Cash-Less India and Hackers

Introduction

A warm Good Morning to Reader,
As we all know about demonetization in India. The whole country got problem of cash. But,

            


                                                            "Until there is no pain
                                                                   There is no gain"
  
So it's good for society. There is no problem. Then our PM Mr. Narandra Modi started Cashless India 
system, best thing to fight against black-money. This is greatest change in Indian economy.
Cashless system is very easy and fast way to ply users and costumers. The Cashless is so easy, its so vulnerable to Hackers. 

Who are Hackers?




A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things.
Black Hat Hackers could steal your whole credentials and personals data.

"According to a survey India to very vulnerable to Hackers by 2020 because to cashless and digital India"

As Cashless and Digital India is very important to our Nation. We Should also know how to protect our privacy and digital life.

So the question is what and how Hackers do?

A pro-hacker can hack you in many simple ways, he could just text a message to gain your phone full access, you may accidentally access a malicious website, or download a Trojan apps. 

Few most used method by hackers




  1. Social Engineering
 One of most used method by hackers are social engineering. In this a hackers pretend to a banker or you client or your friend. (best part is if he calls number or mail or text all things will be of your banker or client or friend) He may says that, they are updating there system and want to check your information. If you tell something your bank accounts in bleached for sure. 

Prevention:- Banks never call customer to update information.  

In Social Engineering another most successful attack is Phishing 

Phishing is a full clone on a website just with different URLs. 
For example:- A Hacker makes a clone of your bank website and using some hacking skill like tab napping or URL redirection he sends you Phishing website, and without seen URL you login. The Login credentials will take 1 second to reach to hackers database. 

Prevention :- Always check URL before visiting website.

Another Attack is Key-logger

Key-logging is an technique a Hacker manage to install a key logger Trojan in your computer and records every strokes you press on keyboard.

Prevention :-  Keep a good anti-virus updated.

These are some Social Engineering Attacks.



     2. Third Party Application 

     This paragraph is about digital wallets and banking apps. After cashless India, digital wallets are more in use as before. It is good to use digital wallets and government can see if there is no black money, but not only government see hackers are too who see digital wallets. 

As company are updating and adding new features in apps there are some loopholes left, (they don't left loopholes, loopholes left by there mistakes or not properly test before launching the apps.)
Hackers are always search in loopholes and bugs. Ones they manage to exploit the bugs they are full access to anyone accounts. 

There is no prevention against a loopholes until anyone found an report to developer company.

How to find Bugs there is most readied book.


Bind Apks



Another things is that never download any wallet and baking apps for other website, only download from playstore,
Because apps on other websites are bind with a infected application, once you download and start using your all data will sent to hackers database.



I hope you like the blog and stay safe and Stay protected.

Thankyou






            








 





Comments

Popular posts from this blog

Advanced Google Dorking Commands

How much money can I make from AdSense with 1000 visitors per day ?

Oneal Ron Morris : Fake Hospital