How to Check & Automatically Repair Corrupted Windows Registry

Registry errors can make your PC to freeze down and hang up then causing a serious annoyance to the users. At this point, the registry needs a serious repair to bring the PC back to its life. Well, before I tell you how to repair the registry, lets see what causes the registry to get corrupted. Registry …

How to Detect a Web Proxy must for Cyber Crime Investigation

Using a web proxy (Anonymous IP) is the simplest and easiest way to conceal the real IP address of an Internet user and maintain the online privacy. However, proxies are more widely used by online fraudsters to hide their actual geolocation such as a city/country through a spoofed IP address. As the fraudsters are now becoming more sophisticated in …

Global Cyber Cases

Cyber-crimes  include  various  crimes  like :- Harassment via E-Mails: This is very common type of harassment through sending letters, attachments of files & folders i.e. via e-mails. At present harassment is common as usage of social sites i.e. Facebook, Twitter, LinkedIn etc. increasing day by day. Cyber-Stalking: It is expressed or implied a physical threat …

Essential skills to be Cyber Crime Investigator

Phenomenal increase in cyber crime has led to a massive surge in the demand for cyber crime investigators. The 25 skills every cyber crime investigator must have are: Basic Web Programming skills. Working knowledge of Web Technologies. Strong working knowledge of Web Hacking. Effective suspect interviewing skills. Thorough understanding of documentation. Sound knowledge of the relevant law. …

GiftGhostBot botnet stealing gift card balances

Anna Westelius said GiftGhostBot is an advanced persistent bot (APB) capable of pinging a retailer or card issuer up to four million times per hour as it rattles through different gift card account number combinations. These attacks are effectively shutting down customer sites to the point where they can no longer automatically accept customer requests …

Secure Usage of Credit & Debit Card/ATM

Identity theft The fraudulent acquisition and use of person’s private identifying information, usually for financial gain. It can be divided into two broad categories : Credit card fraud Credit card fraud is committed by making use of credit/debit card of others for obtaining goods or services. The threat emerge due to stealing of information like …

Steps to Manage & Secure your Wifi

Open your Web browser and enter the URL of the modem’s administrative site. If you can’t find it in the users’ manual, call the modem manufacturer’s/vendor’s customer service. q Log in to the administrative site by entering the user name and password provided in the user manual. Again, if you cannot locate these, call the …