Posts Tagged Online Security

Steps To Secure Your WiFi

View Full Image

, ,

No Comments

What Are Man-In-The-Browser Attacks?

28th March, 2017

Man-in-the-Browser (MitB) attack is one of the most harmful forms of online threats prevalent in the recent times. It involves the use of a Trojan horse to gain access to the target user’s online banking credentials, financial details, account numbers and other sensitive information. The hacker uses a phishing approach to trick the user to click on a link that directs him to a website with manipulated form fields. A Man-in-the-Browser attack is quite difficult to detect as it does not hamper the normal functioning of the web browser.

Man-in-the-Browser attack can be specifically risky because of the following reasons:

  • It does not require complex hacking or phishing techniques to gain access to the user’s web browser.
  • It cannot be detected by anti-virus software.
  • Since the attack operates between the browser and the user’s input, it can easily circumvent the standard security measure, such as two factor authentication.

How Does A Man-In-The-Browser Attack Work?

Just like other online attacks, a Man-in-the-Browser attack also begins by infecting the user’s computer with a malware. This may be done by compelling the user to download a malicious attachment, visit a fake website or click on a malware injected URL. Once the system has been infected, the malware remains in stealth mode until the user performs the desired action, such as access an online banking account or visit a shopping website.

At this stage, the malware gets activated and creates a code to add extra input fields in the web page. When the user enters the information in these fields, it gets transmitted to the hacker. The Man-in-the-Browser attack can even involve secretly manipulating data on the website, such as account number or amount to be transferred to initiate illegitimate transactions without the knowledge of the user.

How To Prevent Against Man-In-The-Browser Attack?

  • Keep your web browser, operating system and other software updated as well as properly patched.
  • Install anti-malware software on your computer system and update it frequently.
  • Be careful while filling form fields on online banking and shopping websites. If you are asked to fill in additional form fields, provide more
  • information than is normally required or re-enter your password, you should close the browser and start a new session.
  • Keep a check on browser extensions. Make sure you use only reputed extensions and disable the ones that are no longer required.

We, at Centex Technologies, provide complete information security solutions to business firms in Central Texas. For more information, feel free to call us at (855) 375 – 9654.


No Comments

How To Combat Online Gaming Security Risks

21st March, 2017

As the online gaming industry continues to expand, hackers are looking for ways to breach into the players accounts to gain access to their personal and financial details. Whether you are a regular player or occasionally spend some time on an online game, you are making yourself susceptible to many potential attacks that can jeopardize your personal identity as well as financial privacy.

Given below are some of the common security risks associated with online gaming and how you can stay protected against them:


Phishing is a scamming technique that involves the use of imitation websites or fake URLs. The hackers send out emails to the online gamers with an aim to defraud them and gain access to their account login credentials or credit card details. The users may be required to click on a link to validate the online gaming account or change their password. The information entered is directly transmitted to the hackers.

To protect against phishing attacks, make sure you do not click on a link in an email. Instead, manually type in the gaming website’s URL to log in to your account and update your account settings.

Character/Inventory Theft

In this type of attack, the cyber criminals may attempt to cheat the players with in-game resources, paid account upgrades or game characters. The stronger your game characters are, higher will be your chances of being targeted by the hackers. They may offer lucrative in-app purchases or character upgrades to extract your credit card details.

Playing cautiously is important to avoid being a victim of such attacks. Set up two factor authentication and create a strong password to prevent the hackers from breaching your gaming account.

Malicious File Downloads

Online gaming involves several file downloads. To capitalize on this, the hackers may attempt to infect the player’s computer system with malware. They may install fake game updates, anti-cheats, in-game interface tweaks, utility files etc. that contain a malicious code. Once executed, the malware acts as a keylogger as well as records your user name, password, credit card numbers and other sensitive information.

In order to stay safe, you should install an anti-virus software on your device. Schedule a daily scan to identify and remove any keylogger tools or malware files. Also, keep your device updated with the most recent patches and OS versions released by genuine vendors.

For more tips on online gaming security, you can contact Centex Technologies at (855) 375 – 9654.


No Comments

Protecting Your Financial Information Online

October 24, 2015

With the greater convenience and efficiency offered by online financial transactions, the need to safeguard your information has also increased. More and more people are using the internet for shopping, banking, paying bills, booking tickets etc. However, on the flip side, hackers have also found an easy way to steal the users’ confidential data such as passwords, credit card details, account numbers etc.

