Results for AntiVirus

10 Steps to take after Cyber Security Breach 2019

Thursday, October 24, 2019
While a major part of preventing all massive potential data intrusion damage or cyber security breaches lies in the preventative measures of secure code, updated security software, use of frequently updated applications and strong passwords for all access points to your data; sometimes cyber security breaches happen no matter how well you have protected yourself. When this happens, prevention no longer matters for the moment and purely defensive and sanitary measures are your best friend.

Top 10 after do of a cyber breach


Definition of Data Breach.

In today's world we have huge amount of data available and that is a lot of information.

Having said that the data can be categorized broadly into private , public etc. These groups can be sub divided further into financial,medical,educations,military intelligence and so on.

Any kind of data that comes into the category that is restricted to public access and is to some extent confidential is  called as private data.These are the kind of data that are commonly hacked by hackers.When these private and confidential data are either made public or accessed by someone who is not authorized for it then this situation or scenario is called as data breach.

Example of social security identity theft and medical data theft is also of high concern.If you remember the Office TV show dialogue,"Identity theft is not joke,Jim".This truly hold good and should taken very seriously.

Example:data breach at experian

Now let’s cover some of these, as applied to assorted systems, including computers, hosting servers and your internal networks.At the end of this post we will also see the recent security breaches of 2019.
1.Make Sure you have been Hacked

Not all strange system behavior is a sign of third party or malware intrusion. Sometimes the complex systems we operate go haywire because of changes we ourselves have made to them without being aware of the consequences.

If your website, computer or network is behaving strangely, not loading properly or giving you blank displays where data or a visual interface should be visible, first think back to any recent changes you might have made that could be responsible for the differences.

In a website hosting system, for example, changing so much as a single parameter within a site’s MySQL database template can lead to a completely downed website even though all the internal data is perfectly safe.

So in other words be very sure that there is cyber security breach and need to prompt enough to take the actions, a minute late in this may result in serious repercussions.

2.Speak to your Support Team

As a follow up to step one above and as a part of general policy, you should speak to your technical support team as soon as you have noticed strange things about your system. If you’re a website owner, this could be the people who manage your IT and hosting servers and if you’re the owner of a business or organizational network, this could be your IT support staff.
They can not only tell you about any changes they may have done to provoke a system failure, they can also help you investigate the wider scope of the intrusion you may be suffering.

3.Image your Servers or Drive

Imaging software for computer hard drives and the same sort of software for servers should always be close at hand. In case of a breach, before proceeding with cleanup and removal of all malicious factors, you should first image your drives or servers immediately in the condition they have at the time of their hack.

This will preserve a large body of evidence which can later be examined through digital forensics techniques, and this evidence vitally needs to be preserved so that you can formulate a better future intrusion response. Knowing if you were the victim of a genuine virus, entry by a human hacker who’s been modifying your code or something as simple as some spyware is crucial.

4. Disconnect from the Web (if possible)

As soon as you have imaged your servers, hard drives and all data or code collections, you should immediately disconnect your servers or computers from the wider web if at all possible.

This may cause chaos and disruptions for clients if you’re running a business website, but as a preventative step it’s vital. By keeping your machines and servers connected, you’re allowing the malware or human intruders who have breached them to continue maintaining malicious access, keep stealing data or causing further damage.

Unless you’re running security scans that require a web connection to work, your systems should be offline while you recover.

5. Change all Passwords

In addition to imaging of all data storage media and disconnection from external access, you should also be moving quickly to change all of your access passwords. They may have been the cause of your security breach and by leaving them as they are, you’re inviting future attacks even after you repair and reinstall everything.

Your machine itself, your hosting server access, your MySQL databases and your FTP should all have their passwords and the passwords of any sub-accounts on them reset immediately.

6. Perform Security Scans

Antivirus software, anti-malware programs and network intrusion protection software should all be tools that you keep close at hand for intrusion incidents. Once your intrusion has been detected and the above steps taken, perform scans that cover all the major bases against malware, spyware, intruders and scripting attacks.

7.Remove all Malicious Files and Code

Through the assistance of your IT support team, your service providers and the security software you have been running, you can start slowly identifying and destroying all the malicious code you find on your network, servers or computer itself. This can be a tedious process and if you’re not sure that you have successfully removed everything, you probably need to do a full re-install.

8. Back up Everything

Back up all of your valuable data as soon as possible after a data breach. You may have already performed a full scale imaging process on your entire servers or drives but specific section backups of key databases and data volumes are also a good idea because they allow you to compartmentalize valuable information for later analysis through digital forensics.

9. Re-install as much as Necessary

If the breach was very severe and especially if the breach affected a lot of data or code, you might have to perform a full scale re-installation of all your software. In a computer, this will require you to format your entire hard drive and re-install your operating system.

On your website hosting servers, you’ll almost certainly need to re-install all o your database management software, LAMP (Linux, Apache, MySQL and PHP) applications along with any other third party software you were running for your website.

Always re-install to the newest versions of whatever software you need to replace.

10. Document Everything

Finally, document everything. Document all of the steps you took, the processes you followed and the files you erased, re-installed and used to clean your machine. Documentation is useful for future digital forensics (if needed) and it preserves a chain of evidence that can be used as a future prevention reference.

11.Report Identity theft to Police.
In case of any identity theft , the first thing we should do is freeze all the confidential information and if needed and possible  reset the information.Then reporting identity theft to Police is of foremost importance so that if in case those confidential information are misused then we have a police report in place.

