In the recent post, we discussed the basics of malware-What is malware? Types of malware and recent malware statistics published by Kaspersky Lab and McAfee Labs Threats Report. Click here to visit the Introduction to Malware post. Malware, which is abbreviated for “malicious software,” can infect your computer to the limit where it collects your … Continue reading How can Malware be detected by using Machine Learning algorithms?
What is malware? Malware is short for MALicious softWARE. As the name suggests, it any software which is created with the intention of causing harm to the system. The system can be a computer, mobile phone, tablet, laptop, desktops, and many more gadgets. Anything and everything which can be connected to the Internet or connected … Continue reading Malware
In the previous post, we discussed major attacks on cloud computing with countermeasures, in this post, we are going to discuss one of the most important attacks on cloud computing i.e. DDoS attack and its prevention and detection techniques. As distributed denial-of-service (DDoS) attacks form one of the biggest threats encountered by Internet users and cloud … Continue reading Distributed Denial of Service Attack on Cloud Computing
Today we are going to discuss an old but very important problem known as The Link Prediction Problem. The link prediction problem was introduced back in 2004 but its applications are still widely used that we encounter in our day-to-day lives without noticing. In this post, I'll try to cover the basics of this problem but … Continue reading The Link Prediction Problem
To understand the basic definition of ransomware and how cloud computing can protect the data from attackers, refer to our previous post which explains it in detail. Click here to know more. Ransomware is a novel branch of cybercrime. Initially, it was a comparatively simple concept, using basic cryptography in which it only changed the … Continue reading Ransomware- LOCKY
Once in our lifetime, we all have encountered with a computer virus, heard some news about companies losing billions of dollars to ransomware or hackers using bugs in the system to hack the systems, here is how it starts. Starting with the basics we'll guide the readers about the terms used in cyber security, what … Continue reading ALERT! YOU SYSTEM HAS BEEN INFECTED. Here’s what you need to know.
To understand the basic definition of ransomware and how cloud computing can protect the data from attackers, refer to our previous post which explains it in detail. Click here to know more. Proofpoint researcher Matthew Mesa discovered a new ransomware called GIBON. This ransomware is right now being dispersed by means of MalSpam with a joined malicious … Continue reading RANSOMWARE – GIBON
Cloud computing is one of the most important newer developments in the information systems.The primary concern that gets the organizations to adopt the Cloud Computing technology is cost reduction through optimized and proficient processing, however, there are different vulnerabilities and dangers in Cloud Computing that influence its security. ATTACKS ON CLOUD COMPUTING WITH COUNTERMEASURES: … Continue reading Major attacks on Cloud Computing with countermeasures.
Ransomware: Ransomware is one of the many cyber-attacks that take place daily on a large scale. Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' documents unless a ransom is paid. More present day ransomware families, collectively classified … Continue reading Protection of data against ransomware using Cloud Computing.
Display customer and client testimonials to promote your work or business. via Add Credibility to Your Website with Testimonials — Discover