Search Results for: online privacy

FTC Fines Fortnite Maker Epic Games $275 Million for Violating Children’s Privacy Law

December 21, 2022 Epic Games has reached a $520 million settlement with the U.S. Federal Trade Commission (FTC) over allegations that the Fortnite creator violated online privacy laws for children and tricked users into making unintended purchases in the video game. To that end, the company will pay a record $275 million monetary penalty for breaching the …

FTC Fines Fortnite Maker Epic Games $275 Million for Violating Children’s Privacy Law Read More »

Why Do You Need a VPN To Maintain Privacy?

Introduction

VPN is one of the most convenient tools out there to maintain our privacy in the online world. Through the following lines, we are going to have an overview of VPNs. Queries like: best VPN for PC or mobile, the needs of a VPN will be explained in a very lucid language right in this post. We’ll also guide you to a quick guide on VPN after which you, yourself will be able to choose a good VPN & have a VPN download for pc.

The internet is a magical resource. We can find answers to any of our questions, play & watch what we like, and connect with the person we care for. Like any common thing, the web has got two sides of a coin. While the web seems al-right as we use it daily, in reality, it is much more complicated.

Did you know that you are not the only person who has the details of what you are browsing in your virtual world? For instance, as any user searches for something in search engines like Google, everything that a user searches for, is recorded in the database of the search engine for various purposes. Your online activity is even actively monitored by the internet service provider (ISP) whose connection you are using. More surprisingly, your IP address is also known to the sites that you have visited.

Why Do You Need a VPN To Maintain Privacy?

Every person in our actual life is careful about our privacy. Why shouldn’t there be that privacy in our virtual world? If you are wondering about any tools that’s here to protect your online privacy – be assured there are VPNs for you.

What is VPN?

A virtual Private Network or VPN (in short) is a kind of extremely useful online tool that is used to protect anybody’s privacy in the world of the internet.

How a VPN functions?

When you use a VPN, it, by using special technology, encrypts your connection. Every activity that’s done on the internet is exposed to the internet provider. But, if there is a VPN functioning on your device, the stuff won’t be disclosed to the IP.

Let’s understand that with an example-

Suppose you want to go to www.google.com – as soon as you enter the URL in your browser and hit enter, a request is sent to your IP requesting the system whether they will allow you to browse the aforementioned URL or not. If your IP approves your request, you will be able to visit Google.

But, if you use any VPN, as soon as you hit enter after typing the URL, the thing you want to browse will be encrypted and when it reaches your IP, they will not be able to distinguish your request and will let your request pass on. After that, the request will reach the VPN server and only then, it will be decrypted.

As the data will come back to you, the VPN server will again encrypt it and will send it to you and it will only be decrypted only when it reaches your PC / mobile phone again.

Why do you need a VPN?

In simple words, we need a VPN to protect our online privacy.

As the ISP can’t track sites which you are trying to visit, some people use it to visit some sites which are banned in specific regions.

VPN is also widely used on public networks, where you don’t want to let the network owner know about your activity.

So, these are the reasons why one should use VPN. In current times, where data-privacy is a great concern, we feel that every individual should use VPN if they want to stay safe & secure online.

For additional queries related to VPNs & cyber-security, feel free to express them in the comments & we will be there to help you.

Google Releases First Developer Preview of Privacy Sandbox on Android 13

May 3, 2022 Google has officially released the first developer preview for the Privacy Sandbox on Android 13, offering an “early look” at the SDK Runtime and Topics API to boost users’ privacy online. “The Privacy Sandbox on Android Developer Preview program will run over the course of 2022, with a beta release planned by the end …

Google Releases First Developer Preview of Privacy Sandbox on Android 13 Read More »

Google Takes Gmail Security to the Next Level with Client-Side Encryption

December 19, 2022 Google on Friday announced that its client-side encryption for Gmail is in beta for Workspace and education customers as part of its efforts to secure emails sent using the web version of the platform. This development comes at a time when concerns about online privacy and data security are at an all-time …

Google Takes Gmail Security to the Next Level with Client-Side Encryption Read More »

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts

Introduction Lab Topology Exercise 1 — Information Security and Ethical Hacking Overview Learning Outcomes In this module, you will complete the following exercises: Exercise 1 — Information Security and Ethical Hacking Overview After completing this module, you will have further knowledge of: Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information …

Certified Ethical Hacker v12 Module 0 : Ethical Hacking Concepts Read More »

What Is Facial Scanning? What Are the Threats Involved in It?

