Cyber attacks

Online Scams - Lets get smarter to protect self

Online Scams - Lets get smarter to protect self

Scams are some kind of deceitful games or fraudulent schemes for gaining quick profit. This is the most dishonest way to make money and defraud millions of people every year. Nowadays, we can find online scams almost everywhere. We must be aware of such kind and also know how to keep ourselves secure and safe. These scams can be in any form, from social platforms to private mail accounts. An awareness has to be provoked against us to protect ourselves from such kind of attacks. These scams hardly need any technical skill to execute and easily people fall for it.

21 Most Common Cyber Security Attacks in a Nutshell

Most Common Cyber Security Attacks in a Nutshell

With the advent of cashless economy post demonetisation, cyber-attacks are on the rise. Social platforms make us aware of how can we protect ourselves from these attacks. But do we really know what kinds of cyber-attacks exist? Some of the attacks are meant to monitor the information, while others are meant to destroy the data or network. Just like our parents advise us not to talk to unfamiliar person, the same applies to virtual world as well. How can you be sure that the bank that you are trying to log into is not forged? If you are not wary about the following type of cyber-attacks, your network as well as your data – both are at risk.

US Energy Sector Damage from Cyber Attacks Possible but Not Likely?

US Energy Sector Damage from Cyber Attacks Possible but Not Likely?

In January 2016, the U.S. Department of Homeland Security issued an Intelligence Assessment, prepared by the Office of Intelligence and Analysis (I&A) and Coordinated with the Industrial Control Systems Computer Emergency Response Team (ICS-CERT). The report concluded:

Damaging Cyber Attacks Possible but Not Likely Against the US Energy Sector.

Energy Sector readers beware!

The intelligence Assessment conclusions are based on reported incidents. However, the type of intrusions of greater concern would be more like “sleeper agents," difficult to detect and unnoticed until activated. In his 2012 book CYBERWAR, Richard C. Clarke wrote: “In anticipation of hostilities, nations are already “preparing the battlefield.” They are hacking into each other’s networks and infrastructures, laying in trapdoors and logic bombs - now, in peacetime.”

How to deal with the annoying virus hoaxes?

How to deal with the annoying virus hoaxes?

Few years back, I got an email from my colleague warning me about a virus. I went through the distribution lists in that email and it seems this has been forwarded by multiple people requesting everyone to forward this as it has the information about a virus that seems to be dangerous in nature. My colleague had forwarded this with good intention, to educate or alert me and his friends. I went through different reputed antivirus websites to check the details of this virus and was not able to find any information related to this.

The new stages of a Cyber Attack

The new stages of a Cyber Attack

The stages of an attack: (adapted to the new world order)

Traditionally attack had three phases associated with it. Reconnaissance, Attack and Recovery. However, the digital world has changed with the current geo-political climate. And this is manifested in the change in the stages of an attack as well. Some of these are additions, while some others are entirely new in the attack lifecycle. As with normal cycles of innovation, attackers are consciously trying to automate some stages and the interludes between stages to make the attacks “dummy proof”. No wonder then, that some attacks in their advance variants can be done by a “fool with the tool”.

Subscribe to RSS - Cyber attacks