Author -

How to bypass Android’s lock screen pattern, PIN or password

How to bypass Android’s lock screen pattern, PIN or password

The main reason to set up some sort of lock screen security on your smartphone is to keep strangers (or friends) from checking out your messages or private pictures. Beyond that, you don’t want anyone who dares to steal your phone to get full access to your mails, pictures or other sensitive data. But what if you’re the one who cannot access your phone? You could forget your PIN or pattern, right? Or someone pranks you by setting up a lock screen pattern and just leaves you struggling with it.

In any case, there’s quite an easy solution to this without smashing your phone against a wall (or your friend’s face). The only thing you need is to have Android Device Manager enabled on your device (before you locked yourself out of your phone). If you have a Samsung phone, you can also unlock your phone using your Samsung account.
Forgot your Android lock screen pattern, PIN or password? Here’s what to do
I tested the following methods using a lock screen pattern, PIN and password and was able to unlock my LG G2 with Android 4.4.2 successfully.

Unlock your Android device using Android Device Manager (ADM)
As already mentioned, the following method only applies to devices that have Android Device Manager enabled.
1.    On a computer or other mobile phone, visit:
2.    Sign in using your Google login details that you also used on your locked phone.
3.    In the ADM interface, select the device you need to unlock (if it isn’t already selected).
4.    Select ‘Lock’
5.    In the appearing window, enter a temporary password. You don’t have to enter a recovery message. Now click ‘Lock’ again.
6.    If it was successful, you should see a confirmation below the box with the buttons Ring, Lock and Erase.
7.    On your phone you should now see a password field in which you should enter the temporary password. This should unlock your phone.
8.    Now, before you go on with your life, go to your phone’s lock screen settings and disable the temporary password.
9.    That’s it!

Unlock your Android lock screen pattern with your Google Login (only Android 4.4 and below)
If you haven’t updated your firmware to Android Lollipop (5.0), then there’s a faster way to unlock a lock screen pattern.

1.    Enter a wrong lock screen pattern five times (shouldn’t be hard if you don’t remember the correct one)
2.    Select ‘Forgot Pattern’
3.    Now you should be able to enter a backup PIN or your Google account login.
4.    Enter either your backup PIN or your Google login.
5.    Your phone should now be unlocked.

Bypass your Samsung phone’s lock screen using its Find My Mobile tool
This is an easy way to unlock your Samsung device if you created a Samsung account and registered it beforehand.

1.    Go to Samsung Find My Mobile.
2.    Sign in using your Samsung login details.
3.    In the Find My Mobile account interface you should see your registered phone on the left hand side. This tells you that you’re phone is registered to that account.
4.    On the left sidebar, select ‘Unlock my screen’.
5.    Now select ‘Unlock’ and wait for a few seconds for the process to finish.
6.    You should get a notification window telling you that your screen is unlocked.
7.    That’s it. Your phone should be unlocked.


Disable your lock screen using custom recovery and “Pattern Password Disable” (SD card needed)
This method is for more advanced Android users that know what the terms “rooting” and “custom recovery” mean. As the title says, for this to work you need any kind of custom recovery installed and your phone must have an SD card slot. Why the SD card? Well, we need to transfer a ZIP file to your phone and that’s usually not possible when it’s locked. The only way is to insert an SD card with the file.Unfortunately, card slots became kind of a rare thing in the smartphone world, so this will only work for some people.
Here’s what you need to do:
1.    Download the Pattern Password Disable ZIP file on your computer and put it on an SD card.
2.    Insert the SD card into your phone.
3.    Reboot your phone into recovery.
4.    Flash the ZIP file on your SD card.
5.    Reboot.
6.    Your phone should boot up without a locked screen. Should there be a password or gesture lock screen, don’t panic. Just type in a random password or gesture and your phone should unlock.

Erase your phone (and lock screen) using Android Device Manager
If all the methods above didn’t work out, you need to move on to more drastic measures. In case Android Device Manager is enabled on your phone and unlocking it didn’t work, you can use it to erase all data by selecting the Erase button. Be aware that this will delete all apps, settings and other data on your phone. The good thing is, once the erasing process is done, you can use your phone again (after setting everything up).

Reset your phone to factory settings
If Android Device Manager doesn’t work at all for you, your last resort is to make a factory reset on your device. On Nexus devices, this can be done in recovery mode, for example. Below, we take you through the reset process that work with Nexus devices. If you own a different Android phone, check out this site and look for your manufacturer’s support page.

