Featured Post
Ransomware: Top Five Ransomware attacks(2 min read)
- Get link
- X
- Other Apps
Ransomware
5 Most Dangerous Ransomware (2 minutes read)
- Crypto Ransomware – Encrypts valuable or important files on a computer so that the user cannot access them.
- Locker Ransomware – Locks the user files and prevents access to data and files available on the PC.
Top Five Ransomware attacks:
1. WannaCry:
It encrypts files on the PC’s hard drive after attacking a windows computer and
makes it inaccessible for the user. To decrypt the files attacker demands a
ransom payment in bitcoin. (Bitcoin- so as no one can trace where the money is
going).
2. Bad Rabbit: It
spreads through ‘drive -by’ method, which means a user visits a authentic/
legitimate website, unaware of the fact that they have been compromised by a
hacker.
3. Petya:
It encrypts the victim’s entire hard
drive and it does this by encrypting the Master File Table (MFT) thus making it
impossible to access files on the disk. Basically, it spreads through HR
departments (viz. through fake email of job application with an infected
dropbox link.
4. Jigsaw: It
encrypts computer files and gradually/ slowly deletes them unless a ransom
(payment) is paid to decrypt the files. It was designed to spread through
malicious attachments in spam emails and gets activated when a user downloads
the malware programme which encrypts the user files.
5. Troldesh:
Spread via spam emails which contained infected links or attachments. The most
interesting thing about this is that, attackers communicated with victims
directly over email to demand ransoms. Cyber criminal even negotiated for
victims who they built a rapport with, which rarely happens.
TAGS: Secure Your Smartphone,Secure Phone, Hackers, Smartphone Protection, Protect Phone, cypheradda, secure, cyber security tips for all
- Get link
- X
- Other Apps
Comments
This is really very nice blog, your content is very interesting and worth reading it. Keep sharing. Very knowledgeable Blog.Thanks for providing such a valuable Knowledge on Cyber Security.
ReplyDeleteThank you for explaining the Cyber Security analysis in a effective way so that it reaches us in a manner which is understandable .Keep Sharing.
ReplyDeletethanks you for sharing this information with is, it is very knowledgeable blog, keep sharing.waiting for your next blog
ReplyDeleteZplus Cyber Secure Technologies
Hi
ReplyDeleteI visited your blog you have shared amazing information, i really like the information provided by you, You have done a great work. I hope you will share some more information regarding Cyber Security. I appreciate your work.
Thanks
Have a Great Day
hii I visit your blog you have publish amazing cyber information, i am very impress provide by you have done a great work. and we provide the best cyber security online course in the USA. and get more information visit my website
ReplyDeleteIf you manage a computer network for your business, you should be familiar with the term cyber security. In this article, we are going to talk about the importance of cyber security company.
ReplyDeleteHow to Check if a Website OR URL is Safe or Not? Cyber security
ReplyDelete🔒🔓
http://www.urlhelp.xyz/2021/07/how-to-check-if-website-or-url-is-safe.html
I am from internet data search help service
https://www.urlhelp.xyz/
Great Blog!!! Thanks for sharing this wonderful data with us.
ReplyDeleteSoftware Testing Course in Chennai
Software Testing Online Course
Software Testing Course in Coimbatore
You there, this is really good post here. Thanks for taking the time to post such valuable information. Quality content is what always gets the visitors coming.
ReplyDeletedevice security
ReplyDeleteCyber Security Training Institute in Gurgaon
slot siteleri
ReplyDeletekralbet
betpark
tipobet
betmatik
kibris bahis siteleri
poker siteleri
bonus veren siteler
mobil ödeme bahis
0867
hjhjhujlukjklk
ReplyDeleteشركة تنظيف
صيانة افران مكة 8LXEgIDPPu
ReplyDelete