Jun052014
0
Deepak
ASUS T100 "Transformer Without Fiction, Its Technology Reaction"
Hey Fellas, I am sure you love movie series "Transformer". but here is the real transformer presented by "ASUS". Finest & Be...

Home
✦
Hacking Attacks
✦
Hacking News
✦
Technology
✦ Protect your computer from Malicious Proxy & Hacking attempts
Protect your computer from Malicious Proxy & Hacking attempts
Posted by: Deepak Posted date: 01:48 / comment : 0
Hi There,
Your Net-Banking Credentials has High Priority for Hackers to steal. Trojan, MIMA are the basic hacking attacks that hackers try on victims.
According to G-Hacks Microsoft Released a warning about this malicious Proxy Auto-Config (PAC)
This is How it works :
A PAC file allows browser to select a proxy without asking any permission from administrator. it may cause a men in middle attack. this kind of PAC file used in Mobiles & Laptops.
It Supported by almost all modern browser & loaded like given below in IE.
According to Microsoft's study, malicious PAC files are mostly used in Brazil, Russia, the UK and Australia.
PAC file redirect user (while they try to open any website) to any fake website which looks like original and try to steal their online banking credentials.
Find Malicious PAC file in your browser :
PAC files are generally loaded into LAN settings.
in IE (Internet Explorer) you can find PAC File in
Tools->Internet Options-> Connection tab ->Lan Settings ->under (Use automatic configuration script) Check Box.
Just uncheck it any stay safe.
in Mozilla firefox you can find the same in connection setting.
Third-Party tools are also available to prevent your browser from M-PAC "Auto Config Risk Protector" is one of them.
Your Net-Banking Credentials has High Priority for Hackers to steal. Trojan, MIMA are the basic hacking attacks that hackers try on victims.
According to G-Hacks Microsoft Released a warning about this malicious Proxy Auto-Config (PAC)
This is How it works :
A PAC file allows browser to select a proxy without asking any permission from administrator. it may cause a men in middle attack. this kind of PAC file used in Mobiles & Laptops.
It Supported by almost all modern browser & loaded like given below in IE.
PAC file redirect user (while they try to open any website) to any fake website which looks like original and try to steal their online banking credentials.
Find Malicious PAC file in your browser :
PAC files are generally loaded into LAN settings.
in IE (Internet Explorer) you can find PAC File in
Tools->Internet Options-> Connection tab ->Lan Settings ->under (Use automatic configuration script) Check Box.
Just uncheck it any stay safe.
in Mozilla firefox you can find the same in connection setting.
Third-Party tools are also available to prevent your browser from M-PAC "Auto Config Risk Protector" is one of them.
About Deepak

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
Related
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Hey Folks, do you know whose country's hackers are responsible for most cyber attacks ? i am gonna tell you top most countries in hacki...
-
Hey Guyz, Are you suffering from advertisement sites. are you not able to get original links after click on this advertisement link . so the...
-
Hey Folks, Most Awaited iOS 7 could be released for download very soon. as per Softpedia : " Longstanding iPhone carrier AT...
-
Hey Folks, This is too irritating when you try to open some social websites in your school or college and your browser just say "A...
-
Hey Folks, Apple not declared anything regarding OS X(Mavericks) & iPad yet, going interested iPad mini 2 & Mavericks co...
-
Hey Guys, Cross Site Scripting aka XSS is one of the common vulnerability in any web application. so today i'll explain you what...
-
Hey TechLovers, Many times you need additional drive for installing programs and other tools in your system for that you generally prefer ...
-
Hey Frnz, As you know Blackberry released its very famous Instant Messenger "BBM" for Android and iPhone Users. as in Active...
-
Hey Folks, Do you have any confusion before buying a new phone ? please have a look on these top 10 smartphones which are available in m...
-
Hey Folks, If you are a android user and willing to learn hacking using your Smartphone , then these 10 most Popular Android apps...
Comments
About Me
Labels
- Android
- Android Apps
- Android History
- Android Tips & Tricks
- Apple
- Asus T100
- BBM
- Blackberry
- Blogger SEO
- Boost website traffic
- Bug Bounty
- Defacement
- Future Cars
- Gadgets
- Galaxy s4
- gaming Laptops
- Google Maps 2014
- Hacking
- Hacking Attacks
- Hacking News
- Honda
- Howto
- HP
- HTC
- iOS 7
- Ipad mini 2
- iPhone 5C
- iPhone 5S
- iPhone Apps
- Laptops
- Latest-Gadget
- Latest-Technology
- Learn Hacking
- LG
- Maverics
- Microsoft
- Microsoft Hacked
- Mobile
- Motorola
- New Gadgets
- New Operating System
- os X
- OS X Mavericks
- Playstation
- Samsung
- SEO
- SEO Tips
- smartwatch
- SteamOS
- Technology
- Track Phone
- Tricks
- Vulnerabilty
- Web Hosting
- Website Hacking
- Whatspp Privacy
- Windows Hacking
- Windows Softwares
- Windows Tools
- Windows XP End of life