Skip to main content

Smartphone, Tablet, Computer: Repairing | Resell | Exchange

Smartphone, Tablet, Computer: Laptop & Desktop repairing:
  • Other hand sharing devices can leak personal data. 
  • Hardware and software and OS can be misused for targets. 
  • Spare parts can be replaced. 
Second Hand smartphone, Tablet, Computer: Laptop & Desktop resell or exchange:
  • Other hand sharing devices can leak personal data. Privacy Concern. 
  • Normal Reset and Hard reset is not mean to all data deleted permanently from your device storage. 
  • If a device is dead for any reason but ROM storage is alive, it can recover data by forensics data recovery process. 
  • Device identity like IMEI, IMSI number for identifying specific devices can misuse at any time. 
Solution: 
  • For smartphones and tablets always avoid reselling or exchanging with existing devices. 
  • Strongly not recommended any storage supported devices for reselling or exchange. 
  • For Computer: Laptop & Desktop reselling or exchanging with existing devices, make sure to replace internal memory (Ex: SSD, Hard Disk), Don’t share existing running or dead internal memory. Install a new storage and then resell or exchange. 
  • Must note third-party or recipient correct information with proper evidence, because using this device identity can misuse at any time in future. 
What to do: Mandatory
  • Make sure to enable encryption and security services. 
  • Always operating system updated with the latest version and security patches.
  • Always use the original operating system and application softwares. 
  • Don’t use crack and pirated OS and Apps.
  • Use a strong complex password and different passwords for every online account. 
  • Don’t share passwords, backup code, OTP & security question answers to anyone. 
  • Use two step authentication for online accounts. 
  • After losing a smartphone, tablet, laptop, hard disk, pendrive, etc must report to the incident area local police station as soon as possible with proper information. 
  • With a police complaint report, register the same report to the national portal.  
  • If a device found after losing by police operation or any other sources, try to avoid using the same device in future, it can compromise confidential information or can misuse anytime. If you want your same device after found back, make sure you have personally cross checked hardware details by disassemble and also check operating system and internal  functions, app, and much more information which can be monitored. 
  • During confidential discussion physically : make sure all digital devices including IOT services connected devices are switched off properly (Ex: mobile phone, laptop, desktop, web cam, smart watch, spy pen, spy camera, CCTV, smart camera, external mic, wireless earphone, smart speaker, etc).
Published• Apr 16, 2020

Popular posts from this blog

Kali Linux AI Integration

Kali Linux is a popular open-source operating system designed for digital forensics and penetration testing. It is based on Debian and comes pre-installed with a wide range of security-related tools, including network analysis tools, password cracking tools, and vulnerability assessment tools. One way that artificial intelligence (AI) is changing the practice of using Kali Linux is by enhancing the capabilities of the tools it includes. For example, AI can be used to improve the accuracy and speed of password cracking tools, allowing users to more efficiently test the security of systems and networks. AI can also be used to automate certain tasks in Kali Linux, such as scanning for vulnerabilities or analyzing network traffic. This can save time and allow users to focus on more complex tasks, such as analyzing and interpreting the results of these scans. In addition, AI can be used to improve the overall user experience of Kali Linux by providing personalized recommendations and assist...

মোবাইল চুরি এবং ছিনতাই: বর্তমান পরিস্থিতি এবং পুলিশের ব্যর্থতা

পশ্চিমবঙ্গ - মোবাইল চুরি এবং ছিনতাই এখন একটি সাধারণ ঘটনা হয়ে দাঁড়িয়েছে। প্রতিদিনই কোথাও না কোথাও এই ধরনের অপরাধ ঘটছে, কিন্তু পুলিশের পক্ষ থেকে প্রতিরোধের কোনো কার্যকরী ব্যবস্থা নেওয়া হচ্ছে না। অপরাধীরা নির্ভয়ে তাদের কার্যক্রম চালিয়ে যাচ্ছে, কারণ তারা জানে যে তাদের আটকাতে পুলিশ প্রায়ই ব্যর্থ। কিছু ক্ষেত্রে পুলিশের সক্রিয়তা দেখা যায়, কিন্তু অধিকাংশ সময়ই তা শুধুমাত্র  পিআর এর জন্য।  "নিউজ এটাচমেন্ট সোর্স - আনন্দবাজার পক্রিকা" রাজ্যের বিভিন্ন স্থানে এই ধরনের র‍্যাকেটগুলো গড়ে উঠেছে, এবং এগুলো কার্যক্রম চালিয়ে যাচ্ছে নির্ভয়ে। সাধারণ মানুষ ভয়ে ভয়ে রয়েছে, আর অপরাধীরা তাদের কাজ চালিয়ে যাচ্ছে। দুর্নীতি, অযোগ্যতা, এবং নিষ্ক্রিয়তা মিলিয়ে পরিস্থিতি দিন দিন খারাপ হচ্ছে। পুলিশের কার্যক্রমের ওপর নির্ভরশীলতা কমে যাচ্ছে এবং বাস্তবতা উপলব্ধি করতে হলে সাধারণ মানুষকেই প্রথম পদক্ষেপ নিতে হবে। মোবাইল ফোন চুরি বা ছিনতাইয়ের ক্ষেত্রে, বেশিরভাগ সময় পুলিশ সাধারণ ডায়েরি (জিডি) এন্ট্রি করিয়ে দেয়, যাতে ঘটনাটিকে মিসিং বা হারিয়ে যাওয়া বলে উল্লেখ করা হয়। এতে পুলিশের এলাকার ক্রাইম রে...

