Enter your Email Address to get subscribed to our Blog.

Category

Security Beat

Category
Sort by

Security has always been of utmost concern when it comes to users and their data. Be it web pros, resellers or the customers, all of us use computers, servers and mobile phones in some form or the other. All of these devices work with an inbuilt processor. In this post, we’ll decode the confusion and commotion that has left the IT industry in a disarray with recent security vulnerabilities, that was found to affect Intel…

When you purchase a domain name, there are several add-on features that you can choose to purchase along with your domain. Some features are useful to everyone while some may only be relevant only to a certain set of users. Many-a-time when we realize a service is an add-on we assume that it might not be worthwhile – it is healthy to be wary of unnecessary up-sells, of course, but it is also a good…

What is OpenSSH? OpenSSH is a suite based on SSH (Secure Shell) protocol providing a secure network for services like remote login or remote file transfer. OpenSSH is also known as OpenBSD Secure Shell and was initially developed as a part of OpenBSD operating system. What are the features of OpenSSH? OpenSSH is freely available for everyone, their code encourages reusing and auditing of the code. OpenSSH has a secure tunnel to forward remote TCP…

Are you a pro user of Linux, probably Dedicated Servers or Virtual Private Servers? If yes, then I’m sure the security of your web hosting is a concern that you cannot take lightly. Viruses, worms and other malicious entities are always evolving to beat the latest defences that system architects and security companies can devise. Hence, it is a good practice to be prepared and ClamAV antivirus is the best choice, with it being available…

What is Bad Rabbit Ransomware? Ransomware attacks are on the rise and, the recent one that’s making headlines this week is the Bad Rabbit Ransomware. The malware is said to be linked to the previously released Petya ransomware and inspired by Game of Thrones as the code contains references to the Dragons featured in it. Bad Rabbit ransomware has affected corporate and media houses in Russia and Ukraine and appears to be affecting Turkey and…

What is Locky Ransomware? After WannaCry and Petya, another ransomware seems to spreading like wildfire, taking a hold of computer systems all over the globe, this time it’s being called Locky. The Computer Emergency and response team (CERT) under Government of India has raised an advisory on the spread of Locky Ransomware via spam emails. CERT-In published Alert regarding the spam campaign spreading Locky ransomware https://t.co/hzbuyDLjvB — CERT-In (@IndianCERT) September 3, 2017 Quoted from…

What is Petya? The latest ransomware cyber attack ‘Petya/Petrwrap/ExPetr’ or ‘GoldenEye’ has quickly targeted computer systems all over the globe crippling large firms across Europe, Israel, Russia and the US, reportedly starting from Ukraine. It makes use of Eternal Blue exploit as a means to multiply  itself wrecking the system and leaving it inaccessible until a payment of $300 Bitcoins has been made. Kaspersky Lab’s global research director Costin Raiu tweeted on June 28th to…

What is “WannaCry’? WannaCry is a ransomware attack that has (in)famously brought much of the world’s computers and servers to a complete standstill including critical systems such as UK’s healthcare network, Russia’s government systems and those of the Indian state, Andhra Pradesh. It makes use of an SMB (Server Message Block) vulnerability on Windows systems and spread rapidly across networks. How does it work and where did it originate? Many experts suspect that WannaCry aka WannaCrypt was…

Looking at the top left in Google Chrome, you may see a red X–Google’s way to denote unsecured SSL (Secure Sockets Layer). Non-HTTPS sites also face consequences of the 2016 update to Google’s security measures, potentially confusing WordPress users and other login pages that appear to have been compromised (while this is just Google’s way of denoting a non-HTTPS site). Also, as consumer electronics manufacturers release new and more complex gadgets, security is likely to…

In November 2016, hackers attacked a US state government website and caused systems to crash for a few weeks. The Indiana county website struggled to get their systems running again in spite of having a backup of their website. Why? All their website data was backed up on their own computer network. The most secure way to fix a website that has been hacked and injected with malware is to restore it from the most…

0