Wednesday, March 4, 2020

what is a virtual ransomware actually


They called Wanna Cry a computer ransomware virus because it arbitrarily captures your computer, encrypting all the data on your hard drive without your knowledge. And for the right to access your own information, a ransom in the form of bitcoins is required. Residents of 74 countries suffered from this virtual terrorist. Informburo.kz found out why this virus is so dangerous and whether it can be defeated.

Encrypt me completely

Wanna Cry has a very atypical nature for malware. As network security specialist Ilya Filimonov told Informburo.kz, this is essentially not a virus. Therefore, the usual methods of protecting computers will not help you here.

“It's just a program that encrypts data,” Ilya Filimonov explains. “It runs without the knowledge of the user. It has a built-in encryption algorithm that works on a 1024-bit key. It's a sequence of characters in a row. You can't pick it up without knowing the key. So that Wanna Cry is not really a virus, but rather a program. And the people who launched it are not hackers. They are just intruders. To decrypt your data, you need to enter the primary key. They basically sell this key. "

Wanna Cry is a pretty straightforward invention - you don't have to be a genius to create it. And to recognize this program is almost impossible.

"The people who created Wanna Cry simply took the codes in the public domain and simply started using the Windows system vulnerability to force the execution of their program. This program takes up very little space, it can be placed in a simple doc or pdf file. For example, you some kind of agreement will come from the address that you know. And that’s it, ”says Ilya Filimonov.

Friday, February 28, 2020

what is ransomware?

There are various pernicious programming and infections, each undermining in its field.

A portion of these product will in general make suspicious promoting exercises on your web program, while others take your own data, and some work unnoticed out of sight without you taking note.

Ransomware, one of the most unsafe and pernicious programming, has been on the ascent lately.

define ransomware

Ransomware is a kind of vindictive programming that causes financial solicitations from unfortunate casualties by taking steps to access, to distribute, and erase significant individual information.

Ransomware assaults can bring about catastrophe, and once they taint your PC, it is extremely hard to manage these product. Forestalling an assault before it happens is an increasingly powerful methodology.

Here you can discover our guide on the best way to forestall ransomware and what to do if your information on your PC is undermined.

What are the sorts of ransomware?

Ransomware is a wide umbrella term that covers a wide assortment of malware types.

Be that as it may, there is one thing normal to them all: compromising you or your information to get recover.

Various sorts of ransomware to consider are:

Crypto Ransomware

This specific ransomware type; it checks information from your PC or system that it thinks might be especially significant.

It joins reports, for example, content to be scrambled, spreadsheets, pictures, PDFs and that's only the tip of the iceberg.

For the most part, the remainder of your information is unaffected and you can in any case utilize your PC in spite of this product. In any case, you can't get to the information it scrambles, and pernicious programming constrains you to pay a payoff to open it.

Most ransomware requests $ 200 to $ 900 from exploited people. On the off chance that the payment isn't paid inside 48-72 hours, the information is normally erased until the end of time.

Bureau Ransomware

Bureau ransomware doesn't separate about records it will encode. At the point when it enters your PC, it can bolt everything!

In the event that you can't sign in to your PC or even utilize fundamental errands as a result of an undermining buy-off message, you are in all probability influenced by bureau ransomware.

Scareware

Like closet ransomware, scareware programming frequently confines all entrance to your PC and information. The distinction between these two programming is that an alternate strategy is attempted to get scareware deliver installment.

You may see a window that supposedly "filters" your PC for issues. The product will discover a portion of these issues and will offer to fix them for you - obviously, it will demand to do this to an exceptionally high sum.

You won't dispose of this message or keep utilizing your PC until you pay the payoff.

Doxwar to

Doxware, an extraordinary ransomware, isn't just about erasing or confining access to your information.

On the off chance that you don't pay the payoff, the product compromises you to hazard your photographs or recordings, and to spread delicate data over the Internet, for example, your own data or monetary information.

Doxware can be completely annihilating for the two organizations and private people.

Thursday, February 27, 2020

what is ransomware attacks

what is ransomware attacks

Like many other hacker tools, over the years, DDoS attacks have evolved from fun for bullies and romantics into a tool for criminals and unscrupulous political rivals. Germany is no exception.

