
Cipher Tech.
Where Safety is Visioned through Awareness
Cipher Tech.
Cipher Technology visioned to change the world, the world where no one is harmed and peace both in physical and screens by making planed and determined goals. We are determined to make an impact and to give the world safety measures. The core of our efforts is to bring our team’s fresh ideas and passion to the range of activities we’re involved in by giving awareness, practices and products of certain causes of any countries concerns especially in involving the internet which nowadays propagates and is getting worst.

Meet the Team
Creators of Cipher Tech.
Since our founding in 2000, Cipher Technology has developed and grown in a positive direction. We’re very proud of the diversity of our staff, and their abilities to contribute their own unique experience and skills to our success.
Services
Cipher Technology has always been determined to make a change through evaluating circulating concerns in the entire globe. The team always visioned that being a victim of such concerns are cause by the lack of knowledge of the citizens. Cipher Technology believes that if citizens are aware of the concern, they're one step closer of being safe and for them to be fully secured, the team expands the idea to give practices that will make them to be engage to attain more skills and knowledge. Cipher Technology also innovate secured products such as software for internet crimes to help the entire world to achieve safety and peaceful community.
Awareness
Unified Quality
Practices
Exceeding Expectations
Products
Satisfaction Guaranteed
Ethical Issues
A NEW AGE OF CRIME

THE TRUTH ABOUT CYBERCRIME:
“HOW CRIMINALS MOVED FROM PRISON TO THE WEB”
Cybercrime is any criminal act that involves a computer or other network connected device, the Internet, or Computer Technology. The two most common types of cybercrime are phishing and malware.

Phishing
Phishing emails are designed for trickery and appear to be from legitimate organizations like your bank or the government agency. The emails request updates, or confirmation of account information, often suggesting there is a problem. You're then redirected to a fake website and tricked into entering your account information. The information which is used can result in compromising your account, identity theft and even financial loss.

Signs it's a scam
1. Urgent or threatening tone.
2. Email address doesn't match sender's name.
3. Unexpected attachments.
4. Generic greeting.
5. Typos, misspellings, and improper grammar.
6. Fake web addresses made to look legitimate.
7. Link text and destination differ when hovered over.

If you think you've fallen for a phishing scam
Change your password immediately.
Turn off your computer and alert your system administrator, who will check to determine if any malware has been put on your machine and remove it. If you don't have a system administrator, contact the IT Help Desk.
Check whether your Email forwarding has been changed.
From your Email profile page, check your alternate email address to ensure it hasn't been changed.
Check your Email ID password-reset options to verify they haven't been changed.
If you use similar passwords on other accounts like your personal bank account, healthcare, retirement and so that you can change those passwords as well.
For the next year, review your bank and credit card statements to check for suspicious activity. Change passwords on all relevant accounts.
Check your Sent and Drafts email folders to see if your account has been used to send additional scams to other people. Delete any emails in Drafts to keep them from being sent, and notify recipients of any Sent emails that your previous email was a scam. Use some method other than email to notify those people.

Preventative Strategies
Don't reply to suspicious, unexpected, or strange email.
Be wary of email with urgent requests for your personal or financial information, or your sign in credentials.
Don't open unexpected or unusual attachments, attachments from strangers, or strange looking emails.
Don't click links in unexpected emails, emails you suspect are fraudulent, or if you don't know the sender.
Don't click Sign In links. Go to the business website and sign in there, or contact their customer service for help.
Avoid filling out forms in email messages that ask for financial information. Only share credit card information via secure website or telephone.

Malware
Malware is short for malicious software and is used as a catch-all term to refer to any software that causes damage to a computer, server, or computer network. Malware on your computer could lead to:
Theft of personal information
Spam being sent to other computer users worldwide
Your computer running more slowly
Your computer crashing more often and taking longer to start up
The use of valuable computer memory and hard disk space
The alteration of your computer's settings from what the manufacturer intended
While many of these dangers can render a computer or the data on it useless, there are ways to mitigate the damage, and in many cases to stop the attack before it becomes a problem.

Types of malware
Viruses
A malicious program that usually requires some action on the part of a user in order to infect a computer; for example, opening an infected attachment or clicking on a link in a rigged email may trigger a virus to infect your computer.
Worms
Self-replicating malware that, for instance, hunts down unprotected computers and recruits them for criminal or other malicious purposes. Unlike a virus, worms do not require any action on your part in order to infect your computer.
Trojan horses
A Trojan horse, in software terms, refers to a malicious piece of software that is hidden inside an apparently useful and innocent application. Users systems generally become infected by Trojan horses when they install software or a fake "patch" from an Internet download or an email attachment.
Spyware
Spyware and adware are small software programs that get stored on your computer without your permission, usually when you visit a website, sign up for "free" mailings, or download "free" software. These programs Data Mine, or gather information about your computer use, web browsing, online purchasing and send it to sites that may sell it to others.
Rootkits
Rootkits are designed to give an attacker "root" or administrative access to a victim's computer. With root access, an attacker can perform a variety of tasks on the computer including browsing the infected computer's hard drive, making new user accounts or changing existing ones, or even using the computer's network connection for nefarious purposes.

Preventive strategies
Install antivirus software - All computers connecting to the network must have antivirus software installed.
Install critical software updates - Microsoft Windows Update for PC’s Apple Support Downloads for Mac.
Install anti-spyware software and ensure that it is kept up-to-date.
Be cautious of email attachments - never open unexpected attachments.
Contact Cipher Tech.
Get in touch with Cipher Technology to learn more about our work and how you can get involved.
Valencia City, Bukidnon
0967-203-0950
0917-700-7081

