ransomware

Every Wi-Fi enabled device vulnerable to a new security attack called KRACK

Security researchers have discovered weaknesses in the WPA2 (Wi-Fi Protected Access II), the security protocol for most modern Wi-Fi networks. An attacker within the range of victim can interrupt credit card numbers, passwords, photos, and other sensible information using the bug called KRACK (Key Reinstallation Attacks). What this means is that the security built into Wi-Fi is likely ineffective, and we should not assume it provides any security. If the security problem which researchers have discovered is true, then it will be very difficult to fix it. Because the WPA2 is built into almost every internet connected device. During the initial research, it was found that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others are all affected by some variant of attacks. The a...

Increasing cyber-attacks – are we heading towards cyber doom?

The recent Petya ransomware tragedy that struck the computer systems worldwide, is the second largest cyber-attack after the WannaCry Ransomware that had hit the world last month. The recent attack hit many countries, locking up the PCs and crippling enterprise-services. Ukraine and Russia were identified among the worst affected countries. Based on the findings of security firm Kaspersky, the ransomware could possibly be a variant of Petya.D, Petya.A, or PetrWrap. Though it widely affected the systems just like WannaCry, but it is not its variant. The Petya ransomware locks a computer’s files with a message and demands a ransom in lieu. The attack reportedly started through an update that was used on a third-party Ukraine software, known as MeDoc. The software was used by many organizatio...

The ransomware attack continues, affecting systems worldwide

The ransomware attack that hit the world computers on Friday affecting a lot of NHS trusts, is attracting a lot of concern from security agencies, government and IT companies, majorly because of the big data that they all deal with. The malware operator called WannaCry or WanaCrypt 2.0 used an exploit that was leaked by a group called “ShadowBrokers” to run the malware into the computer systems of major hospitals, telecommunications, and courier services. The malware uses strong asymmetric encryption via RSA 2048-bit cipher to lock files and then demands ransom in lieu of decrypting it. One of the identified ways through which the malware is spreading on unaware PCs is – email spams. The attack was apparently brought to a halt by a researcher at MalwareTech – although he did not real...

×
Skip to toolbar