What is a Cyber Attack? Cyberattacks are attacks launched from one or more computers against another computer, multiple computers or networks. Cyberattacks are divided into two broad categories: Attacks that aim to disable the target computer or knock it offline…
A fork bomb is also called a wabbit or rabbit virus that was crafted by malicious hackers to launch a denial-of-service attack on the target system. The fork bomb virus replicates itself and corrupts the available system resources. It slows…
Shanmoon was discovered by Seculert, Symantec, and Kaspersky Lab on 16 August 2012 that targets 32-bit NT kernel versions of Microsoft Windows. It is a modular virus and is also known as W32.DisTrack. This virus was crafted for cyber-warfare as…
CryptoWall belongs to the ransomware family that uses advanced techniques to infiltrate computers and hides from its victims. Simply put, the Cryptowall is a Trojan horse that encrypts files on the jeopardized computer and then proceeds to threaten the user…
A zero-day exploit is a software flaw or a vulnerability. Hackers use this as an exploit to attack the user’s system even before the software vendor identifies it and a security patch fix is available. These zero-day exploits can go…
The latest ransomware in the cyberspace called “Petya” is infecting computers around the world at an incredible speed. It uses a vulnerability in the Windows OS that Microsoft patched in March 2017 — notably, it is the same virus that…
NotPetya virus outwardly resembles the Petya ransomware in many ways, however, the fact is that it’s different and a lot more dangerous than Petya. When Petya affected numerous systems even the best antivirus and virus removal programs failed to deduct…
The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date/time is reached – it triggers the logic bomb malware…
2017 was a pretty rough year in terms of cybersecurity: ransomware, state-sponsored attacks, phishing scams, and big companies (like Equifax) failing to stick to security best practices (like implementing two-factor authentication) and therefore falling victims to cyber attacks. So what…
January 2018 is over, we’re now on to the second month of the new year. Indications are that 2018 would be as eventful as 2017 was, as regards cyber crimes and cyber attacks. The much-evolved versions of the cyber…