Posts

Scam Investigation: Fraud Bank Text Message

Image
Figure 1 Alluring the victims with the fake monetary honeypot is the infamous way of Phishing. I am sure that most of you have already encountered the messages and E-mails as shown in the screenshot (Figure 1). Human error is the major factor behind the success of these fraudulent efforts. The fire of Digital era and lack of security awareness simultaneously contributes to the success of digital scams. As per the Verizon Data Breach Investigations Report, 70% of cyber attacks use a combination of phishing and hacking.  For a common person, it's difficult to differentiate between genuine and fake messages when appropriate levels of  Social Engineering is done by scammers. Through a Fake message investigation (You can also see the complete investigation video on my channel CodewithVamp ), I will try to explain what can happen if you try to open any of the links sent along with messages or Emails . I would like to highlight one point here, I never encourage anyone to open any links f

We may live in a Space Opera Universe without realizing the pattern !!

Image
Have you ever felt like pulling your hair while thinking about things for which there is no scientific explanation proposed yet? For example, Are humans the only superior living being, your life before birth and after death, the existence of God, the population of the world is 7.8 billion yet everyone is different, our creator, the purpose of life on earth, etc? We often think about these things but give up eventually or may divert ourselves with some meaningless reasoning. What if we are only looking at one side of the coin or maybe a cube? What if we are living in Space opera and things around us are made in such a way that we can’t realize the pattern? Considering the fact that there are billions of stars out there in the universe and we are just a tiny part of the cluster, we can go beyond our reasoning and include other possibilities. As Murphy once said  “whatever can happen, will happen” there is a high possibility that people like us, probably more superior beings, are already

Exploit Google with Dorking

Image
In simple words, if I have to define Dorking, I would say it is just a vulnerability of Google search engine which can be exploited and transformed into a threat. You will be amused to know that this exploitation doesn’t even require any high-tech security tools. I know it can be hard to digest the fact that one of the most sophisticated search engines can also be exploited so easily! The most surprising thing is, Dorking has been documented in the early 2000s and now we are in 2021, still, it is active. If I say that Dorking cannot be eliminated, Unfortunately, I would be true, because this vulnerability itself is one of the most prominent features of the Google search engine.  Now let us dive deeply to understand what Google Dorking is and its impact. In technical terms, Google Dorking means using some combination of operators or query or specific keywords to perform “advanced search” to dig up the information which may be present on the web but not intended for public viewing.  This

6 Signs You Are A Victim of “UPI Fraud”

Image
The rush for Digital transactions has also given rise to the fire of Digital frauds and scams, especially in the case of UPI (Unified Payment Interface). When it comes to the cashless economy, It’s no surprise that UPI has gained its popularity as the most favored payment platform of the current era. With one click, UPI PIN and no hassle of typing card details, one can do the transaction in a fraction of seconds through well-known applications like Google Pay, PhonePe, BHIM, etc. The ease-to-use concept always comes with a trade-off as a security loophole. New strategy and gambit being used by scammers for looting money digitally under the umbrella of UPI. One point to highlight here is UPI itself is very secure when it comes to digital transactions therefore the Scammer's main target is to attack and deceive the mindset of users, infamously known as Social Engineering. So, What are the 6 major signs to identify UPI fraud? 1- Fraudsters may ask for UPI PIN/OTP directly or indirec