Sunday, 17 December 2017

How to Transfer Contacts from One Android Phone to Another Android


Bored of your old android phone, Planning to buy a new one? If you are upgrading to a new android device then transferring contacts is the most important task you need to perform. This task can be quite irritating if you are not an android geek. So here are couple of methods which will guide you to transfer contacts from one android device to another.

Two Methods to Transfer Contacts from Android to Android
1) Transferring phone contacts using Gmail (Recommended)
2) Manually transfer contacts

**How to Transfer Contacts Using Your Gmail Account?
If you have enabled automatic backup on your android device then all your contacts will be automatically backed up to your Gmail account. You can check this by navigating to Phone settings and selecting backup and reset.

If Back up my data is turned on then all the contact are automatically synced with your Gmail account and if it’s turned off then follow the below guide to manually backup android contacts to your Gmail account.

=> On your android device go to contacts and tap on the more option icon.
=> Now select Import/Export option.
=>You will find various options to import and export contacts, => Remember we need to export our contacts so tap on Export to .vcf file.
=> Save the .vcf file in your SD card or internal storage, Where-ever possible.
=> Now connect your android device to your computer using data cable and copy the .vcf file that we have exported in the previous step.
=> Once the file is copied sign in to your Gmail account using your computer. On the left hand side click the drop down arrow and select contacts. Refer the below screenshot.
=> A new windows will open where you can access all your Gmail contacts. Click on more option on the left side and select Import.
=> You might get a popup as shown below, This is because the new version of google contacts doesn’t support importing contacts so we need to switch to the old Google Contacts. Click on GO TO OLD CONTACTS to proceed further.
=> Again a new tab will open with old Google contacts interface. On the left hand side click on import contacts.
=> Now choose the .vcf file which we have copied earlier from our android device and hit import.
=> You’re done! Just sign in on your new android phone using this email and all your contacts will be imported automatically.

**How to Manually Transfer Contacts from Android to Android
This method is quite similar as the first one. Here instead of importing contacts from your Gmail account we are directly importing the backup of contacts file (.vcf file) on your new android phone.

=> First Android Device (Contacts to be transferred From)
*Go to contacts and tap the options button.
*Click on Import/Export.
*Further click on Export to .vcf file and save the backup file on your SD card.
*Now copy the exported .vcf backup file to your new android phone where you want to transfer your current contacts.

=> Import the Backup File
*Again go to contacts on your android phone and tap on options icon.
*Click on Import/Export and further select Import from .vcf file.
*Select the contacts backup file which we have copied from old android phone.
*That’s it! all your contacts will be transferred from your old android phone to your new android phone.

How to Track a Lost iPhone Without Any App




Losing your iPhone can be disheartening, All the data and media on the phone are lost (if you don’t have a backup). But losing it doesn’t have to mean buying a new phone. You can track your iPhone that was either lost, stolen or you simply left it squashed between your sofa cushions.

Have you lost your iPhone and looking for ways to track it or find it? Find the best tips on mspy.

**Different Methods to Track an iPhone

1. Find My iPhone
This inbuilt feature of iPhone allows the owner to track his iPhone with ease; all you need is your phone be connected to the internet or Wi-Fi as this app uses the company’s iCloud services to locate your lost phone. You can also lock your phone, set a pass-code or erase all the data on the phone, without holding the phone in your hand using some another iOS device or laptop.

If you have lost the iPhone, to track an iPhone, open the Find My iPhone on another iOS based device like the iPad, MacBook, or another iPhone. You can find the location of your phone if the phone is connected to the internet. And if not, lock your phone and create a message so that the person finding the phone is able to get in touch with you on the number you provide in the message. Someone will surely return your phone back to you seeing the message, as mine did come back after being lost.

**How do you track an iPhone 6?
To track an iPhone 6, go on the iCloud site, click on ‘All Devices’ option and select your device and select the ‘Lost Mode’ and you will be able to track an iPhone 6 in a jiffy.

**What can you do if your iPhone is stolen?
If you fear the iPhone may be lost forever and there are minimal chances of it coming back, you have a wonderful option to delete all the data and information stored on your phone. If this data falls into wrong hands, you might get into trouble.

2. Using Google Timeline
To track an iPhone you can also use the Google Timeline, previously known as the Location History. Google not only collects data but also makes it accessible to you when you require. You will be able to track the last location your phone sent to Google and in case your phone is still on and connected to the internet, you will be able to track its current location. This will help you track the iPhone’s last used location even if the phone is switched off.

**To use this service

Log on to com/maps/timeline
Type in today’s date on the left side of the screen.
See the timeline and scroll down the page to see the last reported location of your iPhone.
Along with the location, you are able to keep track of the time of location as well.
Check to see if your phone is moving about or is static waiting for you to come pick it up.
So these were few methods to track the location of your lost iPhone without using any third party application.

6 steps to improve security for small and middle sized businesses



Many large businesses usually have invested heavily on their security given that they usually know what they have at stake-it is usually a lot!

However, when it comes to small and middle sized businesses, they are usually reluctant to dedicate a good amount of their capital and revenue on their company’s physical and cyber security.

Most of them think that they are too small a company to be a target for attackers or rather what they have at stake is really not worth investing that much. Well, that is the wrong approach!

Cyber criminals do not spare SMBs
In fact, small and middle-sized businesses have an equal need to put in a good security system in place as that of large businesses. Do you doubt it?

Take an example of Codespace, a small and middle-sized business that went out of business just 6 months after it had a major cyber-attack. This was just an illustration that also small and medium business stands to lose even more in the case of a security breach compared to large businesses.

In fact, recent reports state that up to a huge 60% of small and medium-sized companies run down within six months of a major attack on the company, unlike large businesses which only suffer a for a financial quarter or at most a year before getting back on its feet.

Now that you know some of these facts, here are a few reasons of security why cyber criminals normally target small and middle-sized businesses:

They are easier to infiltrate since they have not invested much on their security hence giving the attackers an easy time on the playground.
Although they might be small, a good number of them have access to valuable information, which will translate to good money for attackers.
Small and middle-sized businesses are more likely to pay ransom to these attackers to get their company back since they have no expertise to stop the attack.
This therefore calls for urgent measures from the perspective of small and medium-sized businesses to boost their firm’s security because who knows, attackers may be attacking your business next.

How to boost security in SMBs
Boosting security in these small and middle-sized businesses is usually tricky, as it has to be done in a sensible way such that it must be easy to deploy and it should require minimal IT management since most of these organization do not have enough man power.

It should also be easy to use and greatest of all; it should be affordable enough to fit in the company’s financial scope. Here are six steps that will help small and middle-sized businesses to boost their company’s security.

1) Establishing a data security plan for the whole business:
This includes deciding on a suitable method of protecting your firms’ data such a necessary security appliances and software to protect your company. It also involves restriction of access privileges’ to employees about their level in the firm and in the case of a breach scenario.

It is also vital to define the measures to be taken to handle the attacks such that it causes little harm possible on the business operations. Examples of best network security appliances for SMBs are Enterprise-class UTM for SMbs, WatchGuard Firebox T10 etc.

2) Training and educating employees on secure data handling:
Most breaches are usually facilitated by are an insider in any level in the business whether intentionally or not. Therefore, by training them on how to handle data, they will be careful on their practices hence leaving no loophole for an attack.

Employees are also required to report any unusual activity in the system since may be it can be an attack underway. Consequences should be dictated clearly to the employee to prevent cases of insider threat.

3) Establishing a good data storage policy:
This is just a precaution that should be taken by firms as a precaution in case of an attack which leads to loss of data. This would enable them to get back on their feet as soon as possible and make necessary repairs on the system that would prevent further attacks of the similar manner in the future.

This policy will also outline what data must be retained, what should be disposed, and who can access the stored data. This will reduce the risk by a considerably huge percentage.

4) Embracing and training the mobile workforce:
Mobile workforce is connected to the company base by use of devices such as laptops and phones which in these situations are referred to as endpoints. These ends are usually the most vulnerable point of the system and therefore the task force at the ends must be well trained on how to perform their operations with utmost care to prevent system loopholes.

The mobile devices also should not be allowed to access the company’s network without complying with the company’s security policies. This prevents third party entry into the network and access company data.

5) Encrypting the business network with the highest form of encryption:
Strong and the most recent form of encryption using SSL certificate is necessary for an organization, which protects personal details such as names addresses and payment details.

However, firms should not solely depend on encryptions as its only form of encryption since professional hackers can find their way around encryptions.

6) Taking a multilayered security solution:
Since most SMBs lack the enough work forces for their security staff, they should look for a security solution, which targets both internal and external threats, attacks, and malicious intention before it happens actually.

They should look for a multilayered solution that is easy to install manage and maintain from a trustable security solutions vendor.

**Conclusion
It is a high time for the small and middle-sized businesses to mind their security and giving it the attention it really deserves. They should understand that criminals these days have shifted their focus to them and they are the new targets.

Luckily, with the above steps and many other minor solutions, small and middle-sized businesses are able to take care of their security threats at a manageable and an affordable cost with digging deep into the firm’s finances.

How Malware Makers Make Money



Typically where there is crime, there is usually money. The same is true for cyber-crime incidents.

In the early days of computers, malware was created for fun. Playing a practical joke or mischievously damaging someone’s computer was the sole motive behind it. Viruses and worms were more popular in those days, and they were created by curious minds that had a lot of time on their hands.

Today, we have come a long way.

Malware is now developed for profit, for money and for selfish gains.

Each variant of malware has a different way of generating money for the perpetrator, so I will begin by detailing how each of them work.

Ransomware
The newest kind of financial malware that is currently wreaking havoc in cyberspace is called Ransomware. It encrypts your data and displays a message that your files can be decrypted or unlocked only after you pay a certain amount of money.

This is the nastiest kind of malware ever because there is often no other way to gain back access to your private data without giving in to the extortionist’s demands.

If you do not pay the demanded amount of money by a given deadline, you risk losing your data permanently.

Well, this is just one kind of malware attack and it’s still quite new for everyone.
However, malware developers have been making money long before this scheme was created.

