Ransomware

Prevention to Ransomware Attacks

The article has divided the ransomware preventions steps into two categories: The first category describes the strategy on the system level. The second strategy is depends on human factors, one has to implement and practice these to build the sixth sense in term of information security.

Strategy I (On the System)

1.       Data Backup (Online and Offline): This is the most important task that everyone must do. It is highly recommended to take data backup on both online (cloud etc.) and offline (local HDD backup etc.) mode on regular basis to protect your data for any further ransomware attack and destruction.

Ransomware - Are we doing enough to prevent ?

Ransomware - Are we doing enough to prevent ?

Ransomware are malicious code designed to block access to a computer system, executes a crypto-virology attack that adversely affects files until a sum of money is remunerated. They act like a hostage kidnapper, makes you pay a ransom cash towards freeing the system back. The average ransom demanded today is about 500$ to 1000$. Most ransomware either restrict the application access of the legitimate user or are of encrypting type. Ransomware hackers demand payment mostly is the form of bitcoins, ensuring anonymity.

Ransomware - Are you safe?

Ransomware - Are you safe?

In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare facilities and hospitals worldwide. Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it.Ransomware is malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. 

How to prevent mobile malware?

How to prevent mobile malware ?

Malware is short for Malicious softWare, which is designed to damage or even disrupt the computer. The array of malware ranges from spyware to key loggers; some are for financial malware and includes ransomware. Protection against Malware is ‘anti-malware’ products in the simplistic terms, and there we have it.  Not much of an article though is it!! So let’s dig deeper into the subject mobile malware prevention.

Vendors such as Sophos, Trend, MacAfee, Symantec or Kaspersky give deeper ways into the prevention. Equally, the ‘User’ must use common sense and it’s down to ‘ownership’ of the problem.

Insight onto the problem

To precise, in 2015 Kaspersky identified the following:

Ransomware - a growing threat , more and more stories day by day

Ransomware - a growing threat , more and more stories day by day

Kidnapping for money is something common in various parts of the world today. In Cyber Security too, we are facing this in the form of Ransomware, a new way of kidnapping and some people call this as Digital kidnapping.  Here the Cyber criminals kidnap our valuable data and hold them as a hostage. Think about a situation where an organization’s entire system is held as hostage by an outside party and are unwilling to release it until a ransom is paid.  Not only valuable data, in this IoT era where we use Smart TV’s, smart watches, smart fridges, and we already witnessed car hacks, a cyber criminal can hack those and ask ransom to get it back. Imagine a situation where you are driving a car and a criminal gets your vehicle control and asks for ransom to give you back the vehicle control.  Day by day, we are hearing a lot of ransomware stories, most of them targeting health care organizations.

Apple: sour or still sweet? KeyRaider infects 'jailbroken' Apple iPhone users in 18 countries

Apple: sour or still sweet? KeyRaider infects 'jailbroken' Apple iPhone users in 18 countries

Recently, a malware 'KeyRaider' has compromised 225,000 Apple iPhone users accounts. This is considered to be one of the biggest attack against the firms user base. KeyRaider, a new strain of malware identified by researchers at Palo Alto Networks, affects only jailbroken devices, researchers at Palo Alto Networks said. The traces of distribution of this malware has been found in 18 countries so far. This malware is also acting as a ransomeware. It can send notification message demanding a ransom directly using the stolen certificate and private key, without going through Apple's push server.

Subscribe to RSS - Ransomware