Seven ways to get rid of them hacking hackers

Hacking seems lately to have become quite so easy . Nowadays, all online accounts, so there is less risk of hacking. The problem is, only those who can tell a good way to escape from the hands of hackers. Given the recent hacking to escape CNN has published seven valuable advice. Since the  advice given, so it is claimed that the media will be following you safe online.

Your phone’s Wi-Fi
All the time the phone will not turn on Wi-Fi or Bluetooth. Finding these opportunities is  hackers. If the Wi-Fi or Bluetooth in the phone’s unfamiliar ones, and tried to see it.
If turned on all the time, what is the problem? The problem is, some networks before a hacker can find what you were active. Accordingly, the network hackers before setting the trap of cheating. Create a new network before the network hackers disguise your phone a Wi-Fi or Bluetooth network previous promise to add. Once, when a hacker infiltrated the network of malware into the phone and steal data from the phone without your knowledge, tasks such as surveillance continued. So when there is no need, then turn off Wi-Fi and Bluetooth.
Using a two-layer security
Now, with just a password should not be considered safe. Almost always turns out to be hack the password.
Two-step authentication or use a two-level security. Two levels of security are now many websites or services. This two-level verification process, as well as the user’s account password to log in during the regular smartphone and a code to use another tab. It is an additional level of security. So long as there is mobile phone in hand, until no one could enter the account is confirmed. Apple, Google, Facebook, Dropbox service such as this verification process has two stages. Whenever a new device to log in to go after a secret code will be asked for the password. It will instantly on your phone. If the hacker knows your password, but does not know the code to your mobile phone will not be able to hack the accounts.

Smart Password
The account contains sensitive information or websites, they use long and complex passwords. Letters, symbols, numbers, etc. Make it easy to match the password. Use a different password for each website and Use Password Manager to remember passwords. In this case, “lasapasa ‘or’ Password Safe ‘might work. Change your password at least once every year.
Use HTTPS
Use HTTPS time browsing each website. To use ‘ tool you can use. This tool encrypts all the information your browser. If you use HTTP address bar only, but anyone can monitor your Internet browsing on.
Wi-Fi setup
Wi-Fi setup the password. Do not use the default password. Security Encryption W PA II during the election day. Most of the wired router Privacy  or Wireless Protected Access is the default form. The encryption exclude any cost.

Wi-Fi can not hide
When you are asked for your home router settings, “the  hide?” If you have to hide your Wi-phaike ‘yes’ to select the mobile phone or laptop on your home network to actively scans. Connect your device to the network all the time, but continues to scan. In this context, a project of the United States government secret Wi-Fi hacker Ben Smith, said: “From a security point of SSD technology to hide, you surrender yourself to the five-year-old.”
The advantages of the Internet to buy products at short notice
Internet facilities for the purchase of many new products come on the market jumped. Internet technology to bring new products to market for the benefit of the privacy and security so that it is not carried out hastily. ‘Styanaslabha’ hackers, “said the product is safe to say that the Internet is used for convenience, but actually it is not. Therefore, the advantages of the new products on the
internet is not safe, it should be bought at. ”