Providing your credit card information and paying the attacker directly is not always the case. They can profit off of you in several other ways.

Spyware and Trojan
These are data-stealing malware schemes. They are capable of harvesting personal information from your computer like credit card numbers, banking account details, social security IDs or email passwords.

Once this information reaches the hands of cybercriminals, they can use it to their benefit by making high-priced purchases using your credit card, sending spam emails on a user’s behalf or even emptying bank accounts.

And Trojan viruses may sometimes employ keylogger programs within your system to capture and steal keystroke inputs from a user’s computer and then use them for criminal purposes.

Adware
As the name suggests, Adware is responsible for presenting unwanted advertisements and irritating pop-up messages on a user’s computer.

These ads may or may not lead you to receive genuine discount offers, but they always result in a bad browsing experience. In this case, the attacker gets paid by the company whose ads are being shown.

In addition to ads, pop-ups may also display some alarming messages like claiming a user’s computer is damaged or infected, and then asking you to buy a software product to fix it. It may also ask users to call a fake tech support center, which in turn demands money to pay for their professional fee to fix the problem (which doesn’t exist in reality).

Malvertising and Browser Hijacker
The injection of malware scripts into advertisements on legitimate webpages is called Malvertising. Advertisements are widespread on the web as they form a source of income for webmasters. Cybercriminals use these genuine advertising platforms to spread malware.

This kind of malware injection leads to automatic clicks and unintentional downloads of unknown software programs on a user’s computer.

It may even lead to the installation of Browser Hijacker programs that control a user’s web browser. A change of your default search engine to a sponsored network or homepage redirection to an unsolicited webpage are signs of a browser hijack.

Malware developers are paid by companies to which they drive clicks and visits.
You can remove them by using tools to fix a malware-infected browser.

Potentially Unwanted Programs
Programs sometimes referred to as Potentially Unwanted Program or PUP Malware get installed in a user’s computer without their consent. Often they come as part of a package bundled with a legit software product and get installed automatically.

This PUP can be in the form of adware, spyware or simply scareware.

Scareware programs try to scare users by giving a fake warning message and then scam them. You should avoid online scams that trick you out of money.

Phishing and Social Engineering
It’s not just Malware that makes money. Phishing and Social engineering scams are also a huge threat.

To explain it with an example: You might receive an email claiming to be from PayPal. It will ask you to verify your account details on a fake webpage designed to look like PayPal’s site.

Your username and password entered on this page are then recorded by the hacker behind it and then misused.

Social engineering involves psychological manipulation. They exploit people, not their software.

You can avoid it by using common sense - by avoiding giving personal details over email, and by ensuring the correct URL address of the service you are using.

Use a VPN when you are travelling to improve internet access




A VPN is useful for many things, such as security and privacy when connecting to the internet, but it can also be useful to get around content blocking and to bypass local restrictions.

In some parts of the world the internet is very restricted and filters on the connection block access to certain websites and web services.

It is more common than you might think and right now I am travelling and I am at a hotel with a very limited internet service. The Wi-Fi is OK and I can access Google, but most of the internet, including this website, is blocked.

It seems that you can search the web using Google, but very little else is working. Gmail is OK, but Outlook isn’t. I can get to the Microsoft website, but not the Apple website. The place has some weird filters.

This hotel is unusually restrictive, but I have also come across odd restrictions elsewhere and one coffee place I go to has blocked Pinterest for example. It is a popular site with over 100m users, but you just cannot access it.

I cannot access this website, not even the home page, never mind update it. What can you do?

=> Use a VPN
The solution is to use a VPN - virtual private network. This is software that creates an encrypted connection to the internet, a sort of tunnel, that bypasses local content restrictions and allows you to access what you want.

I am writing this using a VPN to access the RAWinfopages site because the hotel has blocked most of the web, apart from Google searches. Even Bing is blocked! Without a VPN I could not work.

There is a large number of VPN providers and lots of choice for users. Many of them are good, but the VPN I use is NordVPN. I am an affiliate, but also a customer and bought a great two year deal out of my own pocket. The company has more VPN servers around the world than many rivals and the VPN software has some useful features that isn’t in some alternatives.

Run the NordVPN software and it shows a map of the world with pins. Each pin is a location and you can choose where in the world you want to be by clicking a pin. You can be in Iceland, Australia, Europe, USA and other places.

Each pin contains multiple servers, sometimes dozens, and it automatically works out the best one to connect to in the area you select. However, you can view the entire list of servers and select the one you want manually too.

Once a connection is established, you can then use web browsers, email and internet connected apps in the usual way. With NordVPN up and running, I can access RAWinfopages and update it for example, which was impossible before.

VPNs are not just for people in foreign countries with oppressive regimes that limit or spy on internet access. I’m just 100 miles from home in a hotel that is blocking most things beyond Google. The privacy and the security provided by the VPN is useful, but mostly it is just to access the web like I do at home, without restrictions.

what is Juice Jacking SCAM

  Juice Jacking is a cybersecurity threat that occurs when cybercriminals manipulate public charging stations, such as USB charging ports in...