• Skip to content
logo logo
  • Blog
Login SIGNUP

ciberattack

Ransomware: What your company needs to know to prevent and combat them

March 22, 2019 by HushApp Team

Ransomware: What your company needs to know to prevent and combat them

Have you ever heard about the Ransomware? Surely you have heard about them in your workplace and also how dangerous they can be. More than a computer technician can tremble only to hear the word, and no wonder, since it is considered one of the most dangerous malwares that exist today. Why? Here we explain it to you.

What is a Ransomware and how does it work?

It is a kind of digital hijacking with a type of malware that blocks users from accessing their system or files, and the only way to access them again is through a rescue requested by cybercriminals.                                                                                                        

This type of malicious software has existed since the 80s, and in its early days, they demanded rescues via postal mail, nowadays the payments work through cryptocurrencies or credit cards.

Their way of operating is usually through malicious spam, which can appear as advertising or email with infected attachments and often deceive users by posing as recognized institutions (for example the FBI) to click on their contents.

Once it arrives on the system, the ransomware contacts the central server to obtain the information it needs to activate, there it can block or encrypt the files, and thus indicate the rescue instructions.

Generally, cybercriminals threaten to erase information or raise the price of rescue if it is not paid in the estimated time. The ransomware can affect any type of operating system: Windows, Mac or Linux.

Types of Ransomware according to its complexity:

Scareware: Despite the fact it seems dangerous nevertheless it is less fearsome. It generally uses pop-up messages from “supposed” fake security programs or a false offer of technical support reporting that a malware has been “detected” and that the only way to get rid of it is to pay. If the payment is not made, it will continue to issue pop-up messages, however the files are not affected.

Screen blockers: In this case, the malware is more complex because it blocks the computer screen, preventing its use completely. The files are there but there is no way to access them, unless the computer is restored, which will lose all the information you have if there is no previous backup.

Encryption Ransomware: It is the most dangerous of all and, therefore, the most known, as it steals the files and the numbers, demanding a payment to re-decrypt and return them. By using encryption, it is impossible for a common security or restore software to return these files, unless the ransom is paid, which will not guarantee that the cybercriminal will return them.

Some prevention tips against Ransomware:

  1. Start by using (and updating) an antimalware, which includes firewalls.
  2. Update the system and all applications for any operating system, Mac, Windows or Linux.
  3. You can add a specific anti-ransom tool for this type of attack.
  4. Use antispam filters where these malwares usually arrive.
  5. There are applications that block the execution of some suspicious JavaScript code that could be harmful to the computer. If you install any, you can minimize the risk of infection through the web.
  6. Review the extensions of the files, to identify files that are passed by others (for example if you see a Word file with the extension .exe)
  7. Administrator accounts are the most sought after by hackers, they know they are those who have greater access to the system. That is why it is recommended to do daily tasks in other accounts and use administrator account only for system manipulations.
  8. Limit network access to sensitive files in terms of editing, share them so they can be read and give permission to edit only to those who need it.
  9. Make backups and save and keep the most sensitive information handly in secure applications such as Hushapp.

After the attack:

If, unfortunately, you were already a victim of a Ransomware, the first thing you should do is to keep calm, avoid as much as possible to pay, this will not ensure anything, and finally, follow these steps:

  • Disconnect the internet device quickly before the malware can access the server. Isolates the device from all the rest of the network.
  • Some large cybersecurity firms offer free solutions such as web pages and software to decipher ransomware and search for solutions to damages.
  • The idea is to call the relevant authorities so they can help.

Cyber attacks by Ransomware are increasingly sophisticated and can cause large losses to companies (and also to people). Therefore, it is important to take all necessary preventive measures to protect sensitive information of the company.

Filed Under: Cybersecurity Business Tagged With: ciberattack, hacker, hackers, HushApp, malicious software, malware, pishing, Ransonware, spam, virus

Love vs cybersecurity: How to use dating apps and protect your privacy?

March 7, 2019 by HushApp Team

Love vs cybersecurity: How to use dating apps and protect your privacy?

Are you looking for love? Or rather an adventure? Whatever your preferences you surely want to take advantage of a large number of apps that exist in the market to facilitate or improve your search for the right person. Nowadays you can look for someone because of their tastes, their location, or whatever. The question is how secure are these dating apps? Can you protect your privacy enough by using them?

Like almost everything in the digital and interconnected world, these dating apps are also vulnerable to cyber attacks, and many people have suffered consequences, either because they have leaked files of their intimate life that have been exchanged through these applications, or worse, have been the victim of some fraud or criminals that are not the people who claim to be in these apps. So, how to balance your love or sexual life without endangering your security or privacy?

We do not want you to stay single for fear of being victim to an attack like these. If you follow some security measures in the digital or physical world, you can reduce the chances that your information will be used for other purposes than what you are looking for.

Advantages and disadvantages of dating apps and how to use them safely

  1. The duality between privacy and the veracity of information: One of the main problems that arise in these dating applications is knowing if the person is really who they say they are. Some of these apps allow users to register with Facebook, place work or study site, so this could allow the other person to see if this person, in a certain way, is “real”. The counterpart: the person being investigated, how can we know if they are really looking for an “appointment”? Our advice: limit information about yourself on the Internet to the one you want others to know about you, and with whom you want them to know about you, then you can introduce yourself as you like.
  2. The ideal, in this case, is to have common sense and not to share personal information immediately, as well as it is advisable to have the first dates in public places. Moreover not to give money: it is important to note that there are even people who have been victims of fraud, where their alleged “dates” have asked for money and for some reason there are those who have agreed.
  3. Another common feature of these applications is that they allow you to locate a person close to you, thanks to geolocation, there are also much more accurate, as they indicate how many times you have crossed with that person. It can be an advantage if you want to look for someone in your area, but also it is a disadvantage due to the fact that you are making it clear where you are, and even worse if you indicate each step you take. It is preferable to opt for applications that do not use this modality, which would only allow users to communicate directly so that they define where to find each other. Although it is not so exact, you have the power to determine where and when you want to meet that person.
  4. Secure communications: The problem with many of these dating apps is that they do not have secure communication channels between their users, and therefore they are victims of data leakage. When choosing the application, take into account that your app use encryption in your system to protect the privacy of its users.

For your part, add all the necessary layers of protection, connect to secure networks, use a VPN and an antivirus to protect the device you use.

Protect these photos that should not be exposed for any reason 🔥😈 using HushApp, there you can keep them protected in your Hushbox, without anyone else but you can access them, or sending it to your date in an easy and completely safe way. Nobody who you do not want can be able to access your privacy.

In HushApp we do not want to know about your private life, we want to help you to protect it.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: ciberattack, cibersecurity, data breach, HushApp, HushBox, privacy, private life, Tags: dating apps

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled