Wednesday 22 April 2015
What is Honeypoting in (Computing) –?
Honeypot is a trap set to detect or deflect or in some
matter counteract attempts at unauthorized use of information systems. Also it
is a security resource who’s values lies in being probed or attacked or
compromised. This maybe legal but Honeypoting can be manipulated to work for
the person in acquiring their personal details.
They are loads of
different honeypots just to name a few
Production honeypot-
are easy to use they capture only limited information and are used primarily by
companies or corporations. Production honeypots are placed inside the
production network with other production servers by an organization to improve
their overall state of security. Normally, production honeypots are
low-interaction honeypots, which are easier to deploy. They give less
information about the attacks or attackers than research honeypots do.
Pure honeypots- are
full-fledged production systems. The activities of the attacker are monitored
by using a casual tap that has been installed on the honeypot's link to the
network. No other software needs to be installed. Even though a pure honeypot
is useful, stealthiness of the defense mechanisms can be ensured by a more
controlled mechanism.
Research honeypots-
Are run to gather information about the motives and tactics of the black hat
community targeting different networks. These honeypots do not add direct value
to a specific organization instead they are used to research the threats that
organizations face to learn how to better protect themselves.
click the link below for real stories in Honeypoting.
Malware? what is it
Beware I am malware |
What is malware well malware is a Software used to disrupt computer operation and gather sensitive information or even gain access to a private computer systems. Malware may be stealthy intended to steal information or spy on the computer user for a period of time without them knowing this is happening.
Malware threats 2015
Security experts have been banging the drum about the threat of mobile malware for years. The fact that it hasn’t yet materialized in a major attack has eroded the credibility of the claims, though, which means many users don’t take it seriously and have let their guard down. The sheer volume of mobile devices, and the prevalence of new mobile malware threats only increase the likelihood that a major mobile malware attack will happen. Will 2015 finally be the year?
Real story of a malware attack click link below
http://www.dailymail.co.uk/news/article-2534153/Millions-visitors-Yahoo-com-hit-huge-malware-attack.html
What is Phishing?
Phishing is a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, on-line.
This is a website about a real story of Phishing scam
click this to view
http://www.nbcnews.com/id/46789454/ns/technology_and_science-security/t/phishing-gang-steals-victims-life-savings-m/#.VRKDxE9ybcs
Viruses,Trojans and Worms
Virus- this is a
malicious program is a executable program that can reproduce itself it does
need you to click anything but it needs you to execute it. Just running these
files can make it spread throughout the system.
Worms- Computer
worms are malicious software applications designed to spread via computer
networks. Computer worms are one form of malware along with viruses and
Trojans. A person typically installs worms by inadvertently opening an email
attachment or message that contains executable.one installed on a computer the
worm spontaneously generate additional email messages containing copies of the
worm. They may also open TCP ports to create network security loop holes for
other applications and they attempt to flood the LAN with spurious Denial of
Service.
Trojans-A Trojan is a self-contained, malicious
program that is, it's a bit of software code that does something bad
to your computer. It doesn't replicate the same as a worm would, and does not
infect other files like a Virus. However Trojans are often
grouped together with viruses and worms, because they can have the same
kind of harmful effect.
Here is a list of the worst viruses out their
Boot sector- this is applied to the boot information used by any operating system.
Browser Hijacker- this type of virus can spread itself in numerous ways including voluntary download effectively hijacks certain browsers usually in the form of directing the user to particular sites.
File Infector Virus- this is the most common of the viruses the file infector takes root in the host file and then begins its operation when the file is executed.
Macro virus- these are usually associated with my applications like Excel or any other application that supports the use of a Macro. they use special actions that programmed into the document. the most well know macro virus was called Melissa this was a word document that contained password to pornographic websites.
Resident Virus- This virus definition applies to any virus that inserts itself into the memory and therefore only takes action when the infected file is executed.
Virus update of new viruses 2015 3/06/15
hers is a list of viruses to look out for
ios oneclickfraud-Trojan
Linux mouse- Trojan/worm
Backdoor Waketagat - Trojan
Sonar SuspBeh!Gen 580- Trojan/Worm/virus
Virus update of new viruses 2015 3/06/15
hers is a list of viruses to look out for
ios oneclickfraud-Trojan
Linux mouse- Trojan/worm
Backdoor Waketagat - Trojan
Sonar SuspBeh!Gen 580- Trojan/Worm/virus
Story of a Trojan attack click link below
http://www.computerworld.com/article/2904020/new-malware-used-to-attack-energy-companies.html
http://www.computerworld.com/article/2904020/new-malware-used-to-attack-energy-companies.html
Virus story just follow link below
http://www.dailymail.co.uk/news/article-88046/New-virus-causes-havoc.html
http://www.dailymail.co.uk/news/article-88046/New-virus-causes-havoc.html
Computer worm story just follow link below
http://www.darkreading.com/risk/microsoft-conficker-worm-remains-ongoing-threat/d/d-id/1137578
http://www.darkreading.com/risk/microsoft-conficker-worm-remains-ongoing-threat/d/d-id/1137578
What is Denial of Service?
A denial of service (Dos) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services.
Subscribe to:
Posts (Atom)