Cyber ​​attacks - targeted actions against Internet servers - are increasingly becoming an instrument of economic or political pressure.

The general public first learned about the so-called DDoS attacks (English - “distributed attack leading to denied access”) in 2000. Then hackers paralyzed the work of a number of popular servers, including Amazon.com, Yahoo! and eBay. One can only speculate about the motives of hackers, but most experts believe that then hackers were guided mainly by sports interest. In recent years, the situation has changed.

Zombie computers

The essence of a DDoS attack is as follows. A huge number of so-called "junk requests" begin to arrive on the server chosen by the hacker as a victim. This causes an overload, as a result of which the website becomes inaccessible to real users. He either can no longer recognize their requests due to "noise", or simply "collapses."

Often, to send out false requests, a hacker uses computers of other users who are not even aware that they are becoming accomplices in a crime. Attackers send a Trojan to computers of third parties, which is activated after the receipt of the corresponding command. Computers of such users are called "zombies", and the network of such PCs is called bonet.

Against the media and dissent

In Russia, they started talking about DDoS with the onset of the election year. The websites of the organizers of the "March of the Dissent", radio "Echo of Moscow", and the publication "Kommersant" were attacked. Soon after the escalation of the conflict around the monument to the Soldier-Liberator in Tallinn, the servers of Estonian government bodies were littered with garbage requests. As a result, the authorities were forced to close their online representations for a while.

New ransomware tool

User in front of a computer screen
For DDoS attacks, hackers use computers of innocent users

In Germany, the problem of DDoS attacks is also familiar firsthand. According to Matthias Gärtner, a spokesman for the Office of Information Technology Security under the Ministry of Internal Affairs, extortionists most often resort to such methods.

"A few years ago, DDoS attacks were mainly the tool of romantic hackers," Gertner said in an interview with DW-WORLD.DE. However, these times are long gone. "

DDoS attacks have become a tool for real criminals, and most often international gangs resort to it. To complicate the work of the investigating authorities, hackers use the north, located in another country, to conduct an attack on the website of a German company. And zombie computers are scattered all over the planet.

Easier to pay

At the same time, the scale of such crimes in the German Ministry of the Interior is not taken. As in the classic cases of extortion, the real figure is much higher than the number of complaints received. Many entrepreneurs believe that it is better to pay off than to risk the reputation of the company.

Mathias Gertner recalls the case when a company, deciding not to succumb to blackmail, paid for it with a loss of customers. The extortionists published on one of the Internet sites the credit card numbers of customers that they had previously “removed” from the company's server.

Gun of extremists

Neofascists in Germany
Extremists are increasingly resorting to hackers

DDoS hackers did not stay away from politics. According to the Federal Office for the Protection of the Constitution, representatives of the right and left extremist scenes regularly exchange such attacks. So, in November 2006, a site was subjected to a powerful DDoS attack, on which several leftist extremist groups called for the disruption of the neo-fascist march. True, the leftists turned out to be prepared for a virtual attack: the server managed to filter out spam requests. Left-wing organizations also systematically launch DDoS attacks on websites of right-wing extremists.

A spokesman for the Ministry of the Interior declined to report whether German government sites were heavily attacked by DDoS hackers.

"Government servers, like many others, are sometimes forced to repulse such attacks. However, to call specific numbers means to inform hackers about the degree of vulnerability of our sites," Mathias Gertner explained.

Friday, November 22, 2019

India offers weak telecom firms two-year ban on installments


India has allowed the nation's ambushed telecom mammoths a ban on range installments until the finish of March 2022, offering truly necessary rest after the Supreme Court slapped an enormous $13-billion bill on the organizations.

Vodafone Idea and Bharti Airtel endured the worst part of a month ago's court administering requesting firms to pay a joined 920 billion rupees in past range and permitting charges.

The judgment saw Vodafone Idea record the greatest quarterly misfortune in Indian corporate history a week ago after it considered in the $4 billion duty.

Be that as it may, New Delhi offered a proportion of alleviation to the battling division late Wednesday, with the bureau affirming a ban on range installments for the following two money related years.

