Defending computers and gadgets from cyber threats

Defending computers and gadgets from cyber threats |eScan

Computers are an incredible technology that has propelled mankind into the age of technological marvels. The ease of operations has made life a lot easier for the entire human race and now we have even evolved with our computing capabilities. However, even today our computers are prone to viruses and malware, that not only could harm the system but are also capable of stealing personal and sensitive data.
In such a scenario, if you are looking to add some extra security, our experts have suggested the below mentioned ways to protect the systems from viruses.

Install a Sturdy Antivirus
Among a vast range of antivirus solutions, choosing a sturdy one can be a tedious task. People at times chose to download more than one antivirus with a perception that doing so would make their system a lot safer. However, our experts suggest using a complete security solution that does everything from protecting the user’s online reputation as well as knowing the security flaws in an installed software, along with updated virus definitions. Users should not believe that without an internet connection, they won’t be infected with viruses since a virus can easily be transmitted through endpoints as well.
Keeping software updated
In order to enhance individual features all computer operating systems receive frequent updates. Security updates are a part of these regular updates which keep a user’s system safe from the latest batch of viruses and malware. Users need to ensure that these updates are installed automatically even if they are time-consuming.
Taking a Backup
At times when users are unable to recover any data that is lost due to virus infection, it becomes critical to store data on alternate storage space to avoid losing any critical data. There are three very basic options for storing user data: External hard drive, Online Storage, and Cloud storage. A lot of sites these days offer a limited amount of storage space which can be utilized for saving important documents.
Using a Strong Password
A password is the first line of defense that protects users’ sensitive data from being stolen by anyone accessing the machine without the user’s permission. Any unauthorized access can lead to data being stolen or a malicious content being placed on that cloud that automatically updates to the system. A strong password is complex and is not related to the user in any way. It is also advised to keep different passwords for different logins, like email, banking, and social media accounts.
Keep an eye on the downloads
Websites can be tricky when they are loaded with malicious content. If a user takes note of an unauthorized download taking place then they should stop the download immediately and exit their current webpage. Always use an updated browser or update the security setting of the current browser to medium or maximum or there is a chance that the download would occur in the background without any alerts.
Install an Ad Blocker
Online pop-up advertisements can lead to sketchy websites that can lead to users’ data being stolen and install viruses. Its easier said than done when trying to avoid this unless a reliable ad blocker is used. Our experts suggest installing eScan Total Security Suite for end-users and corporate 360 for corporate users to battle this menace. Users should be careful while browsing the web even if we have an adblocker active since many sites prevent entry if the application or app is disabled.
Run a Virus Scan often
Some viruses are sophisticated enough to sneak into the system unnoticed. Hence, one should ensure that they constantly run a virus scan to scour the hard drive for such threats. This can be done moments before a backup is taken to ensure that there are no harmful files being backed up as well.
Avoid Suspicious links
Links can be very dangerous in nature, especially when originating from unknown sources. This is the most common way to install malware or steal data. Being careful about which link is being clicked saves everyone from potential threats.

Defending computers and gadgets from cyber threats |eScan

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

 

Understanding And Combating The DDoS Attack.

Given there are various kinds of cyber-attacks that could render systems across the world, to be a slave at the hands of the attackers, who could harbor malevolent intentions towards their victim. This could lead to a crippling effect on an organization or worst, even a nation. Hence, we look forward to educating the masses about DDoS (Distributed Denial of Services) attack.

What is a DDoS attack?

A DDoS attack aims at bringing down the services of an organization or website, by bombarding it with so much traffic that their services and infrastructure are unable to handle it. In this kind of attack, multiple compromised systems are used to target the server with huge volume of traffic.

This is usually caused by a botnet formed by a number of compromised systems. The various kinds of DDoS attacks include volume-based attacks protocol attacks and application-layer attacks.

Types of DDoS attacks

Volume-based attacks – This attack includes UDP floods(User Datagram Protocol), ICMP(Internet Control Message Protocol) floods, and other spoofed packet floods. This kind of attack is measured in bits/second (bps).

Protocol Attacks – This kind of attack is measured in packets per second (PPS) and it includes SYN floods (half-open attack), fragmented packets attack, ping of death, smurf DDos and more.

Application layer attacks – This kind of attack is measured in Request Per Second (RPS) and it includes, low-and-slow-attacks, GET/POST floods and more.

