<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber security Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 11 Dec 2019 21:32:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>A new variant of Snatch ransomware threatens Windows 10.</title>
		<link>https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/</link>
					<comments>https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Wed, 11 Dec 2019 21:32:56 +0000</pubDate>
				<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[snatch]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=16510</guid>

					<description><![CDATA[<p>Hello, how are you? This time we are going to talk about security in Windows 10. Specifically about the ransomware is known as Snatch. Ransomware is a type of malware whose purpose is to block the use of a computer or part of the information stored on it. This way the user cannot access the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/">A new variant of Snatch ransomware threatens Windows 10.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> Hello, how are you? This time we are going to talk about security in Windows 10. Specifically about the <a rel="noreferrer noopener" href="https://searchsecurity.techtarget.com/definition/ransomware" target="_blank">ransomware</a> is known as Snatch. Ransomware is a type of malware whose purpose is to block the use of a computer or part of the information stored on it. This way the user cannot access the data or the computer itself. Consequently, the attacker asks for a monetary ransom in order to be able to access the information. Well, in the last few hours it has transpired that ransomware Snatch has refined its attack mode. The method consists of restarting the PCs you have just infected in safe mode. This a way of booting Windows used to diagnose a problem and resolve software conflicts. Let&#8217;s see how the new variant of Snatch ransomware threatens Windows 10. </p>



<h2>This is the new Snatch mode.</h2>



<p>It does not cease to surprise the evolution of computer attackers to violate the systems. It is well known that during the safe mode, some antivirus programs do not work. In this way, many problems are solved, but there is also a security gap. Snatch programmers have discovered that by using a key in the Windows registry they are able to program the restart in this mode.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="678" src="//1723336065.rsc.cdn77.org/wp-content/uploads/2019/12/ransomware-2321110_1280-1024x678.jpg" alt="" class="wp-image-16512" srcset="https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-1024x678.jpg 1024w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-300x199.jpg 300w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-768x508.jpg 768w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-696x461.jpg 696w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-1068x707.jpg 1068w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-635x420.jpg 635w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>It was Sophos Lab&#8217;s team that discovered how this new modality works. They declare that it is an effective technique and that it could be copied by other ransomware. For that reason, they made the information public so that preventive measures can be taken in the future. Now, this ransomware has been attacking since 2018. What is new is this safe mode reboot mode. Additionally, it does not attack home users and is not massively propagated by spam campaigns. On the contrary, they carefully choose their targets among large companies and government organizations. However, Snatch is refining its techniques by not only extorting money but also stealing data with the intention of then filtering it online.</p>



<p>We have finally seen how the new variant of Snatch ransomware threatens Windows 10. For that reason, I advise you to redouble your security measures when surfing the Internet. It is always advisable to be aware of the sites you visit and the files you open. All right, that&#8217;s it for now. Before saying goodbye I invite you to review our post on <a rel="noreferrer noopener" aria-label="Codeblocks (opens in a new tab)" href="https://www.osradar.com/how-to-install-codeblocks-in-windows-10/" target="_blank">Codeblocks</a> in Windows</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/">A new variant of Snatch ransomware threatens Windows 10.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 Easy Tips To Protect Your Website From Hackers</title>
		<link>https://www.osradar.com/5-easy-tips-to-protect-your-website-from-hackers/</link>
					<comments>https://www.osradar.com/5-easy-tips-to-protect-your-website-from-hackers/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Fri, 27 Sep 2019 15:38:19 +0000</pubDate>
				<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[website security]]></category>
		<guid isPermaLink="false">https://www.googez.com/?p=1585</guid>

					<description><![CDATA[<p>Cyber security has become increasingly important. Hence every web hosting provider has an uphill task when it comes to securing. With the increase in the number of attacks,a website security is now a key factor for choosing a hosting. Most of the web hosting community has rolled up their sleeves in a bid to protect [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/5-easy-tips-to-protect-your-website-from-hackers/">5 Easy Tips To Protect Your Website From Hackers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cyber security has become increasingly important. Hence every web hosting provider has an uphill task when it comes to securing. With the increase in the number of attacks,a website security is now a key factor for choosing a hosting. Most of the web hosting community has rolled up their sleeves in a bid to protect their clients. Especially&nbsp;cloud hosting providers&nbsp;who are now coming up with various techniques to secure large storage data centers with cloud computing technology.</p>



