- 5paisa
- AdSense
- Android
- Asphalt 8 : Airborne Mod Apk 4.9.1b Unlimited Money
- Battlegrounds Mobile India
- Blogger
- Blogging
- Bug Hunting
- cloud storage
- Cmd
- Damn vulnerable Web Application
- Demat Account
- Difference between
- dj alok
- dj alok in free firefree
- Doodle Army 2 : Mini Militia 5.2.0 Apk + Mod for android
- DVMA
- E-books
- earn Bitcoins
- Ethical hacking tutorials
- Express vpn
- EXPRESSVPN PRO APK 7.12.1
- EXPRESVPN CRACKED APK
- fire dj alok
- Freefire
- Gaming
- Google drive
- Google llc
- gplink
- Groww App
- Health
- helo
- helo mela
- helo app
- Helo app earn paytm
- Helo app full guide
- Helo app invite and earn
- Helo app redeem proof
- Helo app refer and earn
- Helo app unlimited trick
- Helo app withdraw proof
- Helo Mela Offer: Get Rs.2 Free Paytm Cash + Win Upto Rs.10000 Paytm Cash
- helo refer and earn
- How to
- How to combine two Wifi Connections to get a faster Internet
- how to get dj alok for free
- how to get free dj alok
- how to get free dj alok in free fire
- How to install DVWA on Kali Linux 2020.2
- How To Use Light Speed WebCache on Your website
- ICICI Direct
- IOS
- kali linux
- Live streaming
- makeup
- meesho
- Money Earning
- My poems
- Netflix
- Netflix mod
- Netflix premium
- News
- online courses
- Pentesting
- programming
- PUBG
- Puffin Browser Pro 8.3.0.41446 (Full) Apk + Mod for Android
- Puzzles
- Recharge offers
- Refer and Earn
- Reviews
- SEO
- shell Scripting
- Shortlink
- Spotify Music 8.5.57.1164 APK Mega Mod Cracked Latest Android
- stylish name
- Technology
- Tips&Tricks
- Township Mod Apk 7.5.0 Unlimited Money
- Udemy
- Udemy courses
- Udemy free
- Udemy premium
- VClip app download link
- VClip app full details
- VClip app invitation link
- VClip app referral code
- VClip app referral link
- VClip app review
- Web designing
- What is
- WINDOWS
- Wishes
- Wordpress
- World Cricket Championship 2 2.8.9 Apk + Mod (Coins/Unlocked)
- Youtube tricks
- zoom app
- zoom bombing
- zoom call
- Zoom safety tips
10 ways to protect your Android smartphone from hackers | KumarJeeru
How to prevent smartphone from hacking
Hello friends we have already discussed about lot of technology tricks through this website.but now i am going to provide you some tips and tricks how to protect from hackers while using any kind of technology.
where some hackers uses phising trick to create dummy website looks like original website to get victims username and password . Hackers uses some password cracking techniques to cracking username and password of any app or website using some information gathering tools.
Only use password with combinations of numbers,alphabets,symbols like this UC80gs#h/e&c#f$&#@/hjes&.it's better to use double step verification while using payment related online accounts like Internet banking to secure our bank accounts.
they can hack your online accounts if you use simple password like iloveyou,123456789 or any other easy password . Don't put your personal details as password like your wife name,your country name like that.
where every simcard like airtel,jio,idea etc contains operator tool kit like( airtel live,idea live etc ) gets automatically installed into the device whatever you use.where every simcard contains some phone numbers pre installed like police,ambulance,customer care etc .
they could also show a popup screen regards offer like get free3months unlimited calls,sms,Internet like that) even that message won't save and asks yes or no at footer part.if you click on yes then hacker can able call to some anonymous person using your mobile number remotely.where victim may feel panic during this situation where victim can listen call ringing sound without doing any call to certain user. Without victim permission They can also install dangerous spyware/virus application by using your web browser remotely in your device.
Charge our device.its better to use power sockets to do charging . When in some cases they provide USB Ports or USB sockets for charging. We basically charge our deviceby connecting Usb cable on one side and charging pin on other side .
1)charging only
2)media transfer only
3)both media transfer and charging
You have to select charging only . If you would selected any other option your data would be transferred to anonymous person.
If above pop up is shown on your device means some device is behind that wall is going to monitor your phone . where they can monitor call logs,sms,WhatsApp messages,photos,videos,whatever data in your device.they can also use data for illegal purposes.
You have to select charging only to overcome this problem.
by using some information gathering tooos he aquires all victim`s data. Then the hacker calls the customer care of that sim company and says that someome had stolen that simcard number kindly block that number and then and provide a duplicate sim.
Then hacker calls the victim and say we are calling from telecom company we are upgrading your simcard from 4G to 5G please press 1 then believe it's a call being receiving from telecom company and clicked one in dialpad then old sim will be deactivated and new sim will be activated.
so he already got your online banking details now he got otp then he simply transfer that money to hackers personal account.
Recently in a case study a victim from bombay,India had lost 4crore rupees from a business man by this trick.
If you send a small SMS message to any mobile, the SIM card will be in full possession. Obviously every SIM card we use has a special software framework called the SIM Application Tool Kit (STK). As part of this, a browser called S @ T Browser is also an integral part of the SIM card. What SIMJacker malware does is take control of this browser. It will then open up dangerous websites, read SMS messages to your phone, and prevent any communication from your phone.
This has been the method used by hackers for a long time. Your name, date of birth, Aadhaar card details and other important information will be collected from various places and based on them, the telecom company will compile them on your behalf. Even if all your credentials are correct, telecom companies will soon give them a duplicate SIM card without identifying the thief. This will no longer leave banking OTPs and other important information to your phone. Your sync will deactivate completely. Using this method should be careful so that they took up large sums of money from the bank account.
CASE1:we are calling some specific bank where your credit card or debit card is banned today
CASE2: we are calling some specific bank your credit card is going to expire soon kindly share your credit card details we will send a new atm card through postal services
In first two cases they get all details on atmcard from victim.now then can hacker can use those details for shopping and to do online money transactions.
CASE3:Your account is hacked please change your online banking account password to secure it.click below link to continue
In case three hacker got victims username and password of online payment account then hackers use SIM SWAPPING technique as i explained above to move all his money to hackers account.
CASE4:Just pay 1$ and watch life time all channels for free.
In case four victim click the link and trusts that it's a real
My advice is only use atm with heavy crowd,security guard and a surveillance camera . because hackers choose least security atm for their own purpose like to equip atmcards details by some special techniques.hackers uses card skimming technique here.
where they put a fake swiping slot inplace of atm swiping slot and a transparent layer type device on keypad of atm which works like a keylogger.where both of them stores all information like whatever pin user types on key pad and also it extracts data from magnetic strip of atmcard while swiping through swiping slot and stores all data . later hacker do verification and do combination of card details and pin at specific time by combining data in a sequence.now they copy all atm card details on a dummy atm card and they use for any purposes.
where he can also sell them through darkweb.
after completion of development of that software with 80-90% accuracy will be published in new macintosh software .
But some hackers try to exploit that software and finds some bugs.by using that bugs he get admin rights in that mac os and destroy whole computer . that's why mac or windows or Android founds lot of security patches in the software and provide software updates.if we neglect updating software of our device then hacker can easily hacks our device . It's our mistake not by company . don't use pirated software from torrents or third party sources use only from orginal software updates.
People may feels happy while using some mod apps by getting all features of that application without paying even a single dollar of money.But Doing such things is offense and crime . some people tries to crack paid apps using softwares like lucky patcher, apk editor,android studio etc . but you should never do like this .
Where you can get all features of that anti virus applications.
Stop using them whenever they are not in use . where hackers use tools like kali Linux,Blueborne attack to hack you smartphone.
