- Many of the so called data security,experts,sqore by the True Crypt to store their sensitive data safe by encrypting in a container.
- Besides being user friendly and extensive help documents, it was reliable and has variety of options for encrypting data, be it selecring encryption algorithm, random key generation and option of hidden volume.
- Therfore sudden announcement of True Crypt project being discontinued came as a shocking news.
- Now the obvious question that comes to my mind is " was this one of the numerous Projects of US govt to snoop" and this was shut down once it achieved its aim.
- This is just a hunch and food for thought.
Awareness and Knowledge means security.
Saturday, June 21, 2014
True Crypt.....what went wrong
What the F##k is Cyber security.
- Now a days its a buzz word. Everyone who has to do something or nothing with electronics, yes u read it correctly, is just blabbering about a deamon known as " We are vulnerable in cyber space"
- Well let me tell you, even though evrything they say may not make a sense, its a serious threat to your PRIVACY.
- Well the first doubt that comes to your mind is
Second thought that crossed ones mind is " I dont have to worry about it. Its not going to effect me. "
4. Its a flawed thought process. Though you may not be a direct victim of cyber attack, but you could be accomplice in a crime. WHAT?
HOW? is the natural reaction.
Here are the details of modus-operandi.
5. A #hacker gains access to your PC, Laptop or smartphone by installing #malacious softwares also know as #malware, called #trojans. This way your computer becomes a,member of a worlwide network called in short as #botnet. As and when a hacker deseeies he carries out an attack using your computer ie #bot. The attack can be #DDoS abbreviatiin for Distributed Denial of Service attack and being down the victim. This way unknowingly, you have become an accomplice in #cyber #crime.
6. How do I come to know about it?
First sign is that your system becomes slow, the CPU shows unusual activity.
7.How to mitigate the risk?
Just follow three simple steps.
* Install an effective #antivirus that incl
scanning your mobile also.
* # Update all softwares and operating sust from known and reliable sources.
* Do not leave your internet connection and computer on when you are not using it.
Happy Hunting.
Subscribe to:
Posts (Atom)