<p>Most of the web hosting community has rolled up their sleeves in a bid to protect their clients, especially&nbsp;cloud hosting providers&nbsp;who are now coming up with various techniques to secure large storage data centers with cloud computing technology.</p>



<p> Let us dive in and know how, shall we?</p>



<h2><strong>Keeping Your Software Updated</strong></h2>



<p>As a site owner, who has built a website with the help of a web development team or on your own through a third party platform, it is important that you ensure all the software on the website is updated. There are so many websites that run on WordPress, Joomla etc. that keep all the software on the website updated. This assures you as a site owner that your website is safe and secure. In case you are using third party plugins on your website, ensure that you are keeping a track of their updates so that all of them are done on time. A handy tip to avoid any backdoor entries to your web pages is to get rid of any old or non-updated plugins.</p>



<h2><strong>Building More Layers Of Security</strong></h2>



<p>Many hosting providers are upping the ante when it comes to securing their hosting environment. For instance, cloud hosting providers have started tightening the screws around&nbsp;WAFs (Web Application Firewalls)&nbsp;to inspect incoming traffic, weed out malicious requests, protect the website from SPAM, brute force attacks and cross site scripting. Earlier, WAFs mere mainly available as hardware appliances but with technological advancements they have been converted into Security-as-a-Service model. With this, security provisioning has become much easier across business segments. So, no matter what size of business you are, you can easily rent a cloud based WAF from your cloud hosting provider. Moreover, these plug-and-play services do not require you to hire experts, which in turn saves costs.</p>



<h2><strong>Switching to HTTPS</strong> <strong>Website</strong></h2>



<p>HTTPS (HyperText Transfer Protocol Secure) is a safe communications protocol that is used to transfer sensitive information between websites and web servers. Once you&nbsp;move your website to the HTTPS protocol, you are essentially adding a layer of TLS (Transport Layer Security) or SSL to your HTTP making your users’ and your own data extra secure.</p>



<p> It is not necessary that HTTPS is a mandate for any online transaction. However,&nbsp;Google’s decision to adhere and make HTTPS a norm&nbsp;has most website owners moving their websites to HTTPS because of the search ranking factor. So, both of these factors are a double advantage for website owners.</p>



<h2><strong>Make Admin Directories Tough To Spot</strong></h2>



<p>Hackers are quite smart when it comes to finding routes to access your site’s data. One point of entry is admin directories. Hackers use scripts which scan directories on the web server for give way names such as admin or login, only to enter the folders of your website. One way to protect these files is to rename them by picking innocuous sounding names. This way, hackers cannot spot your web files. Some popular CMSes like WordPress allow you to rename your admin folders to a name of your choice to avoid the breach of your website’s security.</p>



<h2><strong>Using Strong Passwords</strong></h2>



<p>This is one of the most important ways to secure your website from getting hacked. Usage of strong passwords is not only suggested by the platform provider but also by cloud hosting providers and other web hosting providers. It is an effective strategy to not just mitigate but also eliminate brute force and dictionary attacks. Apart from providing protection for email and financial transaction online, they are also critical when it comes to your web server, admin and database protection. Also, it is beneficial to not use the same password for different logins. Moreover, keep changing your password after every 2-3 months. This will prevent the breach of your website.</p>



<p>Apart from providing protection for email and financial transaction online. They are also critical when it comes to your web server, admin and database protection. Also, it is beneficial to not use the same password for different logins. Moreover, keep changing your password after every 2-3 months. This will prevent the breach of your website.</p>



<h2><strong>Conclusion</strong></h2>



<p><br>We hope now you know how you can keep hackers at bay without much efforts. These tips are not exhaustive but really easy to implement. So, going ahead, keep a check with respect to all these pointers and ensure the security of your website.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/5-easy-tips-to-protect-your-website-from-hackers/">5 Easy Tips To Protect Your Website From Hackers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/5-easy-tips-to-protect-your-website-from-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