Reading Time: 8 minutes Facial scanning seemed like a fantasy a few years ago, but today we can open our mobile phones by scanning our faces. Millions of people are happy to access their smartphones with facial scanning worldwide. Facial scanning technology has a rapid increase in corporate organizations, airports, mobile phones, and shopping malls. Although facial recognition has…

Read More

The post What Is Facial Scanning? What Are the Threats Involved in It? appeared first on EC-Council Official Blog.

Importance of Cloud Computing Courses and Their Advantage in Protecting Data in the Cloud

Cloud computing has elevated from a cutting-edge technology to an enterprise IT best practice for businesses of all sizes and industries. The advantages of cloud computing over on-premises IT include scalability, cost-effectiveness, and the ability to access resources from anywhere, at any time. However, as organizations rely more on the cloud, IT professionals must develop…

The post Importance of Cloud Computing Courses and Their Advantage in Protecting Data in the Cloud appeared first on Cybersecurity Exchange.

updated with the information security news

50 Cyber Security Interview Question & Answers For Sure Shot Success – Networking and Security

12. The world has recently been hit by ……. Attack/virus etc. What have you done to protect your organization as a security professional? Different organizations work in different ways, the ways to handle incident is Different for all. Some take this seriously and some not. The answer to this should be the process to handle …

50 Cyber Security Interview Question & Answers For Sure Shot Success – Networking and Security Read More »

Passhunt on Kali Linux — Exposes the Nightmare of Default Passwords

Hope you are all doing awesome. As always, today we’re agin going to learn something from the basics of cybersecurity world, where a seemingly harmless string of characters can become our nightmare. Yes, you guessed it—we’re talking about default passwords. Not only that We also learn how we can use a tool called Passhunt on our Kali Linux system and find loopholes on various devices.

Why Default Passwords Are So Dangerous?

Now, imagine we’re working on our own home or office. We’ve got all these trusty devices—like routers, webcams, printers—keeping our connection the world and running our work smoothly. But here’s the catch: many of these devices come with default usernames and passwords straight out of the box.

At first glance, default passwords might seem like a easy shortcut. After all, who wants to spend time to set up a new password when we can just use the one that’s already there, right? Wrong! Default passwords are like leaving the front door of our system wide open for bad characters. Devices with default credentials aren’t just in danger—they are the danger. Anybody can enter the system without knocking the door.

meme on devices with default credentials

Let we have a look how default passwords can lead to some serious cyber attacks on us.

  • Network Nets: Imagine that—we’ve got our brand new router up and running, blissfully unaware that it’s still using the default password. Along comes a crafty bad attacker who sniffs out our router’s vulnerability faster than we can type “password123.” With access to our router, the attacker can wreak havoc on our entire network—slowing down our internet, eavesdropping on our data, or even launching full-blown cyber attacks. It’s like handing over the keys to our system on a silver platter!
  • Web Woes: Next up, we’ve got webcams. These little things might seem innocent enough, but with default passwords, they’re serious trouble makers. Imagine a attacker gaining access to our webcam without we even knowing it. They could spy on our every move, invade our privacy, or even use the footage for blackmail. It’s like having an unwanted guest lurking in the shadows of our home, and nobody wants that!
  • Printer Predicaments: Last but not least, let’s talk about printers. Yes, even these humble machines aren’t safe from the perils of default passwords. With access to our printer, a attacker could intercept sensitive documents, manipulate print jobs, or even launch a good old-fashioned printer hack (yes, that’s a thing!), gaining unauthorized access to sensitive documents stored on the printer’s memory. It’s like turning your trusty printer into a cyber tool, ready to strike at a moment’s notice.

