Posts

Showing posts from December, 2017
Image
Tree key concepts of Information Security  every  IT expert must know. Confidentiality : Refers to protect information from disclosure to unauthorized parties. Method used   are : Encryption Enforcing   file permissions Access Control list to restrict access to sensitive information.    2. Integrity: Refers to protect information from being modified by unauthorized parties.      Method used   is: Hashing Data you receive and comparing it with the hash of the original message.    3. Availability : Refers   to ensuring that authorized parties are able to access the information              when needed. Methods used are : Back up is key Priority Redundancy might be appropriate Having an off-site location ready to restore services in case anything happens to primary data center.   ...

Hackers Infect FacebooK Messanger

Image
Hackers infect Facebook messenger users with malware that secretly mines bitcoin alternative monero.   More info visit : http://www.independent.co.uk/life-style/gadgets-and-tech/news/digmine-facebook-    messenger-cryptocurrency-mining-malware-monero-bitcoin-a8125021.html
Image
Loapi malware capable of destroying Android phones Kaspersky Lab researchers discovered a new versatile malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed the Android phone after two days of testing.   Link: https://www.csoonline.com/article/3243266/security/loapi-malware-capable-of-destroying-android-phones.html    
Image
5 reasons to take a fresh look at your security policy. Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.   https://www.csoonline.com/article/3209160/security/5-reasons-to-take-a-fresh-look-at-your-security-policy.html

TRAINING SESSION HAS TAKEN PLACE ON 22 DECEMBER 2017,TALKING ABOUT PREVENTION AND DETECTION MALWARE ATTACK

Image
T hanks to  Dr. Arun Lakhotia @DrArunL, Founder and CEO of Cythereal ( www.cythereal.com), from University of LOUISIANA, for training session talking about how to prevent & investigate zero-day malware attacks by malware analysis.     Respect to Dr. Parag ,Dr Digvijay,Mr Dharmesh Dave Lectures from Gujarat Forensic Sciences University.
Image
North Korea rejects U.S. accusation, says it is not linked to any cyber attacks   https://www.reuters.com/article/us-northkorea-missiles-cyber/north-korea-rejects-u-s-accusation-says-it-is-not-linked-to-any-cyber-attacks-idUSKBN1EF0BD?feedType=RSS&feedName=technologyNews&utm_content=buffer19b21&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer
Image
EtherDelta Hacked, DNS Compromised, Funds Stolen                    Source Link :http://www.trustnodes.com/2017/12/21/etherdelta-hacked-dns-compromised-funds-stolen?utm_content=bufferfe618&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer

November 2017 Cyber Attacks Statistics

Image
   http://www.hackmageddon.com/2017/12/20/november-2017-cyber-attacks-statistics/  

what does Cyberspace mean

Image
Definition - What does Cyberspace mean? Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication. It is a large computer network made up of many worldwide computer networks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace's core feature is an interactive and virtual environment for a broad range of participants. Link :https://www.techopedia.com/definition/2493/cyberspac