You may found somewhere that qr codes are shown before merchant shops like paytm,google pay,phonepe,Amazon pay,paypal etc .you might use them for doing upi transactions .
be safe while doing such things.hackers could also inject malware in your smartphone and exploit all data . some hackers also sends 999rupees or 15$ request money qr codes to us . If we scans them then money from our account will be transferred to hackers account.
Some hackers also post some fraudulent advertisements on social media,news papers,websites like quirk . where those advertisements appears like trusted but theyare fake . check whether company has official website,head office,phone number,email . search on Google whether they are true or fake.
Software update should be done in IOT (Internet of Things),smart device,self driving cars and tractors,smart tv's . not only this software update is provided for every gadget works with Internet connection . Then you can surf on your device without any hassles.
〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰
Hope you love this cool post don't forget to check out advertisements on my websites and share this post to all your friends and groups . Have a nice day wait for the upcommimg post Until take care good bye.
Hello friends we have already discussed about lot of technology tricks through this website.but now i am going to provide you some tips and tricks how to protect from hackers while using any kind of technology.
Take more care on social media and online accounts
Where don't login your social media or online account by any short links or unknown website . always use Google or any popular search engine to find whether website is truth or fake .where some hackers uses phising trick to create dummy website looks like original website to get victims username and password . Hackers uses some password cracking techniques to cracking username and password of any app or website using some information gathering tools.
Also Read:6 Most Common Password Cracking Methods And Their Countermeasures
Only use password with combinations of numbers,alphabets,symbols like this UC80gs#h/e&c#f$&#@/hjes&.it's better to use double step verification while using payment related online accounts like Internet banking to secure our bank accounts.
they can hack your online accounts if you use simple password like iloveyou,123456789 or any other easy password . Don't put your personal details as password like your wife name,your country name like that.
SIM JACKING
Where hackers can also inject some spy softwares even in simcards without our permission .if you insert that sim in simslot in either smartphone or java or symbian phone . what ever device you use its not required for hackers . even devices without Internet connection AlsoHackers could hack sms,call logs,contacts .Also Read:6 Android Hacks You Can Do Without Rooting Your Phone
Process behind sim jacking
They uses a special browser to monitor all activities done by you through that simcard.where they injects a small code in place of bug of the simcard to do survelliance by hackers .where every simcard like airtel,jio,idea etc contains operator tool kit like( airtel live,idea live etc ) gets automatically installed into the device whatever you use.where every simcard contains some phone numbers pre installed like police,ambulance,customer care etc .
Also Read:How To Hack Someones Phone Remotely
there's a special browser in every sim regards sim services where hacker exploits that software and injects some code in vulnerability of that simcard.they uses this trick to monitor your location,sms logs including messages ,call logs,then can also block calls on your simcard.they could also show a popup screen regards offer like get free3months unlimited calls,sms,Internet like that) even that message won't save and asks yes or no at footer part.if you click on yes then hacker can able call to some anonymous person using your mobile number remotely.where victim may feel panic during this situation where victim can listen call ringing sound without doing any call to certain user. Without victim permission They can also install dangerous spyware/virus application by using your web browser remotely in your device.
JEWS JACKING
Whenever we go to railway stations, travelling buses,5 star restaurants we may charge our devices when there is insufficientCharge our device.its better to use power sockets to do charging . When in some cases they provide USB Ports or USB sockets for charging. We basically charge our deviceby connecting Usb cable on one side and charging pin on other side .
Also Read:
Difference Between HDMI, VGA, DisplayPort, DVI, Thunderbolt, And MHL
where usb can do data transmission.after connecting usb cable pop up screen appear in our device and it asks for three choices1)charging only
2)media transfer only
3)both media transfer and charging
You have to select charging only . If you would selected any other option your data would be transferred to anonymous person.
