Tuesday, March 10, 2020

How would you get ransomware?

An incredible method to commence a phishing mindfulness instructional class is to ask, "How would you get ransomware?" most of learners will know that ransomware assaults can be propelled by tapping on a malignant URL or opening a contaminated email connection. Aware of the ongoing WannaCry assault, some might know about the significance of staying up with the latest. Other assault vectors are far less commonplace—drive-by downloads, malvertising and "discovered" USB drives, for instance.


Contingent upon students' reactions to "How would you get ransomware?" you might be agreeably astounded or extremely concerned. At any rate by posing the inquiry (and overlooking the unavoidable shrewd Alec who answers, "You get ransomware from the Dark Web"), you check your workers' vulnerability to online dangers and the fundamental estimates you'll have to take to raise phishing mindfulness.


More info @  how to get ransomware

Wednesday, March 4, 2020

ransomware security

How to protect yourself from ransomware -  ransomware security

1. Do not open suspicious e-mail attachments, visit unknown websites and download applications from official sources. Learn about phishing attacks and do not click on phishing attacks.

2. Back up your files regularly. If you have backups, after cleaning the ransomware on your computer with your antivirus program, you can restore your backup files (your backups can be found in the cloud or on external disks).

3. Use a good anti-virus program. Kaspersky Internet SecurityYou can try, thanks to the special "System Monitor" module in our program, it provides protection especially against ransomware.

Meanwhile, according to independent tests, Kaspersky Internet Security has achieved 100% success against tried ransomware

Friday, February 28, 2020

how to prevent ransomware attack

Malware is the abbreviation of the English combination of "Malware" Malicious Software. Malware is called all of the worms, trojans, and other malicious computer programs that hackers use to access sensitive information on users 'or organizations' systems. Malware, as defined by Microsoft, is a complete definition of software designed to damage a single computer, server, or computer network.

Malware types

There are several different ways to categorize malware; The first is about how malware replicates.

You've probably heard of the terms virus, trojan, and worm.

Worm is part of independent malware that can spread from computer to computer.

A virus is another type of malware that hijacks the code of another independent program.

Although Trojan is a software that does not have the ability to reproduce itself, it shows itself as a useful software for the user and manipulates the user to activate it. So it starts to spread to the whole system.

Another way to categorize malware is related to what it does after successfully infecting the victim's system. There are a variety of potential attack techniques commonly used by malware.

Spyware; Webroot is defined as software designed to secretly collect data about a user by definition of Cybersecurity. It is basically designed to capture data that you send and receive while using your computer and forward it to a third party. For example, a keylogger is a great example of spyware that is used to capture passwords by recording all keystrokes that the user makes with his keyboard.

Rootkit (root user team); It is a set of software tools that provide remote access and control to a computer or a system by definition of TechTarget. The root user team, which successfully reaches the target system, takes over the administrator permission and can use this power successfully.

Adware; A type of malicious software that forces your internet browser to download more malware and redirects it to such web ads.

Ransomware (ransomware); It is malicious software that encrypts your hard drives after infiltrating your system and requests payments like Bicoin in exchange for these passwords. It is mathematically impossible for victims to access files encrypted by this software.

Cryptojacking; Malware that forces hackers to become victims of unnoticed or forced bitcoin mining. This malware uses your entire CPU setup to run Bitcoin mining by running as a javascript in the background of your system.

Malicious advertising (Malvertising); software used to infiltrate victims' computers, without the knowledge of the user of legitimate advertisements or ad networks. For example, a cyber pirate pays to advertise on an ordinary website and advertises on this site. Then, when a user clicks on the ad, the coding in the ad redirects it to a malicious website or installs malicious software on their system. This system can be installed on the computer automatically upon the user's request.

Some malware can be part of many categories. For example, although WannaCry appears as a ransom software, it can be used to perform many different attacks. Similarly, Emotet was found to be used both as a trojan and a worm.

how to prevent ransomware attack ?


Most malware infects systems via email and phishing mail. The best way to prevent this is to strictly protect your emails and ensure that your users are sure how to detect the danger. Also make sure that it is safe before running attachments, even in emails from someone you know to your system.

Apart from that, using your entire system with the necessary precautions in the latest version will keep many malware away from your system. When you want to focus on the files you want to protect, never forget to back up these files frequently, especially in order to be protected from ransomware. So even if your hard drive is encrypted, you can easily fend off this threat.

Malware protection

Antivirus programs are the most widely known product in the category of malware protection products; Although it uses the name "virus", most antiviruses provide security against all types of malicious software. Among the best antivirus software today, Kaspersky Lab, Symantec and Trend Micro trio lead the latest tests by AV-TEST.

How is malware detected?

Malware is always likely to infiltrate your site, even if you take the most important precautions for your system.

Advanced software available today to see what's going on in your system network and to detect malware infections. Most malicious software uses your network as an agent to infect all your systems, by spending a few dollars to protect your network traffic, you can have these software and count the security of your network.

Getting rid of malware

How to remove malware infected by the system is a million dollar question. Malware removal is a very difficult task and methods may vary depending on the threat you face. Some free antivirus software on this topic can be seen by your business. However, if you are facing larger-scale threats, hard work is waiting for you.

Thursday, February 27, 2020

Criminals attacked Croatia's largest oil company

Cybercriminals attacked the largest oil company INA Group in Croatia. During the cyber attack, the attackers allegedly used the CLOP ransomware, which encrypted the data of some of the company's internal servers, ZDNet reported.