How to perform a factory reset on your Nexus using recovery mode:
Important note: If your Nexus device is running Android 5.1 or higher, you’re required to enter a Google username and password associated with your device after the factory reset process finishes. This is a security measure to make sure that no stranger is reseting your phone or tablet. If you fail to enter that data, the phone won’t be usable anymore. Really make sure you know your Googel username and password.
No matter what version of Android you’re running, you need to have an internet connection and if you just changed your Google account password, you need to wait at least 72 hours before starting the reset process.
1.    Turn off your device.
2.    Press the volume down AND power button and keep pressing them. Your device will start up and boot into the bootloader (you should see “Start” and an Android lying on its back).
3.    Press the volume down button to go through the different options until you see “Recovery Mode” (pressing volume down twice). Now press the power button to enter recovery mode.
4.    You should see an Android on its back and a red exclamation mark.
5.    Press and hold the power button, then press and release the volume up button. Now you should see “Android Recovery” written on the top together with some options.
6.    By pressing the volume down button, go down the options until “Wipe data/factory reset” is selected. Press the power button to select this option.
7.    Using the volume down button again, go down until “Yes – erase all user data” is selected. Make sure you read through the notes above and then, finally, press the power button to start the reset process.
8.    Once the process is done, press the power button to select the reboot option. Your device will now reboot and start the inital setup process of your device. That’s it! All you need to do now is to set up everything and restore your data.
You can also check out Google’s official page and follow the instructions there.

As already mentioned earlier, be aware that reseting or erasing your device will delete all data like apps, settings, videos and pictures.


How to Track and (Potentially) Recover Your Stolen Laptop or Android with Prey


Laptops are lighter and more powerful than ever; they're also easier to steal. Luckily, a genuinely versatile and powerful track-and-recover application is also free. Here's how Prey works, and how it could save you a month's rent in new laptop cost.

Why Prey?
There are obvious reasons to like Prey. Chief among them, it's free to use for up to three devices of any kind, from computers running Windows, Mac, or Linux to Android devices. But that wouldn't mean anything if the tracking Prey provided wasn't really solid. It's not fool-proof, especially if the thief wants to entirely wipe your computer or phone, but if that's not the case, it gives you a fighting chance.

On a laptop with a webcam, a Wi-Fi chip, and Prey installed, it's a good bet you'll have a photo of your thief and an approximate location on them just as soon as they have your computer running for a few minutes. You don't have to actively search, either—devices with Prey installed in the background "phone home" to your web-based account every 20 minutes by default (you can decrease this interval), spilling their guts about everything they're doing.

Webcam snaps, desktop screenshots, lists of modified files and running programs, network data galore, and much more are provided to those who want to quietly track their, uh, prey. If you'd prefer to think that maybe someone just found your device, you can set read-aloud alerts, fire off alarms, change the system wallpaper, lock it with a password, and remotely wipe out your browser data—all from any browser you can get to.
The basics of installing and using Prey are covered in the video, but here's a brief run-through:

