cybersecurity-ransomware

Cyber Security and its future challenges

Cyber Security refers to the methods that ensure the safety and authenticity of data in the online world. The core functionality of cybersecurity involves protecting info and systems from major cyber threats. These cyber threats take several forms (e.g., application attacks, malware, ransomware, phishing, exploit kits). Unfortunately, cyber adversaries have learned to launch automatic and complicated attacks using these techniques – at lower and lower prices. Hence, continuously managing with cybersecurity strategies and operations is…

Continue reading
NotPetya Technical Analysis

NotPetya Technical Analysis

NotPetya Technical Analysis NotPetya (or “Nyetna” as it has also been named) spreads to other systems on the network without use of the ETERNALBLUE/ETERNALROMANCE SMBv1 exploits. (Although the code contains the ability to spread by this exploit as well, so patching is still imperative). The malware harvests SMB and user credentials from the infected host and uses those credentials to connect to other systems on the network, propagating the malware. Therefore, it potentially only takes…

Continue reading
Petwrap Ransomware Analysis

Petwrap Ransomware Analysis

Petwrap Ransomware Analysis Petwrap ransomware or Petya/NotPetya, is the recent new ransomware affecting computer networks. On the morning of June 27, 2017, a new ransomware outbreak—similar to the recent WannaCry malware—was discovered in the Ukraine. The malware quickly spread across Europe, affecting varied industries such as banks, government, retail, and power, among others. Although at first, it seemed that the ransomware was a variant of the Petya family, researchers have determined that they are not…

Continue reading
WannaCry Ransomware Analysis

WannaCry Ransomware Analysis

WannaCry Ransomware Analysis WannaCry ransomware has been the most widespread ransomware. A ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. It is worth noting that the first WannaCry infection was reported on February 10th then again on the 25th. We will refer to this as “version 1.” This did not have a widespread impact. On the afternoon of Friday, May 12th…

Continue reading

DEFENCE Policy

A Strong Strategic Foreign Policy Framework of Country lies in the Strength of Defence Partnership in-between. World’s strongest partnership develops by a strength in its defence policies relationship. A Defence policy relationship is a subject of confidential activity that needed to be disclose with reliable partner. Therefore a countries withstanding a long term relationship are estimated through level of development growth in their defence sector partnership. Unlike India have traditional history of Non-aligment foreign policy…

Continue reading

CRPF protests in Kashmir

Nature is our very existence, for,  if it was not for nature we would not have got the gift of our existence even, we would not have been created . Of all the gift of life, visible in so many forms, shapes and sizes,  the valley of Kashmir,  is the most beautiful bounty  present on earth, also known as “the heaven on earth” . Since there are two sides of a coin, if there is…

Continue reading

Cargo Security

Every year, about $30 billion value of payload is lost, by Federal Bureau of Investigation, and rates of freight burglary came to record highs in 2012. Financial misfortunes from robbery alongside the threats postured by crooks sneaking unlawful materials, for example, bombs or medications into holders in travel make reinforcing production network vulnerabilities discriminating. To secure payload, inventory network experts utilize a multi-layered methodology that fuses the most recent innovation and tweaked fundamental practices, for…

Continue reading

Electrostatic Discharge

Electrostatic discharge is used in hardware testing. ESD (electrostatic discharge) is a kind of test that hardware usually has to pass to be suitable for sale as well as use. The respective hardware must still work after it is passed through electrostatic discharge. Every organization have it’s own ESD limits which each hardware has to pass before being purchased. Every country has it’s own rules and regulations for the level of ESD. Electrostatic Discharge is…

Continue reading

How secure is your Web Login?

Ahh i’m safe i have a difficult password for all my accounts! no one will dare crack it! Well this kind of thinking is wrong, there are many ways apart from password cracking that a user can crack your web based accounts. Websites like Facebook, Gmail, Yahoo! etc, use great measures to protect the online accounts from being cracked, but its not the same always. People know today that it is almost impossible to get…

Continue reading

Visual cryptography

Visual cryptography (VC) was introduced by Moni Naor and Adi Shamir at EUROCRYPT 1994. Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that may or may not require a computer. It is used to encrypt written material (printed text, handwritten notes, pictures, etc) in a perfectly secure way. OR- Visual Cryptography Divide image into two parts Separately,…

Continue reading