Workshop on Cybersecurity | SkillRary
- Swetha Y
- Jul 3, 2020
- 0 comment(s)
- 355 Views
A one-day workshop on ‘Cyber and Youth-Youth For Sciences and Scientific Attitudes’
An event by Government of India and Government of Karnataka Youth Empowerment & Sports Department invited SkillRary Founder & CEO Mithun Ashok as a Guest speaker to talk on the topic ‘Cyber & Youth’ where students got to learn how to secure devices from being hacked, how to perform Ethical Hacking; and got information on what to do if an account or a device is being hacked.
The theme of the event being ‘Youth For Sciences & Scientific Attitudes’. This session was an eye-opener for students as many of them were unaware of the potential threats to their devices and accounts.
The event was Annual NSS Special Camp 2019-20 held by Krupanidhi Degree College, Bangalore in association with National Social Service.
Hacking is not illegal things; it is all about how to secure your Cyberspace and system from attacks. This one-day workshop and lecture on cyber ethics, email hacking and security, malware attacks, window system attacks, online data investigation, credit frauds and android mobile hacking etc.
Ethical Hacking is an important tool in many national security agencies and companies. To become an Ethical Hacker or Security Expert one must think out of the box with the mentality to catch a thief.
Cyber Security protects the data and integrity of computing assets belonging to or connecting to an organisation’s network. Its purpose is to defend those assets against all threat actors throughout the entire life cycle of a cyber-attack. An ethical hacker is an ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weakness in various systems- just like a malicious hacker. They both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.
An ethical hacker’s role is similar to that of a penetration tester, but it involves broader duties. They break into systems legally and ethically. This is the primary difference between ethical hackers and real hackers- the legality.
This workshop was specifically designed to provide the right knowledge to the aspiring Hacking and Cyber Security enthusiasts. This workshop explored the various means that an intruder has, to gain access to computer resources. It will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack.
The duration of this workshop was for two consecutive days with eight hours session each day, in a total of sixteen hours, conveniently divided into theory and hand-on practical sessions.
One of the examples of ethical hacking is that of a new security warning issued for Google’s 1.5 Billion Gmail and Calendar users.
In this Forbes story,
Google's Gmail email service is used by upwards of 1.5 billion people. The Google Calendar app, meanwhile, has been downloaded more than a billion times from the Play Store. Here's what you need to know.
Security researchers working at Kaspersky have revealed how threat actors are using the tight, and automatic, integration between different Google services to target users with malicious exploits.
In what the researchers refer to as a "sophisticated scam," users of the Gmail service are being targeted primarily through the use of malicious and unsolicited Google Calendar notifications. Anyone can schedule a meeting with you, that's how the calendar application is designed to work. Gmail, which receives the notification of the invitation, is equally designed to tightly integrate with the calendaring functionality.
When a calendar invitation is sent to a user, a pop-up notification appears on their smartphone. The threat actors craft their invitations to include a malicious link, leveraging the trust that user familiarity with calendar notifications brings with it.
The researchers have noticed attackers throughout the last month using this technique to effectively spam users with phishing links to credential-stealing sites. By populating the location and topic fields to announce a fake online poll or questionnaire with a financial incentive to participate, the threat actors encourage the victim to follow the malicious link where bank account or credit card details can be collected. By exploiting such a "non-traditional attack vector," the criminals can get around the fact that people are increasingly aware of common methods to encourage link-clicking.
To know more about the employment opportunities in the field of cybersecurity, click on the link https://www.skillrary.com/blogs/read/top-cybersecurity-certification-which-can-fetch-you-a-job-for-life