Here are some tips that will help to protect your money when you are making online transactions:

  • Be Careful Of Spammy Links: You should always type in the URLs manually for websites where you need to carry out any financial transaction. Clicking on links sent in emails, chat rooms, social networking sites and banner ads on suspicious websites may redirect you to a spam website.
  • Pick A Complex Password: One of the biggest mistakes most people make is using their personal information, like name, pet’s name, date of birth etc., as passwords for online accounts. There are many programs that scan personal information through Facebook accounts and make it easier for the hackers to guess passwords. Make sure you create a strong password, at least 8 characters comprising of letters, alphabets and special characters.
  • Check The URL: While visiting a website that requires entering your sensitive information, you should check and verify that the link is genuine. You should carry out financial transactions only on websites that start with ‘https’. This will ensure that the data you enter is properly encrypted and secure.
  • Get An Additional Credit Or Debit Card: You can also consider having an additional credit or debit card to be used solely for online transactions. Restricting limit for the credit card or holding a limited amount of money on your debit card can help to mitigate the consequences of a hacking attack.
  • Eliminate Vulnerabilities: You should always keep updating the operating system and the applications on your device to eliminate any vulnerability that can be used for malicious purposes. The anti-virus and anti-spyware software should also be installed and regularly updated with the latest security patches.
  • Avoid Using Public Computers Or Internet: As far as possible, you must try to avoid accessing your online banking or shopping accounts on public computers. These systems might not have proper security updates installed and intercept your personal information. Even when using a personal device, avoid connecting to an open or unknown Wi-Fi network. It is possible that hackers might be intercepting the traffic or decoding the information you are sharing over the network.
  • Use Virtual Keyboard: When banking online, you should use virtual keyboard to enter your password or other important details. It automatically encrypts your details and reduces the risk of password theft.

By following the above mentioned tips, you can efficiently protect your personal and financial information from being accessed by the cybercriminals.


No Comments

Cyber Security Tips For Online Shopping Portals

November 15, 2010

Internet has become our second home. Most of the time we are either on a social networking sites busy sharing information or networking with friends, or on online newspaper portal simply reading latest headlines, or on chat messengers or may be  just surfing various online shopping portals for buying products. All this need to share information over the net. As webmasters, it becomes very important to have proper measures in place to protect confidential information of users, specially when you run an online shopping store. In an online shopping store, for successful order placement, it is important to seek personal and financial information from users. This information is to be kept secure at all times.

For online shopping portals, the security threats are even more. People choose products and pay for them through merchants gateways. As confidential information like credit card number, name, address and email id is shared, it is important to protect them. There are two ways of taking payments online.

First option is where when the user clicks on “Buy Now” button, he is taken to a third party website of merchant gateway. The secure gateway webpage asks for personal and financial information and processes the payment. After payment the user is returned back to the original shopping portal. In such a scenario, the information is neither shared nor stored on shopping website. All information is processed by merchant gateway engine. It becomes very important to use only reliable payment gateways who have all security measures in place.

Second option is where personal and financial information is taken on the shopping website itself and payment is processed either by personalized merchant gateway or through third party merchant gateway. Here webmaster’s responsibility gets very high as he needs to make sure that personal and financial information is kept secure and out of reach of any miscreants. As a webmaster, you should choose web servers that are secure and safe. It is a good practice to buy dedicated web hosting servers from reliable company for the same.

In case of shopping websites, webmaster should buy and install SSL on the cart, registration section and payment processing sections of the website. This ensures that only encrypted data is processed.

As a webmaster, you should make sure that only authorized personnel deals with databases. It is a good practice to keep information at different locations and that too in encrypted form. Your web server or physical server should have proper firewalls and security measures installed to counter any cyber attacks. Do make sure that all softwares are regularly updated.

It is a good practice to rope in a cyber security consultant who can plan and help you in setting up completely secure environment for your application. We at Centex Technologies provide consultation and advanced tools to help you prevent any misuse of personal and financial information of your clients. Contact us today at (254) 213-4740

Security Consultant Central TexasWebsite Development Consultant Central Texas

, , ,

No Comments