Militant groups and criminals are taking advantage of the simplicity of ordinary people.

in #information8 years ago

download-1.jpg

Today, we often get some strange messages on our mobile or Facebook, for example, all Android phones will be inserted into Blue Whale games from 9 am to 10 pm, keep the mobile off for one hour. -----------
If you send this verse to 10 people, then the biggest hope will be fulfilled or you will get bad news if you do not send it. --------
It is the picture of the only companion tree, share the picture with 10 people.
Human-shaped trees prostrate under the Pacific Ocean Share this image with 10 people. More such types of massage. All those pictures are spread through Facebook or other social media.

download-2.jpg
Cyber ​​security experts say that seeing these messages or images, there should be a bad idea.

Sometimes these messages or images are posted behind the terrorist message or hacking software links. It may open up to the concerned militant or hacker to open or share personal information on your mobile or computer. So they should be careful about these.

images.jpg if a militant uses mobile, emo, messenger or any such device and app to exchange any information, then law enforcement forces can catch them and hold them. That is why they use their software to spread their important information behind a photo involving religious feelings. The ordinary people do not know anything about this.images.jpg

He said, sharing the picture from the place of religious sentiment or in the hope of a reward. At the same time, enticing people to share their contacts. If someone does not want to share the belief of the person is lost. On the other hand, militants know that such images can mean a message. So using the technology to recover the message.

It is seen now that no militant groups can directly teach their workers' weapon-making techniques or can not supply plan and maps of major attacks. In this case, using such software, you can add a soft copy of the design and all the rules of the weapon.
Or a big attack message behind the photo or added the message behind. When the concerned militants got this message or photograph, they checked it. At one stage, the hidden message was found. Later, they developed the weapon-making technique, and the weapon made the weapon. Or find the hidden message.

Open Strego, Strooge analysis, or using such software or site to add information behind the photo. Again, using the same software to read or see the hidden messages. However, such software is available free of charge on the Internet. Its ability to work is less. Criminals now share their message using many advanced technologies. So free software is unlikely to retrieve hidden messages behind those pictures.
images-1.jpg

Apart from this, the warnings that have spread to the links of the Blue Whale Games are now known to criminals by knowing your GPS location. If you target a terrorist group, you can send messages intended to kill you without knowing the location.

You can also send messages by blackmailing your bank account and with the necessary personal information. You can also hack the account money automatically. The message or the way to escape from the trap of the message is not sent to anyone. Do not share pictures. Avoid such things in front of you.