Tag Archive: Hacking

lockyRansomware, what is it? Defined as “malware for data kidnapping,” it is one of the top security issues in the digital and cloud age, wherein the hacker or attacker encrypts data and asks for ransom (usually a Bitcoin payment) for the decryption key.

Today, another ransomware threatens the online community “Locky” that can hit you if you were ‘unlucky.’ It works similarly like the modus conducted by the banking software Dridex.

How Locky works?

A victim will be sent an email with a Microsoft Word attachment disguising as an INVOICE that requires macro.

[By default, Microsoft disables it due to security reasons. So a user normally will see a warning if an attachment contains it.]

Now if you would enable the macro function, it will run and then download Locky to your PC, according to the Palo Alto Networks.

[It is the same modus operandi used by Dridex, a notorious Trojan that steals banking account details.]

There are suspicions that the distributors of Locky are connected to one of the main men of Dridex because both use the same mode of malware distribution.

If you or your organization happens to be the unlucky target, your files will be unrecoverable unless you have a regular backup or if your data has not been touched yet.

Lately, the Hollywood Presbyterian Medical’s computer system was infected by ransomware in which the hackers ask for 9,000 bitcoins (or approximately US$3.6 million).

Reports indicated that the operators behind Locky may have conducted a large attack. Palo Alto Networks revealed that it had detected 400,000 sessions that used the same downloader “Bartallex,” which is the one that deposits the infection onto a computer system. Over half of the targets were recorded in the United States and the rest included Australia and Canada.

Locky utilizes its command-and-control infrastructure for conducting a memory exchange before encrypting the files.

Kevin Beaumont from Medium said that encrypted files have the ‘.locky’ extension. He wrote guidance on how to figure out who among the people in an organization has been infected and recommended that the active directory account of the victim must be locked and its network access must be shut down. Finally, he said that you are more likely to rebuild the victim’s PC from scratch.

Check out the full story here.

Screen-exclamationBusinesses face a huge data risks and fraud. These risks include hacking of personal information, financial accounts, credit card information, and other sensitive data. Safeguard your business from these risks by using a password manager for generating strong passwords. Make sure that these passwords are kept safely at all times.

Perform encrypting procedures such as two-step verification that requires anyone to type the password twice or more, or ask for a verification code before accessing an account. All business personnel must be warned about phishing attacks, links and malware from unsolicited emails, and attempts to access company information. Lastly, use VPN keep sensitive information from untrusted users.

Source: IT Portal

Screen-exclamationThreats on cyber security are evolving rapidly in this age and time, and many companies are falling behind in employing proper security measures. Last year, the Industrial control systems had been targeted by the malware called BlackEnergy and it is sad to say that the creation of patches to the systems were slow. Another prime target of cyber security threats is the healthcare industry. Airplanes are also prone to hacking. Just recently, Chris Roberts made the news when he hacked an aircraft’s systems and made it fly sideways. In light of these events, companies should thoroughly consider the risks involved with connectivity and regularly test their systems.

Source: TechCrunch

mail2Brien Mc Elhatten of ‘The List’ talks about Ransomware, what it is and how much it will cost you. According to his conversation with a tech expert from Data Doctors, Ken Colburn, it all starts with an email. The content of the email is so deceptive that there’s a very high possibility that the recipient will undoubtedly click the link on the email. And once the link has been clicked, all files in your computer will be encrypted and scrambled by a hacker. The worst part is that the only way to get your files back is to pay a hefty ransom which can reach up to 1,500 dollars.

Source: ABC Action News

Computer-ErrorHow do you keep yourself safe online? One is to use strong passwords, something to prevent you from experiencing any hacking incident. Each account should have a different password, but avoid settling for weak, easy-to-guess ones.  Activate two-factor authentication if it is offered. In this case, a cyber criminal will not be able to get into your account unless they can get their hand on your Smartphone.  Two, choose a cloud service to protect your data better. Read the full list of tips from the source.

Source: Blogher

Screen-exclamationEveryone wants to be safe and secured especially during this day when scams and breaches are rampant across the globe. The following tips will help you get through:

First, practice two-way authentication, especially when logging in into a different device. Second important thing is to keep your browser, anti-virus, firewall and device up-to-date. Also, have your browser checked-up every now and then for security purposes. This will keep cyber attackers from exploiting your account.

It is also important to have safe and complicated passwords – items that hackers would not be able to guess. Lastly, access secured websites by using HTTPS on the search tab.

Source: Mashable

 

Cyber Attacks and Protesters

Screen-exclamationCyber attacks are threatening the security of all government departments and agencies was reported in West Africa last January 21. The attacks were said to have been caused by the support of the Senegalese President, Macky Sall’s support for Charlie Hebdo, from the French Magazine. The attacks successfully penetrated 11 of the 58 government websites and were supposedly headed by one, Alsancak Tim.

The hacker, claiming responsibility by the name of Imam Sadiq tweeted messages expressing support for ISIS and Muslim Radical groups. This has lead people to believe that the government should focus more on the what the messages they convey as they help determine the magnitude of the cyber attack operations.

Source: CIO

Computer-MouseNinety hackers from seven countries including China, Japan, Poland, Russia, South Korea, Taiwan, and the United States gathered together at Japan’s Security Contest (SECCON) 2014 held in Tokyo.The objective of the contest is to encourage young Japanese engineers toexplore the field of cyber security. One of the event highlights is hacking six virtual servers to unlock keywords stopping cyber attacks.

Yoshinori Takesako, head of the organizing group said that the event aims to use young talents for a better cause. SECCON is supported by several government agencies, technology companies and experts who aim for a better cyber field in Japan.

Source: GMA Network

BitDefender 2015: Best Protection for Your PC EVER!

BitDefender 2015: Best Protection for Your PC EVER!

Considered to be one of the best antivirus programs that exists, the BitDefender 2015 has high end and top notch security specs that is unparalleled and of course comes at a relatively cheaper price (for the full version). BitDefender 2105 has a very impressive software system that definitely outdoes its previous versions.

A full investment on a properly working and highly effective virus scanner and computer protector, as a matter of fact, it is also suggested that you have multiple virus programs just to make sure that you are protected. Don’t leave your computer at risk; see how BitDefender 2105 can help your computer and your work from future harm:

  • Protects your device from malware

Malicious software—from the name alone, you have to hate it. It is one of the most infectious, most infamous system bugs on your computer. Why are they malicious? Because the computer does not easily detect it, therefore making your device more prone to damage. BitDefender 2015 scores high with Malware detection and removal.

  • Secures yourself and your family

BitDefender not only offers virus protection but also security for your internet usage. Most of the information we type on our computers are not the ones we would like to share with the rest of the world. BitDefender 2105 scans your internet activity and prevents spywares that may share unwanted information. This also alerts you against online scammers that may wipe out your entire bank account.

  • Lets you use high performance software

That requires you nothing at all! This highly efficient software scans, detects, protects and quarantines at an ultra-fast rate no matter what operating system you are using. The beauty of BitDefender 2105 is that it adapts to your device, meaning it will not consume all your PC’s work power just to scan and to work effectively. It partitions its task usage effectively, which therefore, doesn’t slow down your computer. And all you have to do is installing.

bitdef2015

Also enhanced:

  • Parental controls
  • Vulnerability Scanners
  • One-step payments
  • Safe online banking and shopping

Continuously awarded as one of the best anti-virus programs in terms of system development and system speed and protection capability, this software system is no waste of money; the BitDefender 2015 is a good investment when it comes to protecting your devices and your family, even while you’re asleep.

Get your BitDefender 2015 today, or upgrade here. You can also get BitDefender for Mac.