What's behind Jews Jacking
Where they basically provide some usb port on onside of the wall and behind the wall they uses some computers/laptops to do surveillance on users dataIf above pop up is shown on your device means some device is behind that wall is going to monitor your phone . where they can monitor call logs,sms,WhatsApp messages,photos,videos,whatever data in your device.they can also use data for illegal purposes.
Also Read:How to protect keyboard from Hackers
so don't store your email&passwords or any personal information in your notes,memos or as any file format in your device.You have to select charging only to overcome this problem.
SIM SWAPPING
Suppose hacker want to hack online payments account . Then the hacker send a phising link to the victim then the victim believes it as orginal website and provides his username and password .now hacker needs otp from the victim simcard.then the hacker gathers all personal information including Aadhar card number of victim.by using some information gathering tooos he aquires all victim`s data. Then the hacker calls the customer care of that sim company and says that someome had stolen that simcard number kindly block that number and then and provide a duplicate sim.
Also Read:FRANKENSTEIN – A Virus that will destroy your Android Device within a Second
Then hacker calls the victim and say we are calling from telecom company we are upgrading your simcard from 4G to 5G please press 1 then believe it's a call being receiving from telecom company and clicked one in dialpad then old sim will be deactivated and new sim will be activated.
so he already got your online banking details now he got otp then he simply transfer that money to hackers personal account.
Recently in a case study a victim from bombay,India had lost 4crore rupees from a business man by this trick.
If you send a small SMS message to any mobile, the SIM card will be in full possession. Obviously every SIM card we use has a special software framework called the SIM Application Tool Kit (STK). As part of this, a browser called S @ T Browser is also an integral part of the SIM card. What SIMJacker malware does is take control of this browser. It will then open up dangerous websites, read SMS messages to your phone, and prevent any communication from your phone.
This has been the method used by hackers for a long time. Your name, date of birth, Aadhaar card details and other important information will be collected from various places and based on them, the telecom company will compile them on your behalf. Even if all your credentials are correct, telecom companies will soon give them a duplicate SIM card without identifying the thief. This will no longer leave banking OTPs and other important information to your phone. Your sync will deactivate completely. Using this method should be careful so that they took up large sums of money from the bank account.
Be safe with Credit Cards
Where you may receive some calls or messages or mails from anonymous persons saysCASE1:we are calling some specific bank where your credit card or debit card is banned today
CASE2: we are calling some specific bank your credit card is going to expire soon kindly share your credit card details we will send a new atm card through postal services
In first two cases they get all details on atmcard from victim.now then can hacker can use those details for shopping and to do online money transactions.
CASE3:Your account is hacked please change your online banking account password to secure it.click below link to continue
Also Read:Secure Your Credit Cards From Hackers (Definitive Guide)
In case three hacker got victims username and password of online payment account then hackers use SIM SWAPPING technique as i explained above to move all his money to hackers account.
CASE4:Just pay 1$ and watch life time all channels for free.
In case four victim click the link and trusts that it's a real
ATM Cloning or Card Cloning
These incidents are mostly done in first week of the month . because most of people tries for withdraw money easily.where they choose atm in small streets to withdraw money . It's a major mistake.My advice is only use atm with heavy crowd,security guard and a surveillance camera . because hackers choose least security atm for their own purpose like to equip atmcards details by some special techniques.hackers uses card skimming technique here.
where they put a fake swiping slot inplace of atm swiping slot and a transparent layer type device on keypad of atm which works like a keylogger.where both of them stores all information like whatever pin user types on key pad and also it extracts data from magnetic strip of atmcard while swiping through swiping slot and stores all data . later hacker do verification and do combination of card details and pin at specific time by combining data in a sequence.now they copy all atm card details on a dummy atm card and they use for any purposes.
where he can also sell them through darkweb.
can we able to design a unhackable website/app /software /device /anything
It's impossible to create such things . for example if i am working in software development of macintosh operating system. With my capability of programming languages i made few software programmes like felt they are working good . Like task bar,paint,excel,power point,typing master etcafter completion of development of that software with 80-90% accuracy will be published in new macintosh software .