One common use of RAY ID is for tracking web traffic

RAY ID is a unique identification number that is assigned to each device connected to the Internet. It is used to identify and track devices online, and is often used for security purposes. One common use of RAY ID is for tracking web traffic. When a user visits a website, their device is assigned a RAY ID, which is then recorded in the website's server logs. This allows the website owner to track how many unique visitors they have and where they are coming from. RAY ID can also be used for security purposes. For example, it can be used to block access to a website or online service from certain devices, or to prevent unauthorized access to accounts. This is often done by comparing the RAY ID of a device to a list of known malicious RAY IDs. In addition to tracking and security, RAY ID can also be used for personalization. For example, a website might use a RAY ID to remember a user's preferences or to show them personalized content. Overall, RAY ID is a useful tool for trackin...

Passport Police Verification Corruption in West Bengal

Passport police verification is a process that is required for individuals who are applying for a passport in West Bengal, India. This process involves the verification of an applicant's identity, address, and other personal details by the local police. In some cases, however, individuals may be asked to pay a bribe in order to expedite the verification process or to ensure that their application is approved. This type of corruption is not only unethical and illegal, but it also hinders the fair and efficient functioning of the passport police verification process. It can also create a sense of distrust and frustration among the general public, who may feel that they are being unfairly targeted or mistreated by the authorities. If you have experienced corruption or have been asked to pay a bribe in connection with your passport police verification in West Bengal, it is important to speak out against this wrongdoing. There are several ways you can do this: Report the corruption to t...

Sextortion and Deep Fakes: Cyber Crime Awareness

Sextortion and Deep Fake Technology: A Story of Cyber Crime Awareness FADE IN: EXT. CITY STREET - DAY We see a young woman, JESSICA, walking down the street with her headphones on, scrolling through her phone. Suddenly, she receives a message from an unknown number. She opens it to see a video of herself, undressing in front of her laptop. JESSICA (terrified) How did they get this video of me? FADE OUT. FADE IN: INT. JESSICA'S APARTMENT - DAY Jessica is sitting at her laptop, trying to figure out who sent her the video. She googles the unknown number and comes across an article about "SEXTORTION." The article explains that it's a form of cybercrime where someone threatens to share your private photos or videos unless you pay them money. JESSICA (to herself) Oh my god, this is happening to me. FADE OUT. FADE IN: INT. CYBER CRIME UNIT - DAY We see a team of detectives working on cybercrime cases. One of the detectives, JOHN, is giving a presentation to his team about ...

Preventing Cyberstalking and Ensuring Online Safety

Cyberstalking: Understanding the Risks and Ensuring Online Safety. Introduction: The advent of the internet has revolutionized the way we interact with each other. From socializing with friends and family to conducting business transactions, the internet has become an integral part of our lives. However, with the convenience of the internet, there are also dangers that we must be aware of, one of which is cyberstalking. Cyberstalking is a growing concern as more people use the internet, and it can have serious consequences. This article aims to explore cyberstalking and online safety, including what it is, how it works, and how to stay safe. What is Cyberstalking? Cyberstalking is a form of harassment that occurs over the internet. It involves the use of technology, such as email, social media, and messaging apps, to harass, intimidate, or threaten someone. Cyberstalkers often use multiple platforms to target their victims and can use various tactics, including hacking, imperso...

The Dark Side of Deepfake Technology | Cybercrime

Deepfake Technology: An In-Depth Analysis and Implications for Society. Introduction: Deepfake technology is an artificial intelligence (AI) based technology that allows the creation of synthetic media. It uses machine learning algorithms to create manipulated videos, images, and audios that appear to be genuine. Deepfake technology has gained popularity in recent years, especially in the entertainment and media industries. However, it also poses significant challenges to society in terms of its potential to be used for malicious purposes. This paper aims to provide an in-depth analysis of the concept of deepfake technology, its underlying principles, its potential implications, and the current state of research. What is Deepfake? Deepfake refers to synthetic media that is created using deep learning algorithms. It involves training a neural network on a large dataset of images or videos of a particular person, and then using that information to create a convincing likeness of that per...

Combatting Unemployment & Inflation in West Bengal

Unemployment and inflation are two of the most significant economic indicators that can have a major impact on a region's overall well-being. In the Indian state of West Bengal, the unemployment rate and inflation rate have been on the rise in recent years, causing a number of economic and social problems for its residents. In this article, we will explore the causes and impacts of these issues, and discuss some potential steps that could be taken to overcome them in the long-term. The unemployment rate in West Bengal has been increasing in recent years, due in large part to a lack of job opportunities in the state. The lack of job opportunities is caused by a number of factors, including a lack of investment in the state, a lack of manufacturing and industrial development, and a lack of skilled workers. This has led to a large number of people in the state being unemployed, which in turn has led to a number of social and economic problems. One of the major impacts of unemployment ...

Sextortion: How to Stay Safe in the Digital Age

Understanding Sextortion: Dos and Don'ts Dos Don'ts Do report any suspicious activity to the authorities. Don't engage with the blackmailer or pay any ransom. Do take measures to secure your online accounts and devices. Don't share sensitive or compromising information online. Do use strong passwords and enable two-factor authentication. Don't respond to unsolicited requests or messages. Do educate yourself and others about sextortion and how to prevent it. Don't blame or shame victims of sextortion. Do seek help and support from trusted friends and professionals. Don't delete evidence or tamper with the crime scene. Sextortion is a form of cybercrime where an individual is threatened with the release of private, sensitive or sexually explicit material in exchange for money or other forms of gain. To prevent...