Thursday, 25 August 2016

Famous Bug Buunty Hunters

10 Famous Bug Bounty Hunters of All Times

                                      We don’t like people who point out our mistakes. You must have heard from your elders that pointing out someone else’s mistakes is a very bad habit. In fact, most of us love to do that, our mind is like radar which keeps on checking mistakes of anyone who lies within the range. But again, pointing out mistakes is a bad habit. Do you think it will ever help you in life? No? This article may change your concepts then.Who are bug bounty hunters?

You must be familiar with bounty hunters. These are people who get rewards for capturing people who are fugitives or involved in some or the other illegal activities. So from this name itself, the concept of bug bounty hunters originated. People who can find bugs or errors are bug bounty hunters in IT industry.Their work and its result

Basically, they find out bugs in software or any services, they point out its faults and they also suggest how these can be improved. Good bug bounty hunters are always in good demand and are also paid well. The result of bug bounty hunters hard work is, the company gets rid of vulnerabilities and bugs. Then it launches a new version of the same software or service, which is known as an update.Heroes

So let us take a look at the well-known top 10 bug bounty hunters who have been rocking their charts in IT sector. 

Rafay Baloch
                           Rafay Baloch is from Pakistan and is an independent security researcher. Rafay found a vulnerability in PayPal. The vulnerability was regarding remote code execution. PayPal offered him $10,000 and a job. He also discovered Android Stock Browser Address Bar Spoofing which was useful in Lollipop as well as previous Android versions.


Roy Castillo
                    Roy Castillo participated inbug bounty hunting program. He is the first Filipino to participate in it. His achievements include reporting stored XXS in Gmail for IOS. He also found a bug in Facebook which exposed primary email addresses of their users.

Jason Haddix 
                    Jason has scored really well as a bug bounty hunter. Jason became a Bug bounty hunter in Bugcrowd and became its Director of Technical Operations. Not only this, but Jason also is a notable mobile and web hacker.

Frans Rosen
                   Frans is a superstar in reporting bugs. He stands second in the bug bounty hunters list ofHackerone. He has worked as a security researcher and has reported many bugs. One of the famous bugs reported includes flash-based XSS vulnerability.

Stephane Chazela
                             Stephane is very active inFree Software/Open Source and UNIXcommunities. Stephane discovered the GNU Bourne-Again Shell (Bash) Shellshock Vulnerability. Stephane found Shellshock in Hackerone which also earned him a good reward.

Bitquark
                    Bitquark is very active and keep’s updating his blog which isbitquark.co.uk. Bitquark is very talented in this field and has also topped the list of bug bounty hunter. Bitquark has also received many rewards from ‘Google Sites’ and many other companies in this sector.

Neal Poole
                Neal Poole‘s bug-hunting techniques have always been effective and have proved to produce amazing results. Neal works as a security engineer at Facebook. Neal also works in the Product Security Team. Facebook hired Neal for his bug hunting talent.

A Bailey
            One of the famous bug bounty hunters whose talent was also considered by top news channels such as CNN and BBC. Lab Mouse Security was his start-up. He reported on memory corruption onLZ4 softwarewhich earned him $6000 from Hackerone.

JungHoon Lee
                      Our hero from Korea is an exploit developer. He stood apart and gained recognition at the CanSecWest security conference in 2015. He received$225,000 in Pwn2Ownwhere he exploited browsers like Internet Explorer, Chrome and Firefox.

Mazin Ahmed
                    Mazin found vulnerabilities in Facebook Messenger. He is very active in his personal blog. He got recognition for his research onW3 Total Cache’s Vulnerability.

End Note

So these are some of the famous bug bounty hunters in our list. I have included famous bug bounty hunters only, there are security researchers too who have also performed really well in bug bounty hunting programs.

So now what do you think? Finding mistakes is good or bad?
                                           

Monday, 20 June 2016

8 Cyber Security Tools

With the introduction of newer cyber-security threats every day, it is essential that you keep updating your system by these 8 cyber security tools to protect yourself. Cyber threats are more potent than ever owing to the massive technological advancement witnessed by the world in the contemporary era.

Lucky for you, there are several professional tools available today which will give you a peace of mind while surfing the web. So, keep reading to find out more about such tools.

