Archives for malware

10 Jul

What’s More Secure: Blockchain Or Database?

Data storage options database and blockchain are architecturally different and come with their own sets of advantages, vulnerabilities, and challenges.  On the one hand, database storage is based on client-server-based architecture and can function in small and large scale environments. Under database storage, the client acts as a receiver, and servers– the data storage place–…

The post What’s More Secure: Blockchain Or Database? appeared first on Analytics India Magazine.

02 Mar

How Gmail’s Deep Learning, AI Tech Helps Thwart Cyberattacks

image-10444
image-10444

Gmail accounts have become markedly vulnerable to malicious cyber activities. While corporate employees may be at greater risk of phishing scams, your personal inbox can also carry corrupted attachments that, when opened, could compromise your device. In fact, according to a Google blog post, malicious documents represent nearly 60% of the malware targeting Gmail users,…

The post How Gmail’s Deep Learning, AI Tech Helps Thwart Cyberattacks appeared first on Analytics India Magazine.

26 Dec

Flashback 2019: Top Cybersecurity News That Made Headlines

India is no stranger to cybersecurity threats and attacks. The steady growth of the Indian tech sector has led to the massive growth of digital data inventory. This data accumulation has, in turn, spurred frequent cyberattacks across the country. Companies across this sector have been launching new updates, innovating new technologies and propagating new changes…

The post Flashback 2019: Top Cybersecurity News That Made Headlines appeared first on Analytics India Magazine.

10 Sep

5 Ways Organisations Can Defend Against Living Off The Land Attacks

image-7002
image-7002

Hackers nowadays are going old-school again. If you take a look at the some of the recent hacking events, techniques and strategies that were used years back have come back to the fore again. One such concept of hacking that is gaining traction among hackers is Living off the Land (LotL) Attacks.  What is Living…

The post 5 Ways Organisations Can Defend Against Living Off The Land Attacks appeared first on Analytics India Magazine.

06 Aug

What Is A Destructive Malware Attack & How Your Organisation Can Combat It

image-6305
image-6305

Over the years, cybersecurity threats have created massive catastrophes not only for organisations but also for individuals. No environment is immune to cyberattacks as hackers continue to develop new tools and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party supplier apps and even popular email platforms. According to a report…

The post What Is A Destructive Malware Attack & How Your Organisation Can Combat It appeared first on Analytics India Magazine.

03 Jul

How Hackers Are Using Facebook To Distribute Remote Access Trojan (RAT) Malware

image-5515
image-5515

While threats like Ransomware, DDoS and Polymorphic Phishing have always been some of the notorious threats in cybersecurity, hackers today are shifting their focus and are trying out different approaches to attack systems. According to a research by Check Point threat intelligence, for the first time, a remote access Trojan dubbed as “FlawedAmmyy” has reached…

The post How Hackers Are Using Facebook To Distribute Remote Access Trojan (RAT) Malware appeared first on Analytics India Magazine.

09 Apr

How Antivirus Softwares Are Evolving With Behaviour-Based Malware Detection Algorithms

image-3853
image-3853

Antivirus software is widely used as a way to combat malware and prevent computers from getting compromised. They have also been one of the first users of advanced algorithms that emulate the processes of the human mind. In a method called behavioural analysis, antivirus technologies crack down on viruses that aim to circumvent previous methods…

The post How Antivirus Softwares Are Evolving With Behaviour-Based Malware Detection Algorithms appeared first on Analytics India Magazine.