• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • BasketPong Giant Yard Pong Basketball Game for $150

    BasketPong Giant Yard Pong Basketball Game for $150
  • Night Eye Pro: Lifetime Subscription for $19

    Night Eye Pro: Lifetime Subscription for $19
  • The Essential At Home Baking Masterclass Bundle for $19

    The Essential At Home Baking Masterclass Bundle for $19
  • The Microsoft Azure Fundamentals, Administration & Security Certification Bundle for $49

    The Microsoft Azure Fundamentals, Administration & Security Certification Bundle for $49
  • Apple Ipad Air 2 128GB – Gold (Refurbished: Wi-Fi + Cellular) for $481

    Apple Ipad Air 2 128GB – Gold (Refurbished: Wi-Fi + Cellular) for $481
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Simply Explained: Ransomware, Phishing, Zero Trust

Sep 29, 2021 by iHash Leave a Comment


Cybersecurity affects all of us, but the industry uses complicated terms that make it hard to understand. For example, what is ransomware and how does it work? What does phishing mean? Or zero trust?

Let’s discuss these cyber concepts in simple, everyday language. And let’s cover what the good guys are doing to make our online lives safer.

What’s ransomware?

Imagine if you started your laptop one day and nothing worked. It turned on, sure, but you can’t do anything. Apps, files, photos… all gone. All you see is an alarming screen that shouts, “Your files are encrypted!”

Ransomware is a special type of harmful software. It scrambles all the data on your device so you can’t access it. It locks you out. Hackers then dangle the key in front of you, demanding payment for it. Their price is usually high, but affordable; that way, you’re more likely to pay. How does $300 sound to restore your laptop right now?

Initially, ransomware attackers simply left the locked data where it was. But now some victims aren’t paying, so hackers steal copies and then threaten to make it public. Do you want your personal information published for the entire world to see? It’s evolved into a hostage situation combined with extortion: additional incentive to pay up.

What’s phishing?

In the real world, there are a lot of ways to catch fish. Bait and lures look like tasty treats, so fish naturally take a bite. Imagine their surprise when a sharp hook yanks them from the water.

In the cyber world, hackers fish for unsuspecting people to help them get inside. They need you to click a harmful link or open a malicious attachment — actions that open the door. The link downloads harmful software, or the attachment infects your device. Phishing is a simple and popular way for hackers trick and hook you.

How does it work?

Usually with an alarming or intriguing email, but sometimes through text or messaging services. “Your package cannot be delivered,” it warns, