Search This Blog

Friday, February 13, 2015

Square Calculation upto 125, so easy :)

Just remember squares upto 25.


  • Square of any number from 40 to 60

Check the difference from 50 and add or subtract it from 25 and by the side of this number you have to write the square of that difference in 2 digits only (in case of 1, write 01).

For example: if you have to find square of 43
Difference from 50, i.e. 43 is 7 less than 50. So subtract 7 from 25, and you will get 18 and square of (-7) is 49.

So 43^2 = 1849

If you have to find square of 53,
Difference from 50 is 3, so adding 3 to 25, you will get 28 and square of 3 is 09

So 53^2=2809

  • Square of any number from 26 to 40 and 61 to 75

Here the square of the difference from 50 comes out to be a 3-digit number. So add the hundredth digit of the square to the sum obtained by adding or subtracting from 25.

For example: if you have to find square of 63, the difference from 50 comes out to be 13 and 13^2=169, so you have to add 1(hundredth place digit) to 25+13 and 25+13+1=39.

So 63^2=3969

If you have to find 34^2, the difference from 50 is (-16), 25-16=9 and (-16)^2=256, so we have to add 2 of 256 to 9(25-16), and we get 9+2=11,

So 34^2=1156


  • Square of any number from 90 to 110

Here you have to check the difference from 100 and add or subtract double the difference of that number to 100, and by the side of this number you have to write the square of the difference.

For example: if you have to calculate square of 104, the difference from 100 is 4, 4x2+100, gives me 108, now 4^2=16,

So 104^2=10816

If you have to calculate square of 92, the difference from 100 is;  so 100-2(8)=84, and (-8)^2=64.

So 92^2=8464


  • Square of any number from 76 to 89 and 111 to 125


Here you have to check the difference from 100,and add or subtract that difference with 100 and along with that add the hundredth digit of the square of the difference to that sum and along with that write the unit’s and tenth of the square.

For example: if you have to calculate square of 114, the difference from 100 and 114-100=14 and 14^2=196, so adding double of the 14 and 1(hundredth place of 196) to 100, we get 100+2(14)+1=129 and putting it with 96,

So 114^2=12996

If we have to calculate square of 87, the difference from 100 is (-13), and (-13)^ 2=169, so adding double of (-13) and 1(hundredth place of 169), we get 100+2(-13)+1=75,

So 87^2=7569

Thursday, September 19, 2013

Card Skimming.

Card skimming involves swiping your debit or credit card through a card reader that has been illegitimately set up to record information from your card’s magnetic stripe. After your information has been recorded, it is usually then sold to other scammers on the black market or converted into a counterfeit card and used to make fraudulent purchases. Because it is difficult to know when your card has been skimmed, you may not find out unless you review your financial statements regularly.

How skimming works?

Skimming devices are usually installed on machines like ATMs and handheld pin-pads, but also come as standalone, portable versions that are small enough to fit inside your pocket. One method of skimming involves fraudsters installing a face-plate over the card slot of any machine which accepts debit or credit cards. This is commonly referred to as ATM skimming, but it is also popular with other types of payment processing machines, such as those at gas stations and parking lots.
The face plates installed on these machines usually contain hardware which reads your card’s magnetic stripe before it enters into the original ATM card slot.
Your PIN number is then either observed by a person “shoulder surfing” or by a hidden pinhole camera installed on the machine and pointed at the keypad. This is why it is a good idea to cover your keypad with your hand even when alone at an ATM machine.

Fraudsters don’t need to return to the ATM machine to extract the video and card information because many of these skimming devices also have wireless capabilities. Fraudsters can comfortably and anonymously sit in their car, hundreds of feet away, and retrieve the information via  wireless.

Replacing or Modifying Pin-pads

Fraudsters, sometimes the family members of employees, often approach employees of a retail establishment and bribe them to assist in modifying or replacing an existing pinpad with a counterfeit one and installing cameras to record PIN numbers.
Card information from the pinpads and the video is later retrieved by the dishonest employee and given back to the fraudster. The employee will usually share in the proceeds and receive a lump-sum payment or be paid on a per-card-skimmed basis.
Some retail establishments, such as the office supplier Staples, have used locks on their debit pin-pads to prevent fraudsters or dishonest employees from stealing and replacing them.

Skimming Devices

Because skimming using a handheld device can be extremely easy, many dishonest employees choose to operate alone. All an employee needs to do is wait until your attention is distracted to swipe your card from behind the counter.Skimming devices are readily available on the Internet from websites such as eBay for as little as $50. These devices are usually disguised under the name of a “card reader” because they can also serve legitimate purposes. Skimming at restaurants also happens frequently, especially since customers often leave their credit card for the server to pick up, process, and return a few minutes later. In these cases, a portable card reader is perfect because it is small enough to fit in the server’s pockets or apron.

A server may not even need a portable skimming device. Your credit card information can easily be written down or copied from a receipt.

Protect Yourself from Card Skimming
  • Cover your keypad : Always use your hand and body to cover your keypad when operating a handheld pin-pad or a payment processing machine like an ATM — even when alone. This will prevent shoulder surfers and pinhole cameras from observing your PIN number.
  • Watch your card : If you must hand your debit or credit card to an employee, don’t take your eyes off of it. It only takes a second for your card to be swiped while you look the other way.
  • Pay up front : When eating at restaurants, ask to pay at the terminal instead of giving your credit card to a server for processing.
  • Review your statements : View your bank and card statements on a regular basis. Watch for suspicious charges.
  • Notify someone : If you spot a suspicious pin-pad or payment processing machine, notify someone immediately. If you are using a bank’s ATM and the bank is open, notify the bank manager. Otherwise, notify the local police.

5 Safety Tips for Online Transaction


  1. Always make sure that the card is swiped in your presence. The data in your card's magnetic stripe is recorded when swiped at a machine. This information is then used to make duplicates, a process called skimming and cloning.
  2. Always ensure that the site visited for making payments are secure and begin with https.
  3. Notify your banker immediately on spotting any illegal transaction.
  4. Update your operating system frequently and use branded anti-virus software.
  5. Never click on email links that seek details of your account. It could be phishing emails from fraudsters

Brothers held for credit card fraud

AHMEDABAD: Two brothers have been arrested by the crime branch on the charge of credit card fraud and for siphoning off more than Rs 50 lakh from various private and nationalized banks in the city.
The cyber cell of the crime branch had a tip-off about the brothers - Brijesh and Hemal Patel, both residents of Isanpur. The informer had told crime branch officers that the brothers were using credit cards acquired for fake identities created with the help of duplicate documents.


On getting this tip-off, the crime branch set up a team headed by police sub-inspector Taral Bhatt to keep the brothers under surveillance. "During investigation, we learnt that Brijesh used to work at a private agency which handled documentary verification for loan and account holders of banks," said a crime branch official.
After initial investigation, the police raided the house of the brothers in Isanpur. "We suspected there would be incriminating documents to prove their involvement in this racket," said a police officer.
And as expected, the crime branch team recovered several documents that were used as identity proofs and no less than 54 credit cards and two card swipe machines. When they were brought to the crime branch and interrogated, the brothers revealed their rather unique modus operandi.
They confessed that they had collected several identity proof documents when Brijesh was employed in the document-verification agency. A crime branch official said that though the brothers own a house in Isanpur, they had given it out on rent and then shifted to rented accommodation.
"The rent agreement they drew up with their landlord was used as address proof to apply for credit cards. They frequently changed to different rented houses to get new address proofs and more credit cards. Another fraudulent practice they indulged in was to take out life insurance policies which came with a freebie - credit card of a private bank. They opted for low premium and long-term policies under different names and identities. They also used these insurance policy documents to get new PAN cards which they again used to get credit cards," said a crime branch official.
Posing as entrepreneurs, the brothers then filed an application with the HDFC Bank. They had created fake documents to prove that they owned two firms - Sagar International and Earth Electronics. The bank then issued them two credit card swiping machines.
"The two brothers then started swiping the 54 credit cards in these machines. The cards had a credit limit ranging between Rs 50,000 to Rs 1 lakh. They themselves posed as the purchasers and also the sellers. The money spent by the credit cards ended up in their account. By the time the credit card company could intimate the concerned bank and seek reimbursement from the brothers, they had shifted to another house and changed their identity," the crime branch officer said.
The officer further said that the brothers claimed they had been at this business for the last eight months. "Since this is the initial phase of the investigation, we know of only one instance where the brothers owe Axis Bank Rs 5.75 lakh. We suspect more financial frauds will surface as investigations proceeds," said the officer.

Credit cards found on brothers

AXIS Bank - 20
HDFC Bank - 25
SBI Bank - 07
Kotak Mahindra - 02

Source : TOI

Monday, September 16, 2013

Hacking police websites earns Ohio man three years in jail

John Borell III, a 22-year-old man from Ohio said to be linked to hacker collective Anonymous, was sentenced to three years in federal prison on Thursday for hacking police and other websites and releasing sensitive information.Borell denied involvement in the attacks in April 2012, but the hacktivist pleaded guilty to computer fraud charges one year later and agreed to pay $227,000 for systems that were damaged and in need of improved security.Judge Robert Shelby announced the sentencing at U.S. District Court in Salt Lake City. Utahchiefs.org, a Syracuse police website, a Springfield, Mo. municipal website and a Los Angeles County Police Canine Association website were among the websites that were targeted. Borell wreaked so much havoc on the Salt Lake City police website that it went out of commission for roughly four months, according to the AP, and along the way he was able to access citizen complaints and information on police officers and informants. He did not respond to inquiries regarding his motivations, according to reports.
Borell is said to have operated within an Anonymous splinter group known as CabinCr3w. The Ohio hacktivist communicated with others under the Twitter name @ItsKahuna, and investigating this account was instrumental in authorities tracking Borell down and charging him.

All too common SQL injection attacks are what allowed Borell to access and compromise the targeted websites, according to the indictment unsealed against him in 2012. Five men charged in July used SQL injection attacks to steal roughly 160 million card numbers from major U.S. companies.

Source :  scmagazine.com

Have you got fake mail from RBi, SBI or IT department - Phising Fraud

Phishing is the act of attempting to acquire information such as usernames, passwords, credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communications. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT department are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

Each time the July 31 deadline for filing income-tax returns nears, the hoax about refunds is sent from web sites that are remarkably similar to the official portal. Fake links to Indian and foreign banks are provided and users are told to provide account numbers and passwords.

Another scam involves the impersonation of outgoing Reserve Bank of India governor. An e-mail purportedly sent by RBI offers to transfer $12 million (approximately Rs72 crore) to the receiver's personal account. A Madhya Pradesh resident paid thousands of rupees after hearing that "Subbarao had met United Nations secretary general Ban Ki-moon to release funds". 
 RBI spokesperson Alpana Killawala said they had been running a multi-pronged awareness campaign to alert people to this fraud. "We have messages scrolling on our website www.rbi.org.in and are running four spots on FM radio. We have also inserted advertisements in 13 languages in 800 newspapers," she said.

The unemployed youth is still trying to get back on his feet, interestingly, seeking a job with the banking sector. The criminal probably continues to operate the fake account. Jiten Shah from Borivli received an email from the 'Office of the permanent secretary for non residential taxation on international lottery award of the British Ministry of Finance, United Kigdom (sic)'. The letter offered him 500,000 pounds after he "cooperated" by paying 80 pounds as service charge. He trashed it right away.
 
What to do* Fake online lotteries, windfalls and job offers are part of the spam network and should not be taken seriously

* Do not open dubious links for they could steal stored information from your computer

* Do not respond by divulging personal information, bank account numbers or passwords

* Never transfer money to them

* Reserve Bank of India does not seek account details from individuals

Where to complain
* The income-tax authorities and the apex bank advise victims to approach the local police or cyber crime cell and file a complaint.
 

Cyber Security

Cyber-security is the technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber-security. According to a December 2010 analysis of U.S. spending plans, the federal government has allotted over $13 billion annually to cyber-security over the next five years.

Ensuring cyber-security requires coordinated efforts throughout an information system. Elements of cyber-security include:

  1. Application security
  2. Information security
  3. Network security
  4. Disaster recovery / business continuity planning
  5. End-user education
One of the most problematic elements of security is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. Adam Vincent, CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defense Department organizations), describes the problem:

"The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no longer possible to write a large white paper about the risk to a particular system. You would be rewriting the white paper constantly..."

To deal with the current environment, advisory organizations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology (NIST), for example, recently issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments.