Monday, 11 June 2018

A Basic Guide on Importance of Cyber Security Education in India

Importance of Cyber Security Education
Every now and then, we get to hear news and reports about the personal information of people being compromised due to a hack. In the world dominated by technology, rarely does one come across somebody who isn’t making use of the benefits of the scientific know how. Also, the number of people who are well-versed with the perils of the e-world is much lower. It is no longer viable to advise any generation of people does not display their information in the cyberspace. With the rise of social media platforms, one must just assume their information to be public. Such a scenario demands to focus on the protection of one’s juicy data such as credit and debit card numbers, passwords, social security numbers, passport details to name a few. It is advisable to remain vigilant all the time while entering sensitive information anywhere on the internet.

According to the Global Risks Report 2018, cyber breaches recorded by businesses have nearly doubled over the last 5 years from 68 per business in 2012 to 130 per business in 2017. The so-called ‘dark net’ markets for malicious goods and services revived during 2010-2012. To begin with, in the year 2016 itself, 357 new malware variants were released and ‘banking trojans’ were designed to steal the login information of individuals which could be purchased by cybercriminals for as little as $500.  Furthermore, the financial costs of these unpredicted cyber attacks are on an all-time high.

A study conducted in 2017 across seven countries reckoned the cost of responding to cyber attacks to be £ 11.7 million per company. These cyber attacks cause major disruption across a variety of industrial sectors including governments, railways, banks, telecommunication providers etc. The rapid flexibility for the world to connect has to lead to these scary cyber attacks which not only cause severe temporary disruptions but such havocs too which are irreversible in nature.

In order to prevent ourselves from becoming the victims of these unwarranted attacks, we must double check the sensitive information which we are feeding to the internet. There are umpteen reputed websites which also contain a lot of malware such as unsafe advertisements and web links which are prone to stealing one’s personal data. Therefore, the present scenario calls for a fixing of mindsets and bringing these critical issues to light by educating people about the safe use of technology.

There is not just one but multiple fearful actors involved in this dark play. There are several kinds of persons who are very well known as “threat actors”. They include:

Cybercriminals:  They attack systems and steal information for profit making.

Hackers: There are professional hackers who perform ethical hacking to alarm organizations about the vulnerabilities in their systems and work towards securing their networks. On the other hand, there are malicious hackers too who commit a variety of cyber crimes.

Hacktivists: They commit crimes for social and political purposes politically.

Cyber Terrorists: They participate in cyber crimes which are a threat to national security of any nation.
Nation states: Nations also launch cyber attacks against other countries.
These threat actors can target precisely anyone under the umbrella including individuals, governments and companies leaving no one safe.

Benefits of Cyber Security Education
Protect your business – An exhaustive digital protection of one’s business ensures the employees of an organization to use the internet without any fear and ensures the safety of their personal and professional data.

Protect Personal Information – Personal information is a very valuable asset to any individual in this digital era. So, it is extremely important to secure such information before it becomes a money making business for someone else.

Cybersecurity creates a safe working ecosystem – Employees in an organization would always be prone to cyber attacks if it were not for the best cybersecurity systems. These attacks hamper the productivity of all the computer systems in a network and prevent the economic crises from taking place in any organization.

Protects Productivity of the systems – Malware can slow down personal computers to a larger extent thereby making it impossible to work and wastage of time.
Prevent crashing of websites – Certain viruses cause irreversible damage to the websites which may lead to a greater loss of business due to missed transactions. One wouldn’t just be losing money but the trust of employees too.

 Prevents malware –   There are different types of malware such as spyware and adware which are designed to cause cyber infection in one’s system in order to steal sensitive information for profit making. An effective cybersecurity system prevents such infection and enables organizations to protect their classified data.

No age bar to learning- There is no age bar to doing a training course in cybersecurity. Awareness is the key to all solutions. Anyone can acquire knowledge about protecting their e-accounts at any given point in time in life. It is easy and understandable.

Technology has its own pros and cons. Therefore, in this digital age, it is fundamentally important for every individual to be able to learn to protect their sensitive information. The education about cyber security begins at the grass root level. From the time when students enter school, they must be taught about the safe use of technology. Such a digital training will instil confidence in individuals about technology and enable them to trust their ability to handle fragile situations.

The education of huge masses in cybersecurity will lead to a more comfortable and safer online experience.

                                                                            Guest Author: Neha Juneja

Friday, 11 May 2018

B.Tech in Cyber Security | Ansal University | Lucideus

Ceh Certification

B.Tech in Computer Science Engineering | Specialisation in Cyber Security
Cyber Security is a branch where digital data and integrity of computing assets are protected. It is formulated to make networks, programs and data safe from attacks, damages or unauthorized access. It's not an ordinary course on ethical hacking but in-depth analysis with hands-on experience to understand and perform the most sophisticated cyber attacks along with remediation of each.

Hacking attempts, Zero-day attacks, ransomware, viruses, Wi-Fi Eavesdropping etc are just some examples of the common threats one faces online. It is also predicted that in the coming years there will be a number of cybersecurity risks as lives are becoming more dependent on digital devices, services and space — an attraction to hackers who are only increasing by the day.

Course Objectives
According to a recent report by Intel Security in partnership with the CSIS, the global cyber-security workforce will have over 1 million job vacancies by 2019. Even Forbes stated that cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020.

Eligibility Criteria
A Student who has passed the 10+2 examination (Pre-University Board Examination) with Physics, Chemistry, Mathematics and Computer Science that is recognized by any State Board / Central Board (with a minimum aggregate of 60% marks).

Career Opportunities for Students
Increase in Cybersecurity crimes on both individuals and businesses accentuate the need for IT security professionals. B. Tech in Cyber Security will prepare you for an exciting career in the domain. There are multiple career options to pursue the course.


             4 Years of Duration            60 Seats                      INR 13.95 Lac(Fee Breakup)
                     Apply Now: Applications open for Academic Year 2018-19       
                  To Know More Visit:

Wednesday, 3 August 2016

Xiaomi Redmi Note 3 Finger Print Scanner and It's Privacy Issues | 4 August 2016


From past few years one Chinese company is hitting the smartphone world like anything, Yes I am talking about  Xiaomi Inc. founded in 2010 , is a privately owned Chinese electronics company headquartered in Beijing. It is the world's 5th largest smartphone maker; in 2015 Xiaomi sold 70.8 million units and accounted for almost 5 percent of the smartphone global market share. Founded by Hong Feng and fellows, in 2015 company crossed revenue of 20 billion USD.

 According to IDC, in October 2014. Xiaomi was the third largest smartphone maker in the world, following Samsung and Apple Inc., and followed by Lenovo and LG. Xiaomi became the largest smartphone vendor in China in 2014, having overtaken Samsung, according to an IDC report. -Source

Xiaomi and Privacy Issues in Past

  • In October 2014, Xiaomi announced that it was setting up servers outside of China for international users citing improved services and compliance to regulations in several nations.Around the same time, the Indian Air Force issued a warning against Xiaomi phones, stating that they were a national threat as they sent user data to an agency of the Chinese government (Source)

  • According to the PhoneArena report, looking up the website of the company owning the IP address in the range reveals that the website owner is CNNIC is the administrative agency responsible for Internet affairs under the Ministry of Information Industry of People’s Republic of China. It is based in the Zhongguancun high tech district of Beijing.

About Xioami Note 3 (Made in India)
 Xiaomi Redmi Note 3 smartphone was launched in November 2015. The phone comes with a 5.50-inch touchscreen display with a resolution of 1080 pixels by 1920 pixels at a PPI of 403 pixels per inch.

The Xiaomi Redmi Note 3 is powered by 1.4GHz/1.8GHz hexa-core Qualcomm Snapdragon 650 processor and it comes with 2GB/3GB of RAM. The phone packs 16/32GB of internal storage that can be expanded up to 128GB via a microSD card. As far as the cameras are concerned, the Xiaomi Redmi Note 3 packs a 16-megapixel primary camera on the rear and a 5-megapixel front shooter for selfies, the best part about phone it was the first phone which is manufactured in India and have finger print scanner security.

The Xiaomi Redmi Note 3 runs Custom MI UI Android 5.1 and is powered by a 4050mAh non removable battery. It measures 150.00 x 76.00 x 8.65 (height x width x thickness) and weighs 164.00 grams. - Source

How Fingerprint Scanner works
There are mainly three types of scanners available today to perform the required task.

  • Optical Scanner : Optical fingerprint scanners are the oldest method of capturing and comparing fingerprints. As the name suggests, this technique relies on capturing an optical image, essentially a photograph, and using algorithms to detect unique patterns on the surface, such as ridges or unique marks, by analysing the lightest and darkest areas of the image.

    Just like smartphone cameras, these sensors can have a finite resolution, and the higher the resolution.

    Much like the early days of the resistive touchscreen, you won’t find optical scanners used in anything but the most cost effective pieces of hardware these days. With increasing demand for tougher security, smartphones have unanimously adopted superior capacitive scanners.n, the finer details the sensor can discern about your finger, increasing the level of security.

  • Capacitive Scanner : Instead of creating a traditional image of a fingerprint, capacitive fingerprint scanners use arrays tiny capacitor circuits to collect data about a fingerprint. As capacitors can store electrical charge, connecting them up to conductive plates on the surface of the scanner allows them to be used to track the details of a fingerprint. The charge stored in the capacitor will be changed slightly when a finger’s ridge is placed over the conductive plates, while an air gap will leave the charge at the capacitor relatively unchanged. An op-amp integrator circuit is used to track these changes, which can then be recorded by an analogue-to-digital converter.

    Once captured, this digital data can be analyzed to look for distinctive and unique fingerprint attributes, which can be saved for a comparison at a later date. What is particularly smart about this design is that it is much tougher to fool than an optical scanner. The results can’t be replicated with an image and is incredibly tough to fool with some sort of prosthetic, as different materials will record slightly different changes in charge at the capacitor. The only real security risks come from either hardware or software hacking.

