "                                                                       Android Tojan Recently Discovered two new  Android RAT  Compromising Victims Mobile and steals various sensitive informations such as  Photos, Contacts, SMS and it can also record the user’s phone call conversations. Both types have the same functionality in terms of stealing the sensitive data from victims and the researchers named this as  KevDroid . One Types of this  Android RAT  using the Android exploit (CVE-2015-3636) to gain the root access from the compromised victims mobile/cell phones. Researchers believe that  EST Security discovered an Android malware that there could be a link betwe...

Keep Eyes Open

Take Care About Pre-Installed Malware In Mobile Devices. The latest study states that a forthcoming mobile device may come with " pre-installed mobile malware"  along with the malicious code in it. Pre-installed malware means that the mobile device already installed with malicious code in the system level that cannot be removed easily. There are two types of pre-installed malware that is based on the location of the app which is one of the important aspects of the apps.   1 ./system/app/:– The apps which is posted in this location something that you are  repeatedly using such as, camera, FM, video player and photo viewers. 2. /system/priv-app/:– This is very important app location and most of the important apps such as settings and system UI, which contain the functionality for the back/home buttons on Android devices reside in it.   Mobile Malware  Researchers analyzed the code of this malware and confirmed that the known pre-ins...
Skimming code steal credit card information of payment from E-commerce websites Many of E-commerce sites infected with the malicious skimming code that steals the customer payment card information from checkout pages. The malicious code found inserted with the number of e-commerce websites providing various services such as ticketing, touring, flight booking services and shopping cart sites.As stated in the researcher analysis report, 250 and many more e-commerce sites found injected with the malicious skimming codes. With further analysis, researchers observed that e-commerce websites are not directly compromised. The skimming codes are injected complete the third-party JavaScript library provided by the French online advertising company Adverline. This grant the website that embedded with third-party libraries to load the skimming code.Unequal other online skimmer groups that directly compromise their target’s shopping cart platforms, Magic art Groups 5 and 12 at...

How to secure your personal information and financial information

"How to secure your personal information and financial information"   "One of the largest fears when it comes to our precious finances is that they might be taken from us when we least expect it. This fear has rapidly moved from having physical cash stolen to having our entire digital information footprint snatched from us. But, while this is a very real worry, there are ways to help possible cyber crime to protect our user information when conducting business online." 1) Password Encryption Technic. One of the easiest ways of protecting your user information when doing business online – yet also one of the most overlooked – is proper password encryption. Using one password across the board has been shown to increase the likelihood of cyber crime, while a strong password should also feature encryption as well as a strong combination of characters. If you are conducting financial business online, make sure that the site you use – whether it be ...