But some hackers try to exploit that software and finds some bugs.by using that bugs he get admin rights in that mac os and destroy whole computer . that's why mac or windows or Android founds lot of security patches in the software and provide software updates.if we neglect updating software of our device then hacker can easily hacks our device . It's our mistake not by company . don't use pirated software from torrents or third party sources use only from orginal software updates.
Never Use Mod Apps
Do you use GB WhatsApp,OG Insta or any other mod app you may got it without paying a single penny.People may feels happy while using some mod apps by getting all features of that application without paying even a single dollar of money.But Doing such things is offense and crime . some people tries to crack paid apps using softwares like lucky patcher, apk editor,android studio etc . but you should never do like this .
Also Read:Download Google Play Store Paid Apps For Free
You shouldn't download any kind of mod apps from third party websites and app . They can remotely inject malware or virus inside the app to erase all information inside your device they could also do survelliance on your smartphone.Where App developers are not responsible if any errors done through app on your smartphone.Never Use Public wifi
You might got free Internet through Railwire,Bus stops,Restaurants,cafes or else anywhere.You may Surf on Internet whatever you want without any hassles.Also Read:5 Steps Wifi Hacking – Cracking WPA2 Password using Kali Linux
but hackers could exploit your smartphone or pc whatever you use without your permission they could spy your device remotely even your smartphone couldn't detect that if you won't use any anti virus app.Use Antivirus app
Where antivirus app can helps you to scan whole smartphone and detects hidden malware and Trojans,spyware,adware inside your device.it restrict you to open phising sites,porn sites.You can also protect your device by Anti theft,play sound,locating your device .Also Read:What Is RAT Or Remote Access Trojan ?
It's better to use software inbuilt anti virus apps rather than third party apps . I recommend you to use Antivirus apps like MCAFEE,Bitdefender,Kapersky ,malwarebytes,eset, panda.Where you can get all features of that anti virus applications.
TURN off wireless connections when not in use
There are three types of wireless connections accessed through smartphone . Through Bluetooth,wifi,Usb tethering.Stop using them whenever they are not in use . where hackers use tools like kali Linux,Blueborne attack to hack you smartphone.
Also Read:What Is The Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN ?
Never use QR code for payments
You may found somewhere that qr codes are shown before merchant shops like paytm,google pay,phonepe,Amazon pay,paypal etc .you might use them for doing upi transactions .
be safe while doing such things.hackers could also inject malware in your smartphone and exploit all data . some hackers also sends 999rupees or 15$ request money qr codes to us . If we scans them then money from our account will be transferred to hackers account.
Don't click fake advertisements
Some hackers also post some fraudulent advertisements on social media,news papers,websites like quirk . where those advertisements appears like trusted but theyare fake . check whether company has official website,head office,phone number,email . search on Google whether they are true or fake.
Don't miss any smartphone or pc OS update
Where app developers provides Os updates to solve vulnerabilities in that Os or app update to protect users from exploiting by hackers . Never miss any software update which protects you from attacking malware, petya ransomware,trojans,virus etc . mainlyAlso Read:How to Hack car lock using HackRF
Software update should be done in IOT (Internet of Things),smart device,self driving cars and tractors,smart tv's . not only this software update is provided for every gadget works with Internet connection . Then you can surf on your device without any hassles.
〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰〰
Hope you love this cool post don't forget to check out advertisements on my websites and share this post to all your friends and groups . Have a nice day wait for the upcommimg post Until take care good bye.
Also Read
KUMAR JEERU
. I am a Programmer and Pentester. I find and Fix loophole in websites and networks. Connect with me for queries , web developemnt , Scanning and Fixing website Security issues. My company gives special discount for independent entrepreneur , small and Medium size companies. Contact me directly on my face page
Post a Comment
Post a Comment