Tag Archive for: Tricks

Commvault Metallic tricks ransomware to protect data


To pinpoint ransomware attacks earlier, Commvault is integrating its decoy security technology into Metallic, the vendor’s SaaS backup and recovery product.

In February 2022, Commvault acquired TrapX, an Israel-based security company that created lures and decoys that looked like normal applications and data. This early threat detection technology has been adapted into Metallic SaaS as the ThreatWise add-on.

ThreatWise is available now, with prices that vary depending on the level of protection purchased.

Ransomware is not going to go away, according to Christophe Bertrand, senior analyst at Enterprise Strategy Group (ESG), a division of TechTarget. The battle against ransomware is a team effort, and companies need several different technologies to combat it, including in the realms of prevention and detection.

“[ThreatWise] is one type of technology that can fight ransomware and put organizations in a position where they can recover,” Bertrand said.

Hunting with decoys

Other data protection companies have been using AI and machine learning (ML) for anomaly detection for some time, including Commvault, according to David Ngo, CTO of Metallic at Commvault.

Ransomware can take days or months to detonate after infiltrating a system. It tries to evade notice once it has breached a customer’s environment, Ngo said. ThreatWise helps to discover it by laying a trap.

Adversaries can’t tell [ThreatWise is] there, so when they poke at a decoy, it is a clear and undisputable sign that an organization is experiencing a cyber attack.
Jon OltsikSenior analyst, Enterprise Strategy Group

“Touching an asset here is like touching a tripwire,” Ngo said. “The action triggers the detection, rather than types of patterns triggering the detection.”

This SaaS-delivered deception technology for data protection is unique to Metallic, he said. Several vendors use AI and ML to detect anomalous patterns in behavior, while ThreatWise uses decoys to discover live attacks.

Deception technology like decoys is incredibly useful in detection, according to Jon Oltsik, senior analyst at ESG.

“Adversaries can’t tell it’s there, so when they poke at a decoy, it is a clear and…

Source…

New Mobile Security App 2021|| WTMP Use Kaise Kare || Mobile Ko Dushro Se Bachane Ka Tarika|Best App



Interior ministry suggests seven anti-hacking tricks


Content image - Phnom Penh Post

The interior ministry’s information technology department suggests seven ways to protect computers from hackers. Interior ministry

The Ministry of Interior’s Department of Information Technology has presented seven tips to protect the security of computers and computer systems across the Kingdom to prevent hackers from trespassing and committing cybercrimes.

The department said that while computers play an important role in facilitating many general tasks in the modern world, they also have the potential to cause harm, as any computer that is connected to the internet is capable of being hacked.

They said there were many computers around the world that had been hacked and used to commit various crimes, like extortion, fraud, or the ordering

of illegal goods. To prevent theft

through technology, the ministry has shared seven key tips – using a firewall, updating system and software, avoiding “free” security scans, downloading files with precautions, installing reputable security software, backing up important data; and using a pop-up blocker.

According to the department, a firewall is a protective barrier between a computer and the internet. Everything that goes in and out of a computer must pass through the Firewall. If any viruses attempt to enter the computer, the firewall will immediately block them from access.

The software and internal systems of each company’s computer are constantly being updated for security reasons, so it is important to update the operating system and software regularly, every time an update is issued.

The department also advised people against using anti-virus software that is available for free download from any website as it may contain links to viruses.

People should avoid downloading programmes from any website that they are not familiar with and refrain from downloading files, videos or songs that anonymous people have sent to them as they could contain viruses.

As a precaution, they are advised to use anti-virus and anti-spyware software to remove any viruses that may be on their computer and to prevent new ones from attaching themselves to the system. If the computer already has this software installed, viruses will not be able to…

Source…

Protect your phone from these seven hacking tricks


Any American without a mobile device is in the minority. Only 3% of Americans don’t own a cellphone, the Pew Research Center says. Mobile devices play a central role in our daily tasks, as conduits for alarms, messaging, navigation and even grocery shopping.

They’ve come a long way from phones of the past. Tap or click here for 10 valuable tips and tricks hiding in your phone’s accessibility settings. However, there’s a downside to all its rapid growth: Criminals want a piece of the pie.

The RSA says 70% of online fraud is done through mobile platforms. A single fumble of your finger against a dangerous hyperlink could download malware that locks you out of your phone, so you must be careful. Here are seven ways cybercriminals try to break into your phone.

1. In-person hacks

Not all attacks are made remotely. One man forced his way into his sleeping girlfriend’s phone. She used facial recognition to open her phone, so he drugged her, lifted her eyelids and held the phone up to her face. Once the phone unlocked, he stole almost $24,000 and blew it all gambling, the Daily Mail reports.

As you can tell, camera ID can be easy to fool. That’s why we recommend using passcodes or pattern locks to protect your phone. Tap or click here to password-protect individual apps.

2. Stalkerware

One creepy trend is stalkerware. That’s when someone installs an app on your phone to track you. These apps provide your stalker access to the GPS location of your device, along with images, call logs, images and even your browser history.

Since these tools are designed to be hidden, it can be difficult to spot them. Checking your battery should be your first step if you think your phone is compromised. Reduced battery life could mean a secret app is running in the background. Tap or click here for six more signs your phone has stalkerware — and what you can do about it.

3. Bad downloads

Treat your phone with the same caution you would your computer. You may download a PDF or some…

Source…