Enter your Email Address to get subscribed to our Blog.

Tag

virus

Browsing

What is Bad Rabbit Ransomware? Ransomware attacks are on the rise and, the recent one that’s making headlines this week is the Bad Rabbit Ransomware. The malware is said to be linked to the previously released Petya ransomware and inspired by Game of Thrones as the code contains references to the Dragons featured in it. Bad Rabbit ransomware has affected corporate and media houses in Russia and Ukraine and appears to be affecting Turkey and…

What is Locky Ransomware? After WannaCry and Petya, another ransomware seems to spreading like wildfire, taking a hold of computer systems all over the globe, this time it’s being called Locky. The Computer Emergency and response team (CERT) under Government of India has raised an advisory on the spread of Locky Ransomware via spam emails. CERT-In published Alert regarding the spam campaign spreading Locky ransomware https://t.co/hzbuyDLjvB — CERT-In (@IndianCERT) September 3, 2017 Quoted from…

What is Petya? The latest ransomware cyber attack ‘Petya/Petrwrap/ExPetr’ or ‘GoldenEye’ has quickly targeted computer systems all over the globe crippling large firms across Europe, Israel, Russia and the US, reportedly starting from Ukraine. It makes use of Eternal Blue exploit as a means to multiply  itself wrecking the system and leaving it inaccessible until a payment of $300 Bitcoins has been made. Kaspersky Lab’s global research director Costin Raiu tweeted on June 28th to…

What is “WannaCry’? WannaCry is a ransomware attack that has (in)famously brought much of the world’s computers and servers to a complete standstill including critical systems such as UK’s healthcare network, Russia’s government systems and those of the Indian state, Andhra Pradesh. It makes use of an SMB (Server Message Block) vulnerability on Windows systems and spread rapidly across networks. How does it work and where did it originate? Many experts suspect that WannaCry aka WannaCrypt was…

The digital world has benefited us in hundreds and thousands of ways , enabling us to store data, search, transfer, record, analyse, communicate, buy, sell, share & do SO much more! But the more we rely on cyber space, the higher the risk we face of losing it. What if all of it were breached? What there were a security compromise? That’s a threat that’s quickly becoming a reality closer to you. In light of that, we’re…

In our previous Blog post, we informed you about hosting packages on our Linux Hosting environment being affected by Gumblar Attacks. Over the past few days, we have been investigating these attacks, and working on methods to mitigate the damage caused by them; our findings and recommendations are as follows: Through our investigations, it was confirmed that the infection was not due to any server vulnerability. We enforce stringent security measures to safeguard your data.…

0