How can Malware be detected by using Machine Learning algorithms?

In the recent post, we discussed the basics of malware-What is malware? Types of malware and recent malware statistics published by Kaspersky Lab and McAfee Labs Threats Report. Click here to visit the Introduction to Malware post. Malware, which is abbreviated for “malicious software,” can infect your computer to the limit where it collects your … Continue reading How can Malware be detected by using Machine Learning algorithms?

Malware

What is malware? Malware is short for MALicious softWARE. As the name suggests, it any software which is created with the intention of causing harm to the system. The system can be a computer, mobile phone, tablet,  laptop, desktops, and many more gadgets. Anything and everything which can be connected to the Internet or connected … Continue reading Malware

Distributed Denial of Service Attack on Cloud Computing

In the previous post, we discussed major attacks on cloud computing with countermeasures, in this post, we are going to discuss one of the most important attacks on cloud computing i.e. DDoS attack and its prevention and detection techniques. As distributed denial-of-service (DDoS) attacks form one of the biggest threats encountered by Internet users and cloud … Continue reading Distributed Denial of Service Attack on Cloud Computing

The Link Prediction Problem

Today we are going to discuss an old but very important problem known as The Link Prediction Problem. The link prediction problem was introduced back in 2004 but its applications are still widely used that we encounter in our day-to-day lives without noticing. In this post, I'll try to cover the basics of this problem but … Continue reading The Link Prediction Problem

Ransomware- LOCKY

To understand the basic definition of ransomware and how cloud computing can protect the data from attackers, refer to our previous post which explains it in detail. Click here to know more. Ransomware is a novel branch of cybercrime. Initially, it was a comparatively simple concept, using basic cryptography in which it only changed the … Continue reading Ransomware- LOCKY

ALERT! YOU SYSTEM HAS BEEN INFECTED. Here’s what you need to know. 

Once in our lifetime, we all have encountered with a computer virus, heard some news about companies losing billions of dollars to ransomware or hackers using bugs in the system to hack the systems, here is how it starts. Starting with the basics we'll guide the readers about the terms used in cyber security, what … Continue reading ALERT! YOU SYSTEM HAS BEEN INFECTED. Here’s what you need to know. 

RANSOMWARE – GIBON

To understand the basic definition of ransomware and how cloud computing can protect the data from attackers, refer to our previous post which explains it in detail. Click here to know more. Proofpoint researcher Matthew Mesa discovered a new ransomware called GIBON. This ransomware is right now being dispersed by means of MalSpam with a joined malicious … Continue reading RANSOMWARE – GIBON

Major attacks on Cloud Computing with countermeasures. 

Cloud computing is one of the most important newer developments in the information systems.The primary concern that gets the organizations to adopt the Cloud Computing technology is cost reduction through optimized and proficient processing,  however, there are different vulnerabilities and dangers in Cloud Computing that influence its security.   ATTACKS ON CLOUD  COMPUTING WITH COUNTERMEASURES: … Continue reading Major attacks on Cloud Computing with countermeasures. 

Protection of data against ransomware using Cloud Computing.

Ransomware: Ransomware is one of the many cyber-attacks that take place daily on a large scale. Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' documents unless a ransom is paid.  More present day ransomware families, collectively classified … Continue reading Protection of data against ransomware using Cloud Computing.