This incident did not affect the supply of gasoline to customers and did not affect the performance of the company's payment systems. However, as a result of the attack, the company was unable to issue invoices, record the use of loyalty cards, issue new mobile vouchers and new electronic vignettes, and also accept payment from customers for fuel.

Although the INA Group did not disclose details about what malware was used in the attacks, it is assumed that this is a CLOP ransomware. Several factors testify to the involvement of the ransomware. In particular, a few hours before the INA Group published a statement about the incident, an analyst at Sophos announced the start of activity of the new C&C server used in CLOP cyber attacks. In addition, this week, security researchers discovered new versions of the CLOP ransomware virus on the VirusTotal service.


Recall this week SecurityLab wrote about cyber attacks is, in the US operator of the gas pipeline, which resulted in its computer networks have been infected extortionate software. Attackers used a phishing link to gain initial access to the organization’s information computer networks, and then targeted the OT network (Operational Technology).

Friday, November 22, 2019

Tesla's new Cybertruck unveiled

Tesla has divulged its "Cybertruck" pickup truck, however not without a humiliating minute in front of an audience.

The truck's windows were crushed during an exhibit expected to show that they were so difficult to break.

Mr Musk was heard to swear before kidding: "Opportunity to get better."

The truck was divulged in Hawthorne, California, where its treated steel, rakish plan was welcomed with cheers yet in addition bemusement.

"Individuals likely won't move beyond its vibes," said Jessica Caldwell, from vehicle commercial center Edmunds.

"It would seem that a truck rendition of the DeLorean from Back To The Future."

The pickup showcase speaks to a critical open door for Tesla as it improves its battery innovation, which means conveying heavier loads over long separations is currently handy.

As indicated by Edmunds, enormous trucks have represented 14.4% of new vehicle deals up until October this year, contrasted with 12.6% in 2015. The vehicles have a normal selling estimation of more than $50,000.

Tesla's truck will be sold beginning at $39,900 (£30,900), a model which has a scope of 250 miles (402km), while the most costly model, at $69,900, will have a scope of 500 miles. The truck will situate up to six grown-ups and pull a payload of 3,500lbs, Tesla said.

Mr Musk said pre-requests would begin promptly, with creation beginning in late 2021 - however the 48-year-old has a background marked by missing his very own cutoff times.

The Cybertruck's dispatch will without a doubt be eclipsed by the "fizzle", Ms Caldwell said.

It occurred during a portion showing how the vehicle's hardened steel outside, and metal windows, could withstand slugs and heavy hammers. Be that as it may, when Tesla's head of plan, Franz von Holzhausen, tossed a metal ball at the front left window, it crushed. As too did the back left.

"It turned out poorly, that is an or more side," Mr Musk said.

Read more

Monday, November 4, 2019

Prerequisites for IT Support Engineer


What most of companies look for : 



Looking for experienced and dynamic candidates in related industry.



Responsibilities :


The aspirant must have experience in Technical support in the field of IT systems, - Solving hardware compatibility problems, - Supervising internal systems, - Diagnosing and solving technical problems, - Cooperation and contact with customers and suppliers in the field of technical support, - Developing technical documentation


Requirements :


Higher technical education, - Ability to program in Java, - Knowledge of SQL language, - Knowledge of Linux, - Communicative knowledge of English, - Ability to solve technical problems, - The ability to think analytically, - Good organisation of own and team work.


What most of companies offers :


Attractive salary, - Interesting and independent work in an international environment, - Flexible working hours, - Private medical care, - Great development opportunities, - Good working conditions in a modern company, - Co-financing for the Multisport card.




Click here to Find Freelance IT Support Engineer

Thursday, October 3, 2019

Brand new computer chips can fasten up computer speed in future

American scientists have built a carbon microchip that is far more efficient than the ones we have today.

You may have heard of "Silicon Valley". An area south of San Francisco where the mastodon Apple, Facebook and Google belong.

The area got its name in its time because the companies all depend on the element silicon. Without silicon, we wouldn't have the lightning fast microchips that sit in everything from smartphones, cars, TVs and to laptops today.

But it may well be that the area needs to change its name in the future.


Scientists from MIT have built a computer using carbon instead of silicon.

That's what they write in the acclaimed journal Nature .

This is the first time an advanced processor has been built using so-called carbon nanotubes, and the tubes have a huge potential for future electronics development.

According to Jesper Nygård, a researcher in carbon nanotubes in electronics at the University of Copenhagen, the results of the American scientists are impressive.

- This is the first time anyone has built a computer with so many carbon nanotube transistors. As many as 14,000 have been stuffed into the chip, he says, but says:

- But that said, it is equivalent to having built an old-fashioned black-and-white television. So the chip is not more advanced. By comparison, the processors that sit in our laptops have 10 billion transistors, he says.

Development cannot continue
So, although the researchers have not built a carbon microchip that can compare with those of silicon, the result is nevertheless interesting.

The limit on how many silicon transistors we can put together on a chip is about to be reached, explains Jesper Nygård.

- When you have chips with 50 billion transistors, we are down to a size where there are few atoms that separate the individual transistors. And when it gets so small, the electrons start to behave differently. They may find themselves jumping through the transistors, even if they are closed, he says.


The electronics industry is therefore looking for a new material to make transistors. A material that is more energy efficient. And this is where carbon comes into the picture.

According to the researchers themselves, these transistors are built of carbon nanotubes namely 10 times more energy efficient than those of silicon. And there are many advantages in that, explains Jesper Nygård.

- This means that you can make chips that use a tenth of the energy they use today. And that means you can put the transistors even closer, he says.

Read more