Microsoft EMET

EMET, basically, employs extra protection at the vulnerabilities of different applications where the chances of intrusion by malicious elements are the most. The hackers have to put in extra efforts in order to bypass that level giving ample time to the users to take notice of such attempts and employing different measures to prevent those. Highly recommended by Yier Jin, Assistant Professor at the University of Central Florida, it is amongst the best security tool amongst the available choices.

Fire Eye malware Detection

It is a great tool for monitoring the extrusion detection closely. The tool is recommended by Randy Marchany, the IT security lab director at Virginia Tech. Quite capable of detecting the extrusions, it is also extremely helpful in monitoring network security. Other tools may be good at detecting the inbound traffic but for complete protection, the outbound traffic also needs to be monitored closely.

Privilege Identity Management

Management of access to different components of your business is another area which requires utmost attention. Thus, the Privilege Identity Management tool will assist you in monitoring administrative privileges of the team seamlessly. The tool is also capable of changing passkeys of critical locations at regular intervals, making the job of cyber-criminals even more difficult. The tool has been recommended by the VP and security analyst at Forrester, Mr. Andras Cser.

Windows GodMode

Ron Woerner, the director of Cyber Security Studies at The Bellevue University, vehemently advocates for the use of this tool to gain reliable access to information. This tool enables access to the OS controls and user information easily through a single folder.

Patch Management

The Patch Management tool might be the most important cyber security tool on this list. As the name suggests, it fixes security patches to any vulnerability present on your device. Not only does it patche the vulnerabilities but it also tests the applied patches, thereby upgrading the overall security and improves the performance and stability of the device. The tool has been recommended by Mr. Gary Hayslip, the Deputy Director and CISO for the City of San Diego.

Insider Threat Protection

You are not as threatened by the ‘outside’ factors as the ‘inside’ factors. Incidences of cyber-breach are on a rise due to the vulnerabilities present inside the system. An Insider Threat Protection tool makes early detection of any vulnerabilities or anomalies and informs them to the management ASAP giving them ample time to resolve the issue.  Mike Pappy, VP, and CISO at Northrop Grumman recommends this tool for proving complete security to your system.

Endpoint Detection and Response

Neil MacDonald, VP, and Analyst at Gardner endorses the use of this tool to prevent the execution of any unauthorized code on your system. The tool is capable of continuously monitoring and analyzing the various threats present on the system and gives warning in case of any unauthorized execution of any code. A great precautionary tools for an average as well as a professional user.

Endnote

Amongst the plethora of choices available, we have brought this comprehensive list of must have any of the 7 cyber security tools recommended by the professionals themselves. Use of such tool will significantly reduce the chances of any hack attacks on your system. One cannot leave any stone unturned if one needs complete peace of mind online. Thus, the readers are advised to give these tools a shot and make their online life a better and safer place.

Monday, 18 April 2016

Career in Cyber security...

Career in Cyber security...!!!

"Giving yourself to others is the most important thing. When you give, you get something in return."
                                      
                                    -Michael Milken

In the early age when computer are invented, no one think that one day these  computers are became the part of life. It's just because in those day the size of computer are big and expensive.And the most typical problem is, only few person (developers) are know ,how to operate this machine. Till 1970 computers are work on machine language ,which are too difficult to learn. After the development of 'C' language (1971 developed by Dennis Ritchie.) a revolutionary change comes in the area of computer. And computer hacking takes born in this age also. The first case of Cyber crime  comes in 1971.

When John Draper discovers the give-away whistle in Cap'n Crunch cereal boxes reproduces a 2600Hz tone. Draper builds a ‘blue box’ that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls. Esquire publishes "Secrets of the Little Blue Box" with instructions for making one. Wire fraud in the US escalates.
A rogue program called the Creeper spreads through early Bulletin Board networks.

Till 1971 to 1990 maximum 20 thousand cyber crime cases registered. In those day, its very difficult to  hack any things. Only few peoples (who has  the deep knowledge of computers) are able to hack system.

Now days Cyber crimes are growing very fast. Every day a new case registered.
Because of this , Cyber security is became a vast area for  career. One of the biggest reason of Cyber crime is ,we are entering in the new world "Digital world " without the good knowledge of this world, crimnals takes advantage of this.

Now days ethical hacker not only provide a security to software company but also they are very important for banking sector. They are provide security in banking transaction. As cyber crime increased ,ethical hacker are became  root of corporate sector.

There are different kind of job available in different companies on the basis of their needs. And company gives a very good package to security expert. There are upto 170 company which are provide a bug bounty program (A program which  legally call the hacker to  search vulnerability in their  company product.)  also reward the hacker who search vulnerability in their product and some times they call the  hacker for job in their company.

High employer demand, fabulous salaries, great promotion prospects – what’s not to love about cyber security? According to data compiled by Burning Glass, postings for cyber security jobs grew 74% from 2007 to 2013 – 2x faster than other IT positions.

According to Forbes cybersecurity market which is expected to grow from $75 billion in 2015 to $170 billion by 2020.

Cybersecurity workers can command an average salary premium of nearly $6,500 per year, or 9% more than other IT workers, according to the Job Market Intelligence: Cybersecurity Jobs 2015 report published by Burning Glass Technologies.

Cyber security jobs........

1:-    Cyber Infosec Officer
2:-    Cryptographer
3:-    Forensic expert
4:-    Incident Responder
5:-    Penetration tester
6:-    Security administrator
7:-    Security analyst
8:-    Security  architect
9:-    Security auditor
10:- Security consultant
11:- Security director
12:- Security engineer
13:- Security manager
14:- Security software developer
15:- Security specialist
16:- Security code auditor
17:- Vulnerability Assessor

The top five IT security salaries, according to the tech job board DICE:

1. Lead software security engineer –    $233,333

2. Chief security officer – $225,000

3. Global information security director -$200,000

4. Chief information security officer –                     $192,500

5. Director of security – $178,333

                             







 


 

Wednesday, 10 February 2016

Introduction of Cyber security!!!

Hi frineds!!!

                       Cyber security
         

Give me six hours to chop down a tree and I will spend the first four sharpening the axe."      
                                    - Abraham Lincoln

With the changing in time ,the way of doing crime are also change.Before the computer revolution ,peoples are stored their essential data and money in their home or any other safe places, and that time , criminal stolen these data and money . They are called thieves or dacus ,You are all know . But after the computer revolution peoples  data and money are at Internet. And now the time thieves are also stolen these thing and they are called cyber criminal or Cracker.  
So before discussing about Cyber security module and strategy for make our self safe from Cyber criminal. We have to know the basic term of Cyber security. As we seen  in above qoute , if we have good understanding of Cyber security ,Cyber Crime and different type of terminology of Cyberspace ,its easy for us to make good understanding of Cyber security module and strategy to safe our self from these kind of crime.

It's a humen tendency , when he knows the advantage/disadvantage of some things, he is ready for do that thing with their full of power ,to achieve/protect themselves from  that thing.

So lets start!!!!!!!...........

    !! Introduction to cyber risks !!

Cyber risks can be divided into three distinct areas:

Cyber crime:-  Conducted by individuals
                         working alone, or in organised groups, intent on extracting money, data or causing disruption, cyber crime can take many forms, including the acquisition of credit/debit card data and intellectual property, and impairing the operations of a website or service.

Cyber war:-       A nation state conducting
                           sabotage and espionage against another nation in order to cause disruption or to extract data. This could involve the use of Advanced Persistent Threats (APTs).

Cyber terror:-      An organisation, working
                             independently of a nation state, conducting terrorist activities through the medium of cyberspace.

'Organisations that have to consider measures against cyber war or cyber terror include governments, those within the critical national infrastructure, and very high-profile institutions. It is unlikely that most organisations will face the threat of cyber war or cyber terror.'

To make our self safe from these kind of thing , We all have to need security. This kind of  security is called by Cyber security.

Cyber security defined as the protection of systems, networks and data in cyberspace is a critical issue for all businesses.

  Why this is important?

:-Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.

                               Thank you.

"Healthcare Data A New Area For Hackers"

     "Healthcare Data A New Area For Hackers" Why the Healthcare data is more valuable than Credit card  or Debit card details...