Posts

Showing posts from December, 2015

Types of Cyber Attacks

Image
Types of Cyber Attacks There are several effective methods for disrupting computer systems. We are talking of a method known as cyber attack, or computer network attack , which uses malicious computer code to disrupt computer processing, or steal data.  A brief description of three different methods are shown here. However, as technology changes, future distinctions between these methods may begin to blur. An attack against computers may be targeted or un-targeted (i) disrupt equipment and hardware reliability, (ii) change processing logic, or (iii) steal or corrupt data. The methods discussed here are chosen based on the technology asset against which each attack mode is directed, and the effects each method can produce. The assets affected or effects produced can sometimes overlap for different attack methods.  Conventional kinetic weapons can be directed against computer equipment, a computer facility, or transmission lines to create a physical attack that ...

WHAT IS THE ZERO-DAY VULNERABILITY ?

WHAT IS THE ZERO-DAY VULNERABILITY  ?  A zero-day vulnerability is a previously unknown flaw in a computer program that exposes the program to external manipulation. Zero-day vulnerabilities have been found in many OS & programs, including Chrome, Internet Explorer, Adobe, and Apple products. Zero-day vulnerabilities also appear in software running critical infrastructure, such as power plants. What differentiates a zero-day from other computer vulnerabilities, and what makes it valuable, is that it is unknown to the software’s makers and users. Whoever has knowledge of a zero-day can exploit it from the “zero-th” day of its discovery, until the software maker or users learn of it and fix the vulnerability. What makes a zero-day vulnerability different from other cyber tools is that it is simply information. A zero-day encapsulates the knowledge that X could happen if you do Y. As Auriemma and Ferrante of ReVuln, a zero-day seller, argue, “we don’t sell weapons, we s...

What precautions Bank Customers need to take against frauds

What precautions Bank Customers need to take against frauds .. Adv. Prashant Mali, Cyber Security & Law Expert 1. Hold extra money in fixed Deposits and with written instructions to bank that no online Fd transfers. 2. Avoid any banking over phone lots of Vishing scams are happening, it is better to keep the phone down when some one says calling from bank. Till the scams are weeded out by banks or police. 3. If your SIM is deactivated, it normally happens on weekends, immediately call the bank from another phone and freeze you bank account, coz SIM exchange fraud may be happening. 4. Change your PIN number and passwords today, they are already leaked in the international market. Or your "true caller" database has it on their server. 5. Do not do banking from cyber cafe or from any office coz they keep all your logs and data officially , trust me human mind can go corrupt. 6. Today, go to the settings option of your Gmail and check for any filters or any forwarding instruc...