2. • Cybersecurity is the body of technologies, processes and
practices designed to protect networks, computers, programs
and data from attack, damage or unauthorized access.
3. There are some most common
“Security Threats”
that India are currently using.
5. Most PCs and laptop are now connected to the world wide
web i.e Internet, making easier the spread of malicious
software (known as malware), which includes Trojans ,
viruses, worms, spyware, adware.
8. Email Spoofing
Email spoofing is the forgery of an email header so that the
message appears to have originated from someone or
somewhere other than the actual source.
10. SMS SPOOFING
• SMS spoofing is a relatively new technology which uses the
Short Message Service (SMS), available on most mobile
phones and personal digital assistants, to set who the message
appears to come from by replacing the
originating mobile number (Sender ID) with alphanumeric
text.
• Spoofing has both legitimate uses (setting the company name
from which the message is being sent, setting your
own mobile number, or a product name) and illegitimate uses
(such as impersonating another person, company, product)
11.
12. • Tor :-
Free of cost
Hides IP address
Hides Location
Hides Identity
15. How to hack Your
friend, Family
Member
Mobile Phone
16.
17. Call Recording
• Record all incoming and outgoing phone calls.
• Record calls that are made to and from specific numbers
only.
• All call recordings are uploaded to your online
TheTruthSpy control panel which you can access from
anywhere with an internet connection. You can download
these recordings on to your computer or just listen to
them straight from the control panel at any time you want.
18.
19. Facebook Messages
• View all Facebook chat conversations.
• Find out the names of people they have been chatting with.
• Get time and date stamps to know when each chat took place.
• Get access to any photos, videos or audio files sent through
Facebook chat and saved on the target phone.
• All Facebook chat conversations are uploaded to your online
TheTruthSpy control panel which you can access from
anywhere with an internet connection.
20.
21. Live Call
• Click Start or Send a simple SMS command to activate the
Live Surroundings feature.
• The target phone user will not get any indication that you are
listening.