Step One: Set It and Forget It
Head to Prey's download section, grab the package for your system (again, Prey supports Windows, Mac, Linux, and Android), then install it as normal, creating an account as you do so. The only major issue to address is how you want to control your system and track it if it goes missing. Most people will want to stick with the default, web-based standard method, but those who would prefer an email-based, server-controlled tracking setup can explore an "Advanced" option. I'm focusing on the default Prey + Control Panel setup.
Because it's tracking software that doesn't want to be seen, Prey is almost invisible when it's running on your system, without any configuration or executable files to be seen. In fact, once you've deleted the installer, you shouldn't be able to find Prey at all in your system, because that's the idea. It quietly and quickly checks in with Prey's servers in the background, at an interval you decide, to see if the owner has logged in and marked it as stolen. That's all it does—until you flip the switch on Prey's servers to note that it is, in fact, stolen, or ask for an update on the hardware profile.
After you've installed Prey and set your defaults, log into Prey's web center, and peek at the basic configuration tools. You can give each of your devices a unique name, clarify its details, and change the frequency of its reporting time. You can set the frequency to a reasonable 20 or 30 minutes now, but don't worry—you can update it as soon as your device is swiped, so you won't be wasting those precious early minutes wondering what's up.
Step Two: Set Your Modules
The Modules menu on Prey's site determines what happens when your device checks in and notices that it's stolen (if only computers could recognize their strange meta-existence). There are two types of modules: the quiet, informative "Report" modules, and the more aggressive "Action" modules that secure your data, and likely let the thief or finder know that you know your stuff is missing—and that you've got a way to track it.
Report Modules: In general, you'll want to switch all these on. You never know what might come in handy, and it's not too much more effort for Prey to grab any one item more than the others. You can set limits on how much raw modified data and running program information is thrown your way, but the defaults are fine, if voluminous. The most important module to turn on is Geo, which uses Google's Wi-FI location API to try and triangulate a laptop's location—or the GPS chip in an Android for very accurate positioning.
The main exception would be the "Webcam" option. If your laptop has a webcam that must activate a very distinct light or LED before snapping a picture, it could be an obvious give-away and tip your hand. MacBooks, for example, turn on a green LED when grabbing images from the webcam. If you wanted to go stealth and not let the unlawful owner know you had them, you could shut this off—but you'd likely be better off trying to grab at least one picture of the thief unawares. (He or she may not be perceptive or paranoid enough to catch what's going on.)
Alarm modules: When subtle won't work, Alarm Modules provide you with your next best chance of alerting the thief, the person who bought stolen goods from the thief, and potentially anyone near them, that your laptop is your laptop. Failing that, some alarm modules can at least wipe out any potentially revealing information about you.
Alarm, Alert, Change Wallpaper, and the password-protected Lock are pretty self-explanatory. Our volunteer "thief" Whitson reported that the alarm is, in fact, quite loud and attention-getting, and that the pop-up alert comes up over anything else you may be doing.
The "Secure" module is where you make your big security decisions. You can set Prey to wipe out your entire password keychain, delete data from Firefox, Safari, or Chrome (sorry, Opera users), or wipe down Outlook or Thunderbird. A total account wipe-out would be a nice option, of course, but there's likely a compromise between making Prey still active and having data deletion access.
Android SIM Protection
Android phones set up with Prey actually have fewer reporting and alarm modules than laptops, but they do have one unique feature: SIM card protection. If a thief attempts to swap out the SIM card in your phone, the new SIM number is captured and text-messaged to a contact you set up in the Prey options. With that kind of data and a police contact, you're pretty close to tracking down your phone.

Step Three: Using Your Reports
So you've registered Prey on your laptops and Androids, and if it gets stolen, you'll get an email announcing a new report is drawn up every X minutes. Now what?
First things first, report your laptop or device stolen to the police. The cynical may assume they don't care or don't have the know-how to track your gear, but the cynical often aren't shielded members of a law enforcement agency. Give the police everything you have on your device, including serial numbers, identifying stickers or characteristics, and the last place you knew you had it. It never hurts. When using the similar "Find my iPhone" feature of the MobileMe service, police in Madison, Wisc. were able to track down two iPhones stolen from a store. Your mileage will vary, but it's best to head through official channels first.

If you're on your own, you can hope that the thief or other person toting your laptop makes a regular run of certain Wi-Fi spots. You'll have the IP address they're connecting outward from, the name and details of the Wi-Fi spot they're connecting to, and a list of the programs they're running, connections they're making, and other details. Your best hope is that geo-location through available Wi-Fi can point you somewhere unique in an uncrowded neighborhood, or that the Wi-Fi they connect to is unique and identifiable. If your webcam can grab a clear snap of the thief, all the better. If you've got nothing quite so unique and helpful, a visit to the traceroute and other tools at (or nearly any site resulting from a "traceroute" Google search) can potentially get you closer to your missing goods.

NOTE: Reporting to a the Police at first is usually advisable.


Is the Chinese conspiring against the United States?


Former U.S. National Security Agency contractor Edward Snowden was able to provide documents to the German weekly magazine, Der Spiegel revealing a stunning secret. These documents were confirmation that Chinese hackers were able to seize top secret data concerning the F-35 Lightning II, a joint strike fighter jet. Additional information states that the breach had taken place all the way back in 2007. However, as of right now, a government official belonging to the United States has said that all information belonging to F-35 remains secure.

According to sources, F-35 Lightning II happens to be the most advanced fighter that is currently in production. Experts who are close to the subject of aerial warfare have stated that China’s latest stealth fighter, the J-31, and J-20 fighter jet are variants that were inspired by F-35. This could mean that the Chinese took intricate details from the fighter jet and implemented them on their own fighter jets. According to AVIC Chairman, Lin Zuomin, he had this to say about J-31 if it ever met F-35 in an open air fight:

“The J-31 will finish it off in the sky.”

According to the Snowden files, there are several details that outline the scope of Chinese F-35 espionage efforts. These ranged from acquiring the radar design of the fighter jet, as well as detailed engine schematics. These schematics would most likely enable the Chinese to build a fighter whose speed matched that of F-35 and they could also replicate the cooling system of the engine, to prevent it from overheating even when it was stressed to its limits.

The leaked documents from Snowden also reveal that several terabytes of data related to F-35 joint strike fighter program were stolen, meaning that if the Chinese were actually responsible for the hack, they had sufficient information on their hands to build a fighter jet of their own in order to match the prowess of F-35.

