SUBSCRIBE TO OUR BLOG

Enter your Email Address to get subscribed to our Blog.

Tag

cyber attack

Browsing
Sort by

What is Locky Ransomware? After WannaCry and Petya, another ransomware seems to spreading like wildfire, taking a hold of computer systems all over the globe, this time it’s being called Locky. The Computer Emergency and response team (CERT) under Government of India has raised an advisory on the spread of Locky Ransomware via spam emails. CERT-In published Alert regarding the spam campaign spreading Locky ransomware https://t.co/hzbuyDLjvB — CERT-In (@IndianCERT) September 3, 2017 Quoted from…

What is Petya? The latest ransomware cyber attack ‘Petya/Petrwrap/ExPetr’ or ‘GoldenEye’ has quickly targeted computer systems all over the globe crippling large firms across Europe, Israel, Russia and the US, reportedly starting from Ukraine. It makes use of Eternal Blue exploit as a means to multiply  itself wrecking the system and leaving it inaccessible until a payment of $300 Bitcoins has been made. Kaspersky Lab’s global research director Costin Raiu tweeted on June 28th to…

What is “WannaCry’? WannaCry is a ransomware attack that has (in)famously brought much of the world’s computers and servers to a complete standstill including critical systems such as UK’s healthcare network, Russia’s government systems and those of the Indian state, Andhra Pradesh. It makes use of an SMB (Server Message Block) vulnerability on Windows systems and spread rapidly across networks. How does it work and where did it originate? Many experts suspect that WannaCry aka WannaCrypt was…

According to internetlivestats, as of 2015, there are more than 3.2 billion internet users and 944 million websites and many more being added every second. In this enormous universe of the internet, the importance of having a secure website is critical. Staysecureonline states that more than 1.5 Million  people fall prey to cyber crime every day, that breaks down to 18 people per second. Cyber criminals use exceedingly effective computer software programs that automatically detect…

The digital world has benefited us in hundreds and thousands of ways , enabling us to store data, search, transfer, record, analyse, communicate, buy, sell, share & do SO much more! But the more we rely on cyber space, the higher the risk we face of losing it. What if all of it were breached? What there were a security compromise? That’s a threat that’s quickly becoming a reality closer to you. In light of that, we’re…

0