Examples of a DDoS attack –

September 2019 – Carpet Bombing DDoS attack
South Africa’s largest internet service provider, Cool Ideas, was targeted and its services were brought down for an entire day due to a massive Carpet Bombing DDoS attack.

July 2019 – Telegram DDoS attack
A massive DDoS attack was launched against Telegram Messenger that caused service outages along with connection problems among the apps North and South America based users. Along with America, some European countries also faced the attack.

DDoS attack against Wikipedia

A large scale attack was launched against Wikipedia taking its website down across various countries, including France, Germany, Italy, The Netherlands, Poland and parts of the Middle East.

Alleviating against the DDoS attack

To remain secure against such attacks, our experts suggest implementing a Web Application Firewall (WAF).
It is also recommended to use a DDoS protection service that can detect and defend against a DDoS attack.
Blocking of suspicious packets and clearing of logs are other methods of mitigation against a DDoS attack.

from:https://blog.escanav.com/2019/10/what-is-ddos-attack/

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

Waspadalah terhadap taktik peretas

Dalam dua tahun terakhir, serangan phishing mengalami peningkatan yang stabil dan para ahli kami memperkirakan bahwa itu hanya akan meningkat dalam waktu mendatang. Kenaikan mengejutkan menunjukkan bahwa ada lebih banyak serangan yang terjadi karena ransomware. Telah ada peningkatan tajam dalam serangan ransomware terhadap berbagai kota, organisasi besar dan organisasi pemerintah di seluruh dunia. Untuk masuk ke jaringan lokal, peretas membuat kampanye palsu untuk mencuri kredensial karyawan.

Begitu masuk ke dalam sistem, malware mereka menahan sandera data lokal hingga jumlah tebusan dibayarkan.

Penjahat dunia maya kini telah mengalihkan perhatian mereka ke rekayasa sosial melalui berbagai jenis komunikasi digital agar injeksi malware berhasil. Namun, cara paling umum infeksi ransomware adalah melalui phishing.

Taktik pengelakan phising

Di bawah ini adalah beberapa taktik pengelakan phishing yang akan membuat pengguna dan organisasi di seluruh dunia, aman dari serangan ransomware.

Enkripsi Konten – Konten email dan lampiran keduanya dienkripsi. Ini mencegah deteksi dari solusi keamanan.

Pemblokiran Inspeksi – Untuk mencegah koneksi tertentu dari alamat IP dan host dari penyedia keamanan tertentu, blocklist digunakan.

Encoding Karakter HTML – Kode HTML ditampilkan dengan benar di browser web tetapi mengabaikan kata-kata tertentu yang ditandai oleh sistem keamanan.

URL phishing dalam lampiran – Deteksi menjadi sulit ketika tautan phishing disembunyikan dalam lampiran di email itu sendiri. Biasanya, dokumen-dokumen seperti itu digunakan untuk menargetkan kedutaan-kedutaan saingan dan kantor-kantor serta agen-agen pemerintah.

Injeksi Konten – Tautan disertakan dalam halaman yang sah dengan kerentanan atau aplikasi yang mengarahkan pengguna ke halaman phishing.

Kesimpulan

Selama pengguna terus mengalah pada tuntutan hacker, ancaman ransomware akan selalu gigih. Oleh karena itu perlu bagi para pejabat untuk fokus pada metode mitigasi dengan melindungi karyawan dan pengguna melalui pelatihan reguler dan sistem keamanan real-time yang lebih baik.

Salah satu solusi paling menonjol untuk menghindari serangan Phishing adalah memastikan tidak ada tautan dari email dan pesan teks yang tidak diklik. Meskipun email spam kadang-kadang dapat menimbulkan rasa ingin tahu kita, disarankan untuk tidak mengklik tautan yang berasal dari sumber yang tidak terpercaya.

Solusi alternatif adalah menginstal Total Security Suite eScan untuk perangkat Windows dan Mobile Security untuk Android dan perangkat yang mendukung iOS.

dikutip dari

Evasive Phishing Tactics | Beware of hacker’s tactics

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

MailScan for Mail Servers

MailScan for Mail Servers

MailScan for Mail Servers is an advanced Real-time Anti-Virus and Anti-Spam solution specially designed for Mail Servers. It ensures proactive protection to your organization’s network against Virus, Worm, Trojan and many other such evolving information security threats.

