We are going to explain how to transfer data securely through xender app. Whenever we turn on hot spot of xender then mobile hot spot network turned on through a xender which is by default open network. In this case if our data connection is on then any one can access our network and may they perform crime through network. So always keep your network password protected. How to Set password in xender when turned on hot spot through it 1. Go to settings menu in xender app. 2. Under the connect phone tab click on to set connection password. 3. At that time it will ask password give password on pop up box. 4. Done. Now check your hot spot network is now secure with password.
Browser cache weakness Severity: Medium Vulnerability description Browsers can store information for purposes of caching and history. Caching is used to improve performance, so that previously displayed information doesn’t need to be downloaded again. History mechanisms are used for user convenience, so the user can see exactly what they saw at the time when the resource was retrieved. If sensitive information is displayed to the user (such as their address, credit card details, Social Security Number, or username), then this information could be stored for purposes of caching or history, and therefore retrievable through examining the browser’s cache or by simply pressing the browser’s Back button. Impact Browsers often store information in a client-side cache, which can leave behind sensitive information for other users to find and exploit, such as passwords or credit card numbers. The locations at most risk include public terminals, such as those in libraries and Inte
Email Phishing may get an attacker your personal information like credentials, credit card information, registered mobile number, etc PII (Personal Identifiable Information) parameters. How to perform Phishing via Email? Step 1: Create an identical working website that is appearing quite similar to the official company website. This dummy website acts as a fake verified validation to the target to gain trust over. Ex. Gmail account login page, Facebook login page or any other website. Step 2: An important part to ponder over is the URI or URL of the fake but working website that has to be changed minutely in such a way that the target person is not able to spot the changes easily in its link and fewer people are aware as well as concerned about this security threat. Ex. For 'gmail.com' one can modify it to 'gma1l.com' or for 'facebook.com' that can be modified to 'facebeok.com'. Users enter their details here on the fake login page without checking
Comments
Post a Comment