    Due to the number larger number of components in the detection circuit, capacitive scanners can be a little pricey. Some early implementations attempted to cut the number of capacitors needed by using “swipe” scanners, which would collect data from a smaller number of capacitor components by quickly refreshing the results as a finger is pulled over the sensor. As many consumers complained at the time, this method was very finicky and often required several attempts to scan the result correctly. Fortunately, these days, the simple press and hold design is far more common.

  • Ultrasonic Scanner : The latest fingerprint scanning technology to enter the smartphone space is an ultrasonic sensor, which was first announced to be inside the Le Max Pro smartphone. Qualcomm and its Sense ID technology are also a major part of the design in this particular phone.To actually capture the details of a fingerprint, the hardware consists of both an ultrasonic transmitter and a receiver.

    An ultrasonic pulse is transmitted against the finger that is placed over the scanner. Some of this pulse is absorbed and some of it is bounced back to the sensor, depending upon the ridges, pores and other details that are unique to each fingerprint.

    There isn’t a microphone listening out for these returning signals, instead a sensor that can detect mechanical stress is used to calculate the intensity of the returning ultrasonic pulse at different points on the scanner. Scanning for longer periods of time allows for additional depth data to be captured, resulting in a highly detailed 3D reproduction of the scanned fingerprint. The 3D nature of this capture technique makes it an even more secure alternative to capacitive scanners.

Xioami Note 3's Finger Print Scanner

Xioami uses the new Qualcomm Snapdragon 650 SoC which is based on  Qualcomm SecureMSM hardware-based foundation. Plus, integration with FIDO (Fast IDentity Online) Alliance biometrics enables the device to keep fingerprint data on the device, not in the cloud, and to connect more securely to FIDO-enabled websites, online accounts and devices. So, Redmi Note 3 is actually one of the best phones for the price not only because of the performance but also because of the security.

The FIDO (Fast IDentity Online) Alliance has developed strong cryptographic protocols that use these protected hardware zones to enable password-less authentication handshakes between hardware and services. So you can log into a website or online shop using your fingerprint without your unique data ever having to leave your smartphone. This is accomplished by passing digital keys rather than bio metric data to servers.  (Source)

Attacks in Public Domain on Qualcomm
  • Exploring Qualcomms Secure Execution :

  • Fingerprints On Mobile Devices Abusing & Leaking:
Conclusion : Fingerprint scanners have become quite a secure alternative to remembering countless user-names and passwords, and the further roll out of secure mobile payment systems means that these scanners are likely to become a more common and crucial security tool in the future.

The only problem with fingerprint scanners is that if your bio metric information has been compromised,  you can’t change it. 

Learn Ethical Hacking in India with Lucideus Weekends Batch Starting from Aug 21st 
For More Info : : Whatsapp/Call:  +91-9717083090

Saturday, 19 March 2016

How to Make Python Payload Executable on Mac | Rahul Tyagi


Step 1: Make this the first line of your Python script "#!/usr/bin/env python".

Step 2: Change the extension of the script file to ".command" i.e. my_python_script.command.

Step 3: In Terminal make the Python script file executable by running "chmod +x my_python_script.command".

Step 4: Now when you double click the Python script in Finder it will open a terminal window and run.

Friday, 25 December 2015

A student who wants to suicide because he was having 57% in 12th | Must Read for Every Student | Rahul Tyagi


Incident : Sep 9 2011
On Sep 9 2011 night, I got a call from one student of mine, he was not selected in an interview,  because he was not eligible for the company set criteria that is overall 60% throughout study life. (10th - Masters). That guy really was too upset and wants to suicide. The word he said really hurt me , that " MY Career is finished, I have 57% marks in +2 so I am not eligible for the test in any company, I am ruined and now even my parents not gona support me anymore". With these words he cried like hell, that guy I knew from a while, he was a strong boy but the way he cried really shocking. Then I told him not to do such stupid thing and called his father and then things got settled. 

Tuesday, 8 December 2015

How to Jailbreak iOS 9.1 / 9.2 Beta | New Method Dec 8 2015


Sunday, 15 November 2015

Learn Ethical Hacking in Delhi | Lucideus Labs | Winter Training 2015

Register for India's most coolest & the most advanced winter training program on Hacking & Security
LCEH | Lucideus Certified Ethical Hacker

 Buckle up as you are about to be bombarded with doses of awesomeness like never before. 
And guess what, it gives you placement if you fair well in the examination.

So what is this training all about? 

It's a training program where you will get to see and try by your own hands how a real world hacker works so that you can defend yourself from the attacks. 

We have following courses designed for you

Course Name
Delivery Mode
Duration Per Day
No Of Days
Course Duration
Regular (Mon-Fri)
2 Hours
20 Days
40 Hours
Regular (Mon-Fri)
2 Hours
20 Days
40 Hours
LCEH G1 + G2
Regular (Mon-Fri)
2 Hours
40 Days
80 Hours
Weekend (Sunday)
8 Hours
10 Days
80 Hours

Can I see the Course Contents?

Course content is attached with this mail. 
Click here to know more about Lucideus

Where Does it Take Place?

At Lucideus Labs, New Delhi - Click Here to see the pictures
(please note : the pictures are of our own Lab, and have NOT been taken from Google)