Powered with an array of intelligent filters, MailScan offers powerful protection against Spam and Phishing mails along with comprehensive content security.

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

https://www.escanav.com/en/mailscan/mailscan-for-mail-servers.asp

The Ultimate Surveillance Spyware – Pegasus Malware

Earlier this week, it had been reported in the media that Israeli spyware called Pegasus was used to spy on Indian journalists and activists earlier this year. Given the surveillance was carried out by the popular messaging app Whatsapp, it has got the citizens of the country perplexed on how a certain malware can carry out such an act to breach their privacy. Consequently, today we look into the malware pegasus and how it works.

How Pegasus works and what it does?

Pegasus malware is a spyware that has the capability of hacking any Android or iOS-based devices and plunder a myriad of data from the infected device, including Text messages, emails, keylogs, audio and information from applications that are installed on the device, such as Facebook, Instagram and Twitter which are popular with people across the world. If this wasn’t enough the spyware is further capable of recording conversations and videos, as well as snap pictures using the infected devices camera. This malware was created by NSO Group, which is an Israeli Cybersecurity firm that was established in the year 2010.

A spying attack by Pegasus starts with a simple scheme of Phishing. The attackers start by identifying their target and sending them a clickable website URL via social media, email, messages or any other format of messages.
When it comes to an iOS device, once the user clicks on the link sent by the attacker, the malware secretly carries out a series of zero-day attacks, jailbreaking the victim’s device so the spyware can be remotely installed.

The only indication of a malicious attack being carried out is exhibited when the browser closes after the victim has clicked on the link sent by the attacker. Otherwise, there is no new or different indication that anything unusual has happened or any new processes are running within the device.

Once the malware is in place and installed, it begins to contact the operator’s command and control server, to receive and execute the operator’s command.

The spyware has malicious code which enables the user to collect varied information of its victim by spying on what the user does on the device. The malware can access and exfiltrate basic functions of the phone, like email, messages, and calls along with logs from various social media sites and messenger’s like Facebook, Whatsapp, Facetime, Skype, Viber, and Tango.

Unlike any other malware, once Pegasus jailbreaks the victim’s device, it compromised the apps that are already installed on the device and doesn’t replace the app with its malicious versions.

Pegasus for Android does not exploit the zero-day vulnerabilities to root the target device and install the malware, it uses a well known rooting technique called Framaroot. While for iOS, jailbreaking the device is a necessary process. If the zero-day attack fails to jailbreak the device, then the overall attack sequence fails. However, the hackers constructed functionality into the Android version enables the malware to request for permissions so it can extract data if the initial attempt to root the device is unsuccessful.

Taking a look at Pegasus’ history

A human rights activist Ahmed Mansoor from the UAE is credited with the discovery of Pegasus. Mansoor, who is now under imprisonment, received SMS text messages on his iPhone on the 10th and 11th of 2016, promising vital information about those who were tortured in the UAE. Instead of clicking on the link, Mansoor sent the link to researchers of any cybersecurity organization that is based at the University of Toronto. The organization’s research includes digital espionage and hence, recognized that the links belonged to an exploit infrastructure connected to the NSO Group which sells Pegasus and other Spyware.

When Apple learned about the existence of Pegasus it released security updates, patching the three vulnerabilities that Pegasus claimed to have exploited. While google helped researchers investigate the case, notifying potential targets before an attack could be carried out.

#https://blog.escanav.com/2019/11/surveillance-spyware-pegasus-malware/

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

Cashless Ecosystem tidak sepenuhnya aman dan rentan terhadap serangan

Dalam beberapa tahun terakhir, didorong oleh revolusi ponsel, lanskap pembayaran global telah mengalami banyak perubahan. Segudang pemain Fintech telah membuka jalan yang tak terbayangkan untuk bisnis dan individu. Dengan kemajuan di sektor ini, kosakata keuangan orang awam tidak hanya ditingkatkan tetapi juga telah diperbarui dari komputernya ke perangkat genggamnya dengan layanan seperti, perbankan seluler, e-wallet, ATM mikro, kartu virtual, layanan bernilai tambah dan banyak lagi.
Dengan tujuan untuk meningkatkan pengalaman pelanggan, intervensi regulasi dan inovasi fintech telah menciptakan Ekosistem Tanpa Uang. Tapi Cashless Ecosystem safe tidak sepenuhnya aman dan rentan terhadap serangan. Jadi bagaimana kita dapat berkontribusi dalam melindungi ekosistem tanpa uang tunai?