Bangladesh mobile cyber world at risk


13 countries around the world on cyber Security Company Kasper sky Lab 015 is the third and final report in accordance with the Bangladesh mobile phone topped cyber risk. (Favorite Tech) 13 countries of the world, cyber security company, Kasper sky Lab 015 is the third and final report, “IT Threat Evolution in the queue Fifty Three Thousand Two ‘has topped a list of the phone vulnerable to cyber Bangladesh (at least 1 in every 4 devices here). According to the report, 13 countries and the US 19th in terms of computer virus attacks. And 64.44 percent of the local and regional virus virus. As Bangladesh is the most vulnerable region in terms of virus infection.
The report has been mentioned, the majority of the Security Threat and mobile melancholy the highest rates of mobile of Bangladesh has emerged as the country’s first cyber risks. Kasper sky Lab’s malware-expert Tim Armstrong said in this regard, mobile malware hackers are trying to make money on the spread of the virus. He said that last year (014 AD) compared to the year (015 AD), the mobile phone virus spreads rapidly spreading malware.
Bangladesh Telecommunication Regulatory Commission (BTRC) last (December 015), according to the report the number of mobile phone users in the country of 37 million 0 13 million. The number of users of mobile Internet 5 million to 14 million 53 thousand. A large part due to the use of mobile Internet in the world of cyber-criminals are more attention.
Meanwhile Thrijira faster browsing service and value smartphones within reach of the common man as the mobile forgotten ordinary people are being affected. Viruses are connected to the mobile content mobile malware. Generally mobile phone while browsing any website banned advertising, slow or such warning system, to find any music or video files in different formats of the show or be downloaded from the starting of the reason is the mobile melancholy.
Security students says, is like a computer virus infected spam handset status. The antivirus is available in the market, but now the virus is transmitted from the handset to keep is not nearly as capable said. Georgia Institute of Technology Information Security Center) published its annual report on emerging cyber threats, The more number of users will use their smartphones, the more applications will be used, and other financial transactions, through which cyber criminals will be able to more crime.
In addition, in many ways the virus is being spread mobile add-on. Early computer viruses, which is why he would like it was very easy to detect and block. But this is risky MP spam or three files, picture files, or disguise of the national media, which is due to the user’s spam and what is not spam, it becomes difficult to detect.
Track malware and security software for mobile phones and provided a company official Connie said adaptive, adaptive Mobile has identified a particular virus, called crime. It can be spread in two ways. First, it can attack disguised as MMS. Phone using Bluetooth wireless technology or mobile phone, it can enter into the search function. Airborne virus is a virus or virus adaptive mobile phone.
Connie says, should ordinary computer users to be free from viruses is that there remain alert, warning that the use of mobile phones were adopted. He said, for the security of the computer, which is what we do, everything should be the same for mobile security. Open file attachments from strangers, especially before anyone thought better of it. In addition, be sure that your phone Bluetooth technology (Bluetooth visibility off) are. The mobile virus threat is driving the fastest and file attachments, and Bluetooth wireless technology.
However, a separate company called F-Secure, says the researcher, the growth of mobile viruses is decreasing day by day. He said because mobile phone companies, and they are constantly vigilant enough in their new models are made handsets for the bill-in security system. However, he said, will not be affected by mobile malware in the entire depending on the user’s caution.
According to the researchers, the chances of recovery and to strengthen mobile security for all mobile phone makers, operators and application developers will have to work together. The average life cycle of mobile devices in just two years, almost ten-year life cycle, where each computer. Therefore, to secure a two-year low at the mobile phone to mobile phone security should be further strengthened.

Microsoft’s cyber-attack alert



Microsoft's cyber-attack alert

Software giant Microsoft has warned of growing cyber attack prevention. The organization of any government or government-backed hackers trying to hack into Outlook data other customer users will be warned if you have doubts about them. Recently the company announced the new measures.
According to Microsoft, a significant increase in both the number of cyber attacks and approaches.
We are now the main suspect behind the attacks notification will go out, we think that the government supported the attack. ”
Also said, “If the evidence in our hands, we will inform you that the attack may be supported. Because of the cyber criminals to attack the cyber-attacks can be complex and long-term. ”
011 was a victim of hackers in China, China controls Tibet and the human rights activists Hotmail account leading figures of the community. The e-mail service, now known as Microsoft Outlook.
It was not possible to identify the perpetrators of cyber-attacks as a service Microsoft and the US government said. In the context of cyber-attacks on China’s Hotmail users, Microsoft said in a statement claimed the attack was run from a specific country, and to identify key member of the company or the US government has neither.
Since 01 of the victims of such attacks has warned internet giant Google practices. Gradually, Yahoo, Facebook, and Twitter has followed the same path as the means of social communication.