Posts

Showing posts from September, 2018

Malware Overview

Image
Malware Overview A malware can cause harm to a system or a network directly, or subvert them to be used by others, rather than as intended by their owners. It is a combination of two words: Mal meaning Bad and Ware meaning Software. Malware can be designed from the hackers for different purposes like destroying data, sending the data automatically to some other place, altering the data or can keep monitoring it until the specified time-period. Disable security measures, damage the information system, or otherwise affect the data and system integrity. Types Malwares are diverse; they come from different functions and behave differently under various situations. Some of the most infamous and dangerous types of malwares are given below: Virus Adware Spyware Trojan Rootkits Botnets Ransom Ware Let us understand each of these in detail. Virus Virus is a malware program that acts in an interesting way. This program executes or replicates itself by putting-in some c

Malware RemovalProcess

Image
Malware RemovalProcess In this chapter, we will understand how to go through the cleaning process of a computer, which has been infected by any type of malware. Let us follow the steps given below. Step 1 − To begin with, we need to disconnect the computer from the network, which can be a cable connection or a wireless connection. This is done so that the hacking process loses connection with the hacker, so no further data can continue to leak. Step 2 − Start the computer in Safe Mode, only the minimum required programs and services are loaded. If any malware is set to load automatically when Windows starts, entering in this mode may prevent it from doing so. This is important because it allows the files to be removed easier, since they are not actually running or active. Starting a Computer in Safe Mode Starting a computer in a safe mode can vary from Windows 7 to Windows 10. For the Windows 10 OS, the steps are as follows − Step 1 − Press the Windows logo key +

What is Ransomware and How to Stay Protected

Image
Ransomware is a type cyber attack which uses malware to affect the files on the computer by holding them hostage so that the user has to pay a sum of amount in order to to release the affected files. Once the files falls into the trap of ransomware attack it cannot be accessed through any means unless and until it is released by the group which has caused the attack. Who is Affected by Ransomware? All kinds of business which are done online are affected including small scale and large scale business. Sometimes cyber criminals even target home computers just so they can get some extra money as they have poor security. Even some of the organizations will be targeted as they have vast databases and needs to be protected all the time. These organizations pay to keep their networks safe from attacks by ransomware. But those who cant afford to get security will be easily targeted. Can Ransomware be Prevented? Ransomware can be prevented by following some of the simple procedures:

Computer Security - Terminologies

Image
In this chapter, we will discuss about the different terminology used in Computer Security. Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details. Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc. Threat − Is an action or event that might compromise the security. Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system. Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It violates security. Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from malicious software. Social Engineering − Is a technique that a hacker uses to stole data by a person for different for purposes

What is CAPTCHA and How it Works?

Image
What is CAPTCHA and How it Works? CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So, in this post you will find a detailed information on how CAPTCHA works and why it is used. What Purpose does CAPTCHA Exactly Serve? CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example, while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensu

Benefits of Using BCC While Sending an Email

Image
Almost every user on the Internet sends and receives hundreds of emails on a regular basis. However, only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of what BCC is all about, then this is the post that you should definitely read! What is BCC? BCC stands Blind Carbon Copy. It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those recipient addresses in the To: filed. When emails are sent in this way, each receiver is able to see the complete list of all the recipient email addresses to which the same message if being sent to. Unlike the To: field, the BCC: option on the other hand allows you to hide the recipients in email