Latest Posts with malware tag

malware

32 Articles 0 Followers


My Comments on Malware and Spams in Email when I was a young student

5 Feb 2021 3 minute read 0 comments 0fajarpurnama0

Note This is the ninth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish,...

My Comments on Malware Quarantine when I was a young student

4 Feb 2021 2 minute read 0 comments 0fajarpurnama0

Quarantine is a place to isolate an object to prevent the infection of harmful substances. We can see when a person who is suffering from influenza is brought into an isolated place because influenza is known as a virus that could easily spread and i...

Intrusion Detection System Important Specifications

2 Feb 2021 2 minute read 0 comments 0fajarpurnama0

The performance of an intrusion detection system (IDS) is how well an IDS can detect intrusions in a given network. There are many factors in measuring its performance, but in my opinion a good IDS can detect a variety of attacks, can function on a h...

Having Intrusion Detection System Despite Having Anti Virus and Firewall

1 Feb 2021 3 minute read 1 comment 0fajarpurnama0

My comment on why need an intrusion detection system (IDS) is to prevent intruders from the system. I agree on using IDS, with the more famous, larger, and more important of a corporation's or institution's network, the more IDS is needed. As we enjo...

Malware Counter Measure Standard Operation Procedure in Old Corporations

31 Jan 2021 4 minute read 1 comment 0fajarpurnama0

I have a few experience in playing around with cyber attacks, but it was merely a curiosity and I did this on my own PCs and virtual machines. Back then I tried exploiting the vulnerability on port 445 SMB using an exploit prepared by Metasploit. Met...

Disrupted but Not Dead – Law Enforcement Scores a Big Win Against EMOTET Botnet

30 Jan 2021 1 minute read 0 comments Matthew Rosenquist

Congrats to the multinational authorities who collaborated to defang the infrastructure of EMOTET, a hugely successful cybercriminal malware platform. Unfortunately, this win may be short-lived. The attackers behind EMOTET have shown great resilienc...

Dealing with Malware for Ordinary Users

27 Jan 2021 3 minute read 2 comments 0fajarpurnama0

The countermeasures of Malicious Ware (malware) are mitigation (prevention) or treatment like any other measures to cope against harmful substances. To prevent virus/worm infection is either we put up security to defend ourselves or avoid interacting...

Three apps that were stealing crypto undetected for more than a year

8 Jan 2021 2 minute read 4 comments Heruvim78

Security firm Intezer Labs discovered a malware that was running undetected for more than a year, using face apps and emptying wallets for thousands users, indiscriminately infecting Windows, macOS and Linux operating systems.  The remote access troj...

ElectroRAT malware targets Crypto users via fake Apps

7 Jan 2021 2 minute read 3 comments fklivestolearn

Hackers have been running this malware operation since the beginning of 2020, with the end goal of stealing victims’ funds Weare still reeling from the massive hack that was discovered last month in which the Russian hackers managed to hack into mult...

Why TrickBot Malware may be a Game Changer for Cybersecurity

4 Dec 2020 1 minute read 1 comment Matthew Rosenquist

Cyber attackers continue to move down the compute stack with the latest variant of TrickBot now targeting firmware for malicious manipulations.  This is when it gets serious.  The firmware sits below the operating system and is a perfect place for m...