Cryptojacking

Introduction: Mining for cryptocurrencies is an ever more complex task that consumes more and more energy resources and computing power. Cryptocurrency mining, or cryptomining, is simply the way in which cryptocurrency is earned. Individuals mine cryptocurrency by using cryptomining software to solve complex mathematical problems involved in validating transactions. Each solved equation verifies a transaction and earns a reward paid out in the cryptocurrency. Solving cryptographic calculations to mine cryptocurrency requires a massive amount of processing power.This is exactly why hackers have found a way to make it easier: they get onto other people’s computers and put them to...

Security on Social Media

The most popular social media platforms have billions of users, and the number keeps getting bigger every year. Facebook, Twitter, YouTube and Instagram to name a few—have gone beyond their initial purpose of sharing, entertainment, and communication. Now, enterprises see them as valid advertising tools and users have built careers out of sharing content. Information Sharing risks: Attackers may use social networking services to spread malicious code, compromise users’ computers, or access personal information about a user’s identity, location, contact information, and personal or professional relationships. You may also unintentionally reveal information to unauthorized individuals by performing certain actions....

Cyber Security Workshop

Mr.Adli Wahid, Security Specialist from APNIC(Asia Pacific Network Information Centre) for a 1 day workshop(15th September,2016) at the MoIC Conference Hall, covering Basics of Cybersecurity and Critical Cyber Security Controls. Participants include ICT professionals from the government, autonomous agencies and RBP....

Ransomware

Ransomware is a type of malware that blocks access to computer system either by locking the systems screen or by encrypting files and folders usually demanding a ransom to unlock. For most of the new variants of ransomware, prevention has become the only guard since data recovery after attack is almost impossible.Though no huge harm has been done in Bhutan till date by Ransomware, personnel drives and PCs have been found infected and the trends elsewhere could soon be in. Statistics from Microsoft depicting  Ransomware trends from December 2015 to May 2016 is as below: Source: https://www.microsoft.com/en-us/security/portal/mmpc/shared/ransomware.aspx#what Most of...

DoS/DDoS Attacks

DoS/DDoS Attacks Denial of Service (DoS) is an attempt to make resources like web site/ services/ App/network etc. unavailable to its legitimate user by exhausting the resource to provide service, with too many request (or related manipulations). DoS is performed by single user or using single device, which makes it difficult for attacker with increasing strength of Servers. DDoS(Distributed Denial of Service) works on the same fundamental as DoS but combines strength of multiple compromised machines to attack single victim, thus completely crashing down or gaining complete control of the system resulting to hosted services being unavailable to legitimate...