"Delay of range closeout portions will facilitate the money outpouring of the focused on (telecom suppliers) and encourage installment of statutory liabilities and enthusiasm on bank credits," the bureau said in a public statement.

Vodafone Idea and Bharti Airtel, which was hit with a $3-billion bill, have cautioned that the decision will fuel the telecom area's money related burdens.

The declaration didn't seem to do a lot to enable the offer to cost of either firm, with Bharti Airtel down two percent and Vodafone Idea losing four percent on Thursday morning in Mumbai.

Notwithstanding looking for the deferral of installments, the British parent organization Vodafone had likewise requested a decrease in permitting expenses.

Vodafone's CEO Nick Read said a week ago that the telecom firm was confronting an emergency in India and would not put any greater value in the nation since the South Asian market contributed zero to its worldwide offer valuations.

Vodafone Idea and Bharti Airtel have both battled since India's most extravagant man Mukesh Ambani propelled Reliance Jio in 2016. The new portable administrator has offered very reasonable web and free calls.

Read more

Tuesday, November 5, 2019

Key roles and tasks of the Cyber ​​Security Architect

Architect of cyber security according to the law on cyber security 181/2014 Coll. ensures the design and implementation of security measures within CII. In practice, the architect is responsible for designing secure architecture (from infrastructure to application level), including its subsequent implementation. 

There can be more architects in the organisation, each with their own speciality, such as network infrastructure, operating systems, security components, etc.



  • He is responsible for promoting security within the architecture of an organization that is part of CII
  • It creates a conceptual plan, based on the instructions of the Cyber ​​Security Committee
  • He is responsible for managing the life cycle process within the KII architecture
  • Manages the use of security management resources within CII
  • It creates, revises lists of countermeasures to the findings of risk analyzes, security audits
  • Based on the manager's instructions, KB specifies security measures
  • Based on the instructions of the manager, KB implements security-technical countermeasures
  • Involved in the risk management process
  • Involved in investigation of security incidents
  • It regularly reviews the effectiveness of security measures
  • Provides support for communication with GovCERT / CSIRT
  • It provides documents for drawing the funds necessary for the implementation of security measures
  • Reports the status of security measures to KB Manager
Get more info about   Security Architects Salary 

Tuesday, October 1, 2019

Latest telecommunication horizons

GPON technology is currently the most modern, most efficient and promising in a relatively large family of passive optical networks. Based on European standards in recent years, it has provided cable TV operators and Internet service providers with efficient solutions in terms of high-speed access to the World Wide Web, stable signal and exceptional tele-picture quality. GPON technology also provides very significant savings in fiber optic thanks to the tree topology of network architecture and the highest reliability achieved by passive branching elements. But perhaps the main advantage of this telecommunications innovation is the high-speed "last mile".


GPON technology supports modern wave multiplexing technology, which allows to significantly increase network bandwidth without upgrading their cable infrastructure. And tree-topology opens up wide scope for flexible management of client service bandwidth. At the same time, GPON technology has a relatively high data rate, which ensures transparency of transport for various services: SDH, Ethernet, ATM, etc.

Therefore, the numerous advantages of passive optical networks and the abundance of their unique capabilities determine the advantages of this technology over other telecommunications architectures, especially in terms of high-speed "last mile". This is due to the rapid spread of this innovation in building high-speed fiber networks for urban services. What is GPON and what is it?
It is as simple as brilliant in itself. The provider's central node, providing a high-speed backbone connection, connects to the subscriber points of the passive tree architecture optical network. In this case, special intermediate nodes are formed on which compact passive optical splitters (splitters) are placed. Their passivity means they absolutely do not need food or service.

GPON devices, in addition to splitters, include a multi-service hardware software platform and subscriber terminals. In addition, one platform can transmit information to as many subscriber devices that allow you to add performance budget and transceiver hardware speed to it. The combination of such modern equipment enables the introduction of passive optical networks and modernization of cable architectures in the shortest possible time and at no extra cost.

what is a virtual ransomware actually

They called Wanna Cry a computer ransomware virus because it arbitrarily captures your computer, encrypting all the data on your hard dri...