10 Steps to take after Cyber Security Breach 2019 10 Steps to take after Cyber Security Breach 2019 Reviewed by Satyajit (Admins,a.k.a Satosys) on Thursday, October 24, 2019 Rating: 5

EICAR test file:To check if Anti-Virus is working Properly & effectively

Thursday, August 12, 2010
Well!!!what I feel Anti-Virus programs ensure computer security to (50-60)% but it is also essential to check whether it is working properly & effectively.Today in my post I will show you how it can be accomplished using "Eicar Test File" in few simple steps.
EICAR test file

What is Eicar Test File?

Eicar Test File (EICAR STANDARD ANTI-VIRUS TEST FILE) developed by European Institute for Computer Anti-Virus Research(EICAR) inorder to test the effectiveness of Anti-Virus Programs.This file is just a sample virus of .com extension or can be placed in multilevel archive format to examine the realtime response of the Anti-Virus program and its effectiveness in scanning archive files.This file doesnot cause any harm to the PC and can be removed after testing.This file can only be run in Windows platform.

Why Anti-Virus Testing is essential?

1.This is really a  good question but at the same time some may find it foolish to ask....lol.Yeah!!! anti-virus program testing is indeed very much essential,I would try to explain it with a simple example....suppose by any means i get to know the anti-virus running on your PC,its verison and details about it.I will try to search for the vulnerability it has or find a zero day of my own...lol,then i may plant an exploit for it.This can surely make your anti-virus cripple and nonfunctional.All these things can be done silently without your knowledge.So,at this point if you would do this Eicar Test file testing then you can catch the flaw.

2.Now a days many Remote Administration Tools(RATS) have the functionality of crippling the Anti-Virus programs.So,this test can be done to catch that deformity.

3.You can use it to test the realtime capabilities of different anti-virus programs and select the best one among them.

Procedure:

Step 1:First dowload the file (Eicar.com)

Step 2:If your anti-virus is working properly then it will immediately detect it as shown below by my Anti-Virus(Avira Premium Security Suite)
You can also use the above file in Single Zip Archive or Multiple Zip Archive to check upto what level your anti-virus detects.This is a very good option.......and a must do one.
 Single Zip Archive (DOWNLOAD     Multiple Zip Archive (DOWNLOAD)

Note:The code in the file is X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*  ,you can copy this code to a .txt file and change the extension to .com

  How to edit the string?
 -You can edit it by using whitespace characters with the total file length not exceeding 128   characters.
-Whitespace characters allowed are the space character, tab, LF, CR, CTRL-Z.
-Only upper case letters, digits and punctuation marks, and does not include spaces.
-The third character is the capital letter "O", not the digit zero.

How to remove Eicar.com file from PC?

You can delete this .com file as you delete other files because it doesnot make any registry change when it is run.But sometimes when it is detected by the anti-virus program,the access to the file is restricted so you may not be able to delete it.At this point you can use UNLOCKER (Download) to resolve the restriction and delete it.

Source:www.eicar.org/

If  you find this post worthy to read then do drop a comment,it will be appreciated.
IF YOU LIKED THE CONTENT OF THIS BLOG THEN DO "VOTE" FOR IT........Click here to Vote!
EICAR test file:To check if Anti-Virus is working Properly & effectively EICAR test file:To check if  Anti-Virus is working Properly & effectively Reviewed by Satyajit (Admins,a.k.a Satosys) on Thursday, August 12, 2010 Rating: 5

Power of "9" that gives PC ultimate security.

Thursday, June 10, 2010
There are many PC security tools available in the market but from my personal use and research thourgh different hacking forums and top 100 hacking sites rated under "PROGENIC", I have come up with only 9 secuirty tools.

1.Avira Premium Security Suite:


This is one of the best antivirus available,which has the largest virus count but may not have ultimate web security so,it needs an extra firewall.Moreover it is preferred by most of the hackers in windows platform.It has a very user friendly interface and VDF update.It has on demand scan functionality and highspeed deep scan on multiple file utility.Integrated quarantine management to isolate and process files,rootkit protection for detecting hidden malware installed in computer,this is a
good feature as nowadays most of the lethal virus are spread through rootkit. It has also very easy and quick update with small update file size which can be updated very easily with dailup connection.


OR



Kaspersky Internet Security 2010:This is a Russian Company and
highly accepted product today due to its high functionalities and
uniqueness.






2.Comodo Personal Firewall:It is one the best firewall for windows platform.Protects against threats from hackers,ip spoofing ping attack.port scan etc.







3.Zemana Anti-logger:This is the best antilogger available because it has anti-keylogger,anti-screenlogger,anti-webcamlogger,anti-clipboardlogger and also provided with self defense functionalities.






4.Dr Web LinkChecker:By this one can scan a file before downloading it.Just right click on the required link and left click on the dr.web icon.It is available as firefox addon and also can be downloaded from the parent site.




5.Mcafee SiteAdvisor:This notify the user about the saftey of a site while
browsing.It crawls the website and find out wheather it has malware or any
threats and reports the user when he/she visit that site.




6.Sandboxie OR Any other virtual tool(Vmware/Virtual box):





7.Hotspot Shield:








8.Kaspersky Rescue Disk:





OR



Avira Rescue Disk:







9.USB Disk Security:

Power of "9" that gives PC ultimate security. Power of  "9" that gives PC ultimate security. Reviewed by Satyajit (Admins,a.k.a Satosys) on Thursday, June 10, 2010 Rating: 5
Powered by Blogger.