Tuesday 4 October 2011

HOW TO ACT SMARTLY IN AN CRITICAL SITUATION





  1.bmp
2.bmp
3.bmp
4.bmp
5.bmp
6.bmp
7.bmp

   
VERY IMPORTANT AND INTERESTING
 
 
 
 
 
Read carefully
 
 
 
WHEN A THIEF FORCES YOU TO TAKE MONEY FROM THE ATM, DO NOT ARGUE OR RESIST,
 
YOU MIGHT NOT KNOW WHAT HE OR SHE MIGHT DO TO YOU.   WHAT YOU SHOULD DO IS TO
 
PUNCH YOUR PIN IN THE REVERSE, I..E IF YOUR PIN IS 1254, YOU PUNCH 4521.  
 
 
THE MOMENT YOU PUNCH IN THE REVERSE, THE MONEY WILL COME OUT BUT WILL BE
 
STUCK INTO THE MACHINE HALF WAY OUT AND IT WILL ALERT THE POLICE WITHOUT THE NOTICE OF THE THIEF.
EVERY ATM HAS IT; IT IS SPECIALLY MADE TO SIGNIFY DANGER AND HELP. NOT
 EVERYONE IS AWARE OF THIS.
  

Monday 8 August 2011

Smartphones: Hackers' new target

 Hackers are out to stymie your smartphone. 



Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system

The application not only logs details about incoming and outgoing phone calls, it also records those calls. 

That came a month after researchers discovered a security hole in Apple Inc's iPhones, which prompted the German government to warn Apple about the urgency of the threat. 
Security experts say attacks on smartphones are growing fast - and attackers are becoming smarter about developing new techniques. 

"We're in the experimental stage of mobile malware where the bad guys are starting to develop their business models," said Kevin Mahaffey, co-founder of Lookout Inc, a San Francisco-based maker of mobile security software. 

Wrong-doers have infected PCs with malicious software, or malware, for decades. Now, they are fast moving to smartphones as the devices become a vital part of everyday life. 

Some 38 per cent of American adults now own an iPhone, BlackBerry or other mobile phone that runs the Android, Windows or WebOS operating systems, according to data from Nielsen. That's up from just 6 per cent who owned a smartphone in 2007 when the iPhone was released and catalyzed the industry. The smartphone's usefulness, allowing people to organize their digital lives with one device, is also its allure to criminals. 

All at once, smartphones have become wallets, email lockboxes, photo albums and Rolodexes. And because owners are directly billed for services bought with smartphones, they open up new angles for financial attacks. 


The worst programs cause a phone to rack up unwanted service charges, record calls, intercept text messages and even dump emails, photos and other private content directly onto criminals' servers. Evidence of this hacker invasion is starting to emerge. 

- Lookout says it now detects thousands of attempted infections each day on mobile phones running its security software. In January, there were just a few hundred detections a day. The number of detections is nearly doubling every few months. As many as 1 million people were hit by mobile malware in the first half of 2011.


Google Inc. has removed about 100 malicious applications from its Android Market app store. One particularly harmful app was downloaded more than 260,000 times before it was removed. Android is the world's most popular smartphone operating software with more than 135 million users worldwide.