So, what’s the moral of the story? It’s simple: always, always, always change default passwords. Whether it’s for our router, our webcam, our printer, or any other device in our supervision, we shouldn’t take shortcuts when it comes to security. Humans are the most weakest point in any security system. Humans are normally stupid, not really, a better word would ignorant, they don’t aware how stuff works. We just want that our router runs perfectly for Netflix and chill.

Hunting down default passwords using Passhunt

Enough talking about layman’s who ever reading this considers as a cyber security expert and we cyber security experts didn’t came here to learn those above things. We wanna test these kind of vulnerabilities due to human errors. Passhunt is a Python script which is going to help us on this matter.

This Passhunt tool originally created by Viral Maniar which can search through 523 vendors and their 2084 default passwords. It works like a database. Passhunt was giving some issues on newer Python and Kali Linux version. We have updated this script and removed some unwanted lines to run it on our Kali Linux system.

Let’s fire up our Kali Linux Terminal and type following command to clone Passhunt from Github:

git clone https://github.com/jaykali/Passhunt

After pressing Enter ↲ button on our keyboard Passhunt will be downloaded on our system as we can see in the following screenshot.

Passhunt clonning from Github

Now we are going to use cd command to go to the Passhunt directory. The command will be following:

cd Passhunt

Now we need to install required dependencies to run Passhunt and the command will be following:

pip3 install -r requirements.txt

It may take some seconds depending on our internet speed and system configuration. In the following screenshot we can see the output of above commands.

preparing Passhunt on Kali Linux

Now we are going to run Passhunt by using following command:

python passhunt.py

Now our password hunter Passhunt is ready and running as we can see in the following screenshot.

Passhunt running on Kali Linux

In the above screenshot we can see that there are 3 options only on the main menu.

  1. List supported vendors: By pressing 1 and Enter we can see all the supported vendors (brands) names list.
  2. Search Default Password: We can Hit 2 and Enter to search for a Vendor’s default credentials.
  3. Exit: To quit this tool we just need to type 3 and hit Enter.

Now assume we have encountered with a D-Link device, and we are thinking to try default passwords login on this then we can search for it on Passhunt by pressing 2 and hit Enter ⤶.

Then it will prompt for vendor’s name we can use D-Link in our case. After that we are able to see the list of D-Link devices and their default credentials. Here we can choose our target device as we can see in the following screenshot:

passhunt is hunting for default credentials

This is how we can search for default password database using Passhunt on our Kali Linux system. Nowadays default password devices are rare every device have it’s own default password written on somewhere in the packets. But there are some web services which are old and not updated for a while even offices, universities, households use very old model routers for saving some bucks. Humans are 

Humans are ignorant they really don’t care about these online security. They uses same passwords on internet banking, social media even in shopping sites also. They don’t change the default passwords of devices. Those things are really scary.

One more thing, If our target device is a router and it have a WPS button (ultra modern routers usually don’t have WPS button, others may have) then we can also try Pixie Dust Attack to crack it.

That is it for today. We already knows that default passwords are very risky and learn something new i.e using Passhunt on our Kali Linux system and search for default passwords and credentials.

Love our article? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group & Whatsapp Channel We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Terms and Definitions

Understanding Terms and Definitions Requirement 3

Certainly! Let’s delve into ISO 42001 Requirement 3, which focuses on Terms and Definitions within the context of Artificial Intelligence Management Systems (AIMS). In this blog post, we’ll explore key concepts, provide examples, discuss implementation techniques, and touch upon auditing practices. ISO 42001 Requirement 3: Terms and Definitions 1. Establishing a Common Lexicon ISO 42001 …

Understanding Terms and Definitions Requirement 3 Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.