Meskipun secara tradisional lembaga keuangan dan bank telah memilih sistem keamanan tingkat tinggi, tetapi disarankan untuk tetap selangkah di depan taktik cybercriminal yang terus berkembang. Sebagian besar serangan dunia maya yang kompleks dan terkenal telah menampilkan strategi di mana peretas menargetkan pengguna akhir melalui basis data kelembagaan perbankan, komputer, perangkat lunak, perangkat seluler, perangkat keras, sakelar, dan lainnya.

Dalam bahasa awam, penyerang berencana menyedot uang hasil jerih payah Anda dan berbagai perampok di seluruh dunia telah menyoroti meningkatnya ancaman phishing tombak. Banyak dari serangan phishing ini sulit dideteksi karena tidak memiliki file yang diperlukan dan tidak dapat dilacak oleh alat antivirus lawas.

Sebagai tren kejahatan dunia maya yang sedang berkembang, para penyerang mengaburkan kode mereka sehingga para peneliti keamanan tidak dapat merekayasa baliknya, ditambah lagi, kode itu sangat cerdas sehingga memeriksa sendiri, jika dijalankan dalam sendbox dan menolak untuk beroperasi di lingkungan virtual apa pun.

#https://blog.escanav.com/2019/09/protecting-the-cashless-ecosystem/

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

eScan Mobile Security for Android

eScan Mobile Security for Android

eScan Mobile Security for Android provides protection to your android-based phone against virus attacks, Data loss, privacy threats, data theft and more. With its advanced anti-theft features, it secures the data of your lost/stolen device with its remote lock, Wipe Data and Data Blocking feature.

Contact us
+62 21 6231 8661
sales@epsindo.co.id
http://www.epsindo.co.id

#escanantivirus
#escanindonesia
#antivirus
#escan

https://www.escanav.com/en/android-antivirus/mobile-security-for-android.asp

 

Laptop stolen? No worry, eScan will secure your data.

*If your device is ever lost or stolen, eScan Anti-Theft will let you track the missing device using localization by IP address, helping you retrieve your device and protect personal data. eScan Anti-Theft is a new feature introduced in eScan Total Security Suite, using advanced technologies such as IP address lookup, image capture, screenshots, lock down of device, Alerts, scream, and Data wipe. These wide varieties of techniques ease down the process of tracking the device in case of lost or stolen.

 

 

Mari biasakan Backup!

Hai sobat eScanholic, apakabar,

sebelumnya izinkan kami untuk mengucapkan “Selamat Hari raya Idul Fitri 1438 H, Mohon Maaf Lahir & Bathin”

Kita tahu berbagai varian ransomware merebak belakangan ini.

Sebelum terlanjur data penting kita terkena virus ini – salah satu antispasinya adalah dengan rutin melakukan backup.

eScan Corporate edition memberikan fasilitas backup for free dan dapat segera dipakai customer.

Dengan fitur Encrypted Backup (eBackup), yang hanya bisa dibuka (di-restore) juga dengan eScan, aplikasi apapun (termasuk virus) tidak akan bisa membuka dan memodifikasi file backup yang dibuat eScan.

Protecting Data eBackup
Protecting Data eBackup

http://www.epsindo.co.id/escan-ebackup-2/

Untuk info lebih lanjut, silahkan hubungi kami di alamat email

sales@epsindo.co.id

 

eScan Enterprise Mobility Management (EMM)

Perusahaan skala Enterprise saat ini mulai umum memperbolehkan karyawannya memakai mobile devices sebagai Company Owned Devices (COD /peralatan milik perusahaan) atau memperbolehkan Bring Your Own Device (BYOD/peralatan pribadi) untuk mendukung pekerjaan.

Kebijakan ini menunjang produktifitas karyawan dan mempermudah pekerjaan.
Solusi eScan’s Enterprise Mobility Management (EMM)* memastikan bahwa data perusahaan aman dari resiko kehilangan, malware dan akses yang tak diijinkan.

*info lebih lanjut bisa dibaca di https://escanav.com/en/about-us/enterprise-mobility-management.asp#application-control