The Chinese government has denied any involvement in these attacks as Chinese Foreign Ministry spokesman, Hong Lei stated the following:

“The allegations are totally groundless and unproven. We, on the other hand, do have documents that show a certain country has a dishonorable record on cyber security.”

If the Chinese are actually responsible for the hack, what is their ulterior motive? To conspire against the United States? Looks like when more Snowden documents are revealed, we will get to know sooner or later.

First Step to Effective Security – How to Know if You’ve Been Hacked

The online world is becoming scarier each day and the possibility of getting hacked gets increased each time you sign into your online accounts. It’s possible that you haven’t been hacked yet, but you must ensure to follow secure practices to remain safe in the future.

News of new data breaches and password thefts are as common as any other development around you. These attacks occur via various means- either through a malicious email, or a flaw in your computer’s operating system. Even the White House and Pentagon aren’t immune to hackers.

There have been about 5,593 data breaches since the year 2005 and this number is rising exponentially. These breaches have exposed about 800.3 million individual records alone in the United States.

These data breaches are a big risk that ask you to be prepared and follow secure practices.

The Identity Theft Resource Center defines data breach as an “incident in which an individual name plus a Social Security number, driver’s license number, medical record or financial record (credit/debit cards included) is potentially put at risk because of exposure.”

So, what do I lose in a data breach?

Usually, it’s just your basic information like name and email addresses. By collecting this basic information and connecting the dots, an expert hacker can gain tons of other sensitive information to hurt you in various ways.

As written in the Forrester report, Planning for Failure, “even enterprises with the most mature security organizations and advanced security controls can’t prevent every single breach — especially if your opponent has the time and financial backing to target you.”

The situation is getting worse with time and keeping your data safe from the reach of the prying eyes must be your top priority.

But, how to know if you’ve been hacked?

With the increase in hacking attacks, a number of sites have opened up that give you alerts when data breaches take place. One of the best places to get these announcements is the mailing hosted at the Identity Theft Resource Center. It sends regular emails with the weekly data breach information in your inbox. is another website that allows you to check if hackers have compromised your personal information. The website also tells you the reason and incident when your email address was breached.

How to Find Your Lost or Stolen Laptop?

Having your laptop stolen is the biggest nightmare anyone can face in the era of our gadget-centric lives. Here are some ways that can help you get back your valuable laptop in case of any theft.

Electronic devices, especially laptops, have become an essential part of our lives rather than a luxury product, that they were considered in the past. Only a mere thought of losing your precious device will give you goose bumps, but what if it really vanishes from your vicinity – thanks to the guy who has the courage to do that magical act.

Jokes apart, in this article we have added some ways that can be used to find your stolen laptop in case of any theft.

Trace your Laptop’s IP address:

The magician who vanished your precious laptop might have the courage to peek into your business. There are great chances, that the person who took your laptop may check your mail account or other services. These services do provide tracking feature that can help you, trace the location and IP address of your device. You can get the device location of your stolen laptop if you use these services:


Just open your Gmail account and move to the bottom of the page. Here you will find “Last Account Activity” written in the bottom left corner of the page. Click “Details” link right below it. A new window will open containing a list of all the recent Gmail sessions of your account, providing IP address and location of the sessions. You can click “Sign Out Of All Other Web Sessions” to protect your Gmail account from further trespassing.


The social networking giant has also provided a feature to track your account activity.

Open “Settings” in your Facebook account and then click “Security” option. You’ll find an option called “Where You’re Logged In”, just click that, and you’ll be presented with details of your Facebook sessions. To know the IP address of any session, just hover on the location name, and it will display the IP address of that session. You can click “End Activity” to log out that particular session or you can click “End All Activity” to log out of all your active Facebook session on any other device.


Dropbox also provides a session tracking feature. Just sign-in to you Dropbox account and click your name, a drop down menu will appear. Then click on “Settings” option. Click on Security tab, here you’ll find the list of all your active and past sessions. Just hover on the “i” right next to the country name to know the approximate location and similarly, click the “i” next to time (under Most Recent Activity) to know the IP address and time of the session.

Just note down the IP address and location from any of the above sources and contact the police for further assistance.

Prevention is better than cure:

It would be wise enough to be well prepared for such mishaps well in advance. Prey Inc. has come up with an efficient tool that can help you track your device very easily in case of any theft or lost. Though this platform is available for various operating systems like Windows, Mac, Android, and Linux, but we have tested Prey only for the Widows OS.

Here are the steps you need to follow in order to setup Prey:

  1. Go to
  2. Click Sign-in and setup your Prey account.
  3. After that, Sign-in to your Prey account and look for a green plus button right next to Your Devices.

Choose your preferred operating system and Prey will start downloading the appropriate application to your device.

  2. Install the application by clicking the usual next, next, next. It’ll take few minutes to install.
  3. At the end of installation, keep the Set-up Prey check box ticked and click Finish.
  4. A new window will open. Click Existing User option, as you have already created your Prey account.
  5. Enter your login credentials and click Connect, a popup will appear, ”Sweet! Your Computer is now protected by Prey. Try it out or protect an additional device, please visit”.
  6. Click OK and you’re done.
  7. You can track your device online by simply logging into your Prey account in any web browser.
  8. If you lose your device, just log-in to your account and click your lost device in Your Devices section. Then click Set Device To Missing.
  9. A box will appear, set the Report Frequency as per your convenience. Click Advanced Options to find more options. Here you can select, if you want to take snapshots of the person using the device via webcam. Using the snapshot feature may alert the person using the laptop as the webcam LED will blink after regular intervals, creating a suspicious environment for that person.
  10. You can track your device online by simply logging into your Prey account in any web browser.
  11. If you lose your device, just log-in to your account and click your lost device in Your Devices section. Then click Set Device To Missing.
  12. A box will appear, set the Report Frequency as per your convenience. Click Advanced Options to find more options. Here you can select, if you want to take snapshots of the person using the device via webcam. Using the snapshot feature may alert the person using the laptop as the webcam LED will blink after regular intervals, creating a suspicious environment for that person.


  1. You can track your device online by simply logging into your Prey account in any web browser.
  2. If you lose your device, just log-in to your account and click your lost device in Your Devices section. Then click Set Device To Missing.
  3. A box will appear, set the Report Frequency as per your convenience. Click Advanced Options to find more options. Here you can select, if you want to take snapshots of the person using the device via webcam. Using the snapshot feature may alert the person using the laptop as the webcam LED will blink after regular intervals, creating a suspicious environment for that person.


  1. option.
  2. Whenever you need to know the current status of your device just click the Maps and Action option in the device section.
  3. When you find your device, just Set Device To Recovered and prey will stop the live tracking of your device.

Prey allows you to lock the device remotely, play alarm, send message in case any humble person may return your laptop, if you have forgotten it somewhere. The only disadvantage of this service is that your laptop must be connected to the internet, and for that, “May the Force be with You”. You can add up to three devices in the free option. To add more devices, you’ll have to purchase their plans.

In case of any theft, it is highly recommended to change your passwords for all the online services that you use to protect your valuable data and privacy.

Keeping your laptop safe is a must in this technology driven world. You can protect your laptop by using these simple methods and it will save your valuable memories that you have collected all over your life. Apart from using these methods, you should always set a password to all of your devices, this will protect your data in case of any theft or if you might forget it somewhere.



Hackers Are Using This Malware to Make ATMs Vomit Cash

Security firm Proofpoint has noticed some instances of a new ATM malware called GreenDispenser. Hackers can empty the whole ATM machine without leaving any trace as the malware uses a deep delete process to erase itself.

A new type of ATM malware has been detected by security researchers in Mexico. The malware enabled the cybercriminals to take the complete control of the cash dispensing machines.

The security firm Proofpoint has reported that it has noticed some instances of a malware called GreenDispenser that gives a fake error message that reads, “we regret this ATM is temporary of service”. So far the attacks have been centred on Mexico, but the researchers think that it could be easily implemented anywhere in the world.

This ATM malware leaves no trace of its activities as it uses a deep delete process that helps hackers to erase all the tracks of crime.

As the ATMs show the error message, only the hacker can bypass this error and empty all the cash. This malware uses two-factor authentication that could be bypassed using a pin code that has been earlier hard-coded into the system. After this, the hacker uses the smartphone to scan the OR code that is seen on the ATM screen.

This malware is suspected to be an insider’s job as it required physical access to the ATM.

Kevin Epstein, vice president of threat operations for Proofpoint, said, “ATM malware such as GreenDispenser is particularly alarming because it allows cyber criminals to attack financial institutions directly, without the extra steps required to capture credit and debit card information from consumers – and with correspondingly less traceability.”

The GreenDispense ATM malware has a self-destruct mechanism. So, it only works till a certain date and then disappears.

In recent years, ATM malware instances are on the rise. To keep themselves safe from such attacks, financial institutions must re-examine their security layers and consider modern security methods to counter these threats.

Have something to add? Tell us in the comments below.


What Is the Difference: Viruses, Worms, Ransomware, Trojans, Bots, Malware, Spyware etc?

If you’re a regular or even an occasional computer user, then you might’ve heard the terms like Viruses, Worms, Trojans, Bots, Malware, Spyware, etc. But honestly speaking, we consider all these to be a Virus, no matter, whatever be their type. But have you ever tried to acknowledge, what is the difference between these terms, although they are meant to harm your device, steal your data or spy on you, have you ever thought why they are named so differently. Basically, terms like Viruses, Trojans are all types of malicious software or simply ‘Malware’.

Now, the first and foremost question arises, where did these terms came from?

Clearly, they are not some out of the world aliens, in fact the real truth is that they were not even created with an intention to harm someone.

The history of malware attacks goes back to 1949, when John von Neumann, first developed the theoretical base for self-duplicating automation programs, but the technical implementation was not feasible at that time. The term ‘Computer Virus’ was first used by Professor Leonard M. Adleman in 1981, while in conversation with Fred Cohen.

The first computer virus named ‘Brain’ was coded by two brothers Basit Farooq Alvi and Amjad Farooq Alvi, who were from Lahore, Pakistan. Brain was meant to infect storage media based on MS-DOS FAT file systems. It was originally designed to infect the IBM PC, it replaced the boot sector of its floppy disk with the virus. The virus program changed the disk label to ©Brain and the defected boot sectors displayed this message:

Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today – Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages….$#@%$@!!

However, as you may presume, there was no evil intention behind this. Alvi brothers said in their interview with TIME magazine, they created the virus only to protect their medical software from piracy, aimed at copyright infringement acts.

Coming back to Malware, these are malicious software designed to harm a computer which may or may not be connected to a network. Malware only get in to action when there is a computer involved in the game otherwise the term Malware is of no use.

Malware are of the following types:

Worms: These programs have the ability to replicate themselves. Their sole objective is to increase their population and transfer themselves to another computers via the internet or through storage media, all the work is done like a top secret mission hiding their movement from the user. They don’t cause any harm to the computer, their replicating nature consumes hard drive space, thus slow down the machine. Some of the notable worms are, SQL Blaster which slowed the internet for a small period of time, Code Red took down almost 359,000 websites.

Viruses: They also have the ability to replicate themselves, but they do damage files on the computer they attack. Their main weakness lies in the fact, they can get into action only if they have the support of a host program, otherwise they’re just like a defeated warrior. They stick themselves to songs, videos, and executable files and travel all over the internet. W32.Sfc!mod, ABAP.Rivpas.A, Accept.3773 are some of the examples of Virus programs.

The Virus Gang:

File Viruses
Macro Viruses
Master Boot Record Viruses
Boot sector Viruses
Multi-Partite Viruses
Polymorphic Viruses
Stealth Viruses

Feel free to Google anyone of them if you like.

Trojans: Basically, Trojans are no Viruses, and are not meant to damage or delete files on your system. Their sole task is to provide to a backdoor gateway for malicious programs or malevolent users to enter your system and steal your valuable data without your knowledge and permission. JS.Debeski.Trojan is an example of Trojan.

They are named after the ‘Trojan Horse’ tale, in which Greeks entered the city of Troy with the help of a wooden horse which was meant to be a gift, but turned out to be a sweet poison, as depicted in the movie Troy.

The Trojan Gang:

Remote Access Trojans
Data Sending Trojans
Destructive Trojans
Proxy Trojans
FTP Trojans
Security Software Disabler Trojans
Denial-Of-Service Attack Trojans

Feel free to Google anyone of them if you like.

Adware: Adware are used to display advertisements in the programs. They generally come attached with software programs that are free to use as they are the only source of revenue for the developers of those software programs. Adware can’t be completely called as Malware as they have no intention to harm your machine, they only track what advertisements you’re more interested in, so as to display the relevant advertisements on your screens.

Spyware: These programs also come attached with other freeware software, track your browsing and other personal details and send it to a remote user. They can also facilitate installation of unwanted software from the internet. Unlike Adware, they work as a standalone program and do their operations silently.

Spam: You get very irritated when you receive unwanted emails from unknown senders, these are called Spams or junk mails. And the process of flooding the internet with the same message is called Spamming, is done for the purpose of commercial advertising. These junk mails may sometimes contain Viruses or Trojans that enter your system as soon as you open the mail.

Bots: Bots or Robots are automated processes that are designed to interact over the internet without the need of human interaction. They can be used for good and bad intentions. An evil minded person can create a malicious Bot that is capable of infecting the host on its own. After transmitting itself to the host device, a Bot creates a connection with central servers which act as the command centers for the infected hosts attached to that network, called Botnet.

Their skills include stealing passwords, logging keystrokes, analyzing network traffic, relay spam, launch DoS (Denial of Service) attacks and open back doors on infected hosts. These Bots can be seen as the advanced form of Worms, their infection rate and tactic is more effective than those of Worms. These malicious Bots are created after a lot of hard work done by their malignant creators.

Ransomware: These type of malware alter the normal operation of your machine, thus barring you to use it properly. Thereafter, these programs display warning messages asking for money to get your device back to normal working condition.

After reading all this, you might be thinking why people create Malware. Here are some reasons which may compel a coder to write malware codes:

  • Take control of a person’s computer for personal or professional reasons.
  • To get financial benefits.
  • To steel confidential data.
  • To prove their point regarding a security breach can be done on a system.
  • To take down an individual computer or a complete network.

and many more….

How can you protect your Computer :

  • Keep your system up to date.
  • Use genuine software.
  • Install an antivirus software and update it regularly.
  • Set-up a firewall, may it be custom as provided by antivirus software. Windows has an in-built firewall option in case you don’t want to use a custom firewall.
  • Never open unknown emails that generally reside in your Spam folder.
  • Never open unknown links, use online website safety checker tools if you’re not sure to open a website.

By taking these simple measures, you can effectively keep your machine free from Malware and other potential threats.


How To Block Spam Messages in Android and iPhone

Just like irritating email spams, SMS spams range from social engineering swindles to unsought advertising. I’m pretty sure that just like me, you too are fed up with these spam rings. Most spam messages prompt users to forward them, contain links and other frustrating hoaxes. Along with the rise of SMS spams, there came many apps on the Android Play Store and Apple Store to filter these spams.
The latest versions of Android and iPhones will let you filter the unwanted numbers easily. Follow these steps to easily block spam messages in Android and iOS:

How To Block Spam Messages in Android?

There are lots of third-party apps available on Android Play Store to block spams, but you can block these irritating numbers using Google’s Hangouts app. Hangouts app can be found easily as it comes pre-installed in your Android phone. If it is not available on your phone, you can download it from here. To block spam messages in your Android, first you need to make Hangouts as your default messaging app.
Make Hangouts as your default messaging app

Settings> More> Default SMS app> Hangouts.
Block spam messages with Hangouts

1. Open Hangouts app. It will automatically import all the old text messages.

2. Now open a spammy message you wish to block.

3. You’ll see three dots at top-right corner, tap it.

4. Now tap on People &

5. Now you’ll seeing few options, one of them is Block [number] tap it and again tap at Block.


Now you have blocked the spammer. If you wish to see any number you blacklisted in past, head back to the home screen of Hangouts app and tap the top-left corner to open the menu bar. You will find out Blocked people option. From there, you can Unblock them in case you changed your mind.
How To Block Spam Messages in iPhone?

Blocking Spam messages in iPhone is quite easy as compared to Android.

1. Open the Messages and tap the Contact.

2. You’ll see the little i button, tap it.

3. Now you will see a contact card for the Spammer.

4. Now scroll down to the bottom and tap at Block this Caller.

Now you have blocked the spammer. If you want to remove or check any of the previously blocked spammers, go to Settings, then Messages and then scroll to the bottom and you will find Blocked option. Swipe it from right to left and tap the red button

Facebook Hacking: How to protect yourself.

It is no surprise by now that everyone has a social media account. However, Facebook is the world’s most renown social media outlet that has over a billion people on it. Hence the reasoning behind so many social scandals wanting to gain access to Facebook.

I actually get asked a lot “How can I hack someone’s Facebook Account?” or “Can you hack this Facebook account for me?”. My answer to those emails are a short response, in which I state “I cannot educate you upon the exploitation of Facebook or I will not gain unauthorized access of any social media account for any reason.”

Until now.

Here, I will show you how other “Hackers” are using methods to gain access to your Facebook page, and even inform you on how to prevent yourself from being a victim.

Our first method of gaining access to your Facebook credentials is by means of “Phishing”. No, don’t go get your tackle box and head to the lake.
In order for a hacker to perform a Phishing attack on any one, they would need a hosting services. You can get free hosting services from 110MB or Byet Internet Services.

Once the attacker has setup a free false hosting account, now they will need only 3 files. These files are important to the process as they are login.php, Phishing.php, and passwords.txt. These scripts are setup and programmed so that they resemble the Facebook login page. Once you land on the fake Facebook login page, which is login.php, you would normally login with your email and password. Now the Phishing.php kicks in and stores the information on a specific location on the hosted server. The passwords.txt is left blank as people will often fill this up as they enter their information.
Now when the attacker/phisher has these three files uploaded on their new server, they send the URL (“”) to a victim via email.
When you get the initial email, it may have some verbiage stating something such as;
“We have noticed some illegal activities with your Facebook Account. Please use the this link to login and correct the actions.”
“Please follow us on Facebook, by clicking here”.
While those are the short versions of what may be included in your email, the main goal is to get you to open the email and login to Facebook on their fake Facebook login page. Once you have complied with their requests, they have control over your entire Facebook page.

Now that we know how they can gain access to your Facebook page, let us review on how you can prevent your information from going onto their server, and how you can trace them and report the criminals to local authorities.

Step one in the investigation, is open the link. Any time you visit Facebook the URL is and always will be to login. When you open the link, if the above URL does not match, or you get something like then you know that it is a fake link. Don’t login! As it is setup and resembles the exact login page for Facebook, don’t login.

Now there are two effective ways in tracing the phisher. You will need both methods and record information (Screen Shots works best) to report it to the local law enforcements. From there they will push it to other law enforcements in which can include the FBI if there are several reports upon this same phisher.

When you first see the URL bar and it is not the original Facebook URL, then I would copy the entire URL and use a WhoIs service. Who Is allows you to find the information regarding the person who bought the Domain Name (URL). I would use WhoIs.Net for my domain name searches.

Once I have a record of who purchased the domain, I would take a screen shot (Or use my camera phone) and save that. This will be helpful for the authorities later in their investigation.

Now, going back to the initial email. If you are using Google, this is a snap. Open the email and on the far right upper corner of the email itself is a dropdown section. This allows you to select “See full header”. Basically, this will then bring up a small window showing you the IP address and the time stamp of the email sent from one location and received by your location. Again, this is another important aspect to the research, so screen shot or use your camera.

Now that you see the full header, you can simply copy the entire alien language that you see. Now we can easily use an online script service that allows us to find the exact IP of the sender. I use for the headers. Now we will receive an IP address. Now for our last step in tracing, we can use another online services to trace the IP address. I personally use GEOBytes. It is easy and quick. The results are 100% effective, or at least on the 250+ IP’s I have run through there.

Now you will see the sender’s information such as Country, State, City/town, Address, network carrier, etc. This is extremely helpful to the law enforcements, so we will take one more screen shot.

Awesome, now you have this much information, now you can print it out, put it on a thumb drive, or send the information VIA email to the officer in which you talked to about the phisher.

So let us recover here. We have an unknown email saying that we need to log into Facebook, and provides us with a link. We know that Facebook is secure by using https, and does not have any fake names (“Fakebook”). We know how to trace the Domain Name (“URL”), and obtain and trace the IP of the original email. Now we can use all of that information and get it to the local law enforcement. The sooner they have that information, the faster they can catch this phisher.

While there are a few other ways to obtain your login information, such as Facebook.exe (a program that uses Facebook from a program on your Windows Desktop instead of going to the browser), we have learned the biggest means of Facebook Phishing and how we can prevent ourselves from being a victim.

Another great way to protect yourself on Facebook, is by enabling the 2 part login factor. This means that when you (or someone else) logs into Facebook on a new computer, browser, IP, etc. then your phone will go off telling you to input the code given. You can type the code into the page where it asks and you will then have access to your Facebook account. It is also recommended that you log out of every session, except on the computer and your phone that you use on a daily basis.

E-payment: CBN Blocks Plan To Create TSA Payment Gateways

The Central Bank of Nigeria (CBN) has told Interswitch, Nigeria Inter-Bank Settlement System (NIBSS), eTranzact and other payment processors in the country that the apex bank would not replicate the Treasury Single Account (TSA) payment gateway powered by Remita.

In an audacious move, Interswitch in collaboration with NIBSS wrote a petition to the apex bank, seeking the replication of the TSA gateway while tagging the present arrangement “monopoly”. But the CBN management reportedly told the aggrieved party in a meeting attended by all the payment processors that the TSA architecture met international best practices and, as such, the apex bank will not have more than one gateway.

The TSA payment gateway was connected to the apex bank’s core banking application, powered by T24, Real-Time Gross Settlement Systems (RTGS) and National Electronic Fund Transfer System (NEFT). Barely a month following the full implementation of the TSA, a congruence of opposition is building a case against a policy that many said is arguably Nigeria’s single most important initiative to tackle corruption and abuse in the management of public funds.

The opposition is coming mainly from expected sources: competing payment platforms that are griping over being left in the cold, banks that are the major beneficiaries of the corruption-laden processes that the TSA have replaced, and senior civil servants who believe that they are the primary target of the project.