Posts

Showing posts from December, 2018

Beauty of Dubai- Sheikh Zayed Road

Image

Ransomware and types of Ransomware

Image
What is Ransomware? A Ransomware is a malicious software usually encrypt the victim data or block access to data unless the Ransom is paid. It is using Cryptography methods to Encrypt and Decrypt the data. Commonly there are 2 types of Ransomware methods. 1. CRYPTO Ransomware 2. LOCKER Ransomware CRYPTO Ransomware Crypto Ransomware using strong Encryption method to encrypt the user data. This program usually downloads from Social Engineering attacks. Once the malicious script executed it slowly encrypt the user data and when it completes it demands an Encryption key to decrypt the data. Below is the Example of Crypto Ransomware. Below are some Example of Crypto Ransomware attacks 1.Wannacry 2.Badrabbit 3.SamSam 4.Locky LOCKER Ransomware This types of malware don't encrypt the user data but it will deny access to the computer. To unlock the Victim's system it requires Ransom.

Cyber Security- Phishing Attacks

Image
What is Phishing? Phishing is a kind of Social Engineering attack that steals user data by click malicious URL's, Installing malware programs, Executing malicious codes. Phishing is a method of stealing personal information using deceptive emails or other methods. Common Types of Phishing attack 1. Deceptive Phishing In this type of attack, An Attacker will send you the malicious URL to your Email asking for your personal information, Bank password, credit card details. So make sure the Email which you opened is from a legitimate sender and also verify the email body. 2.Spear Phishing This is also Email spoofing attacks, An attacker will send you the malicious link to redirect your request. This type of attack commonly focuses on financial based organization. 3. CEO Fraud What you will do if you are receiving an Email from your Big Boss asking you to click the link or open an attachment. This type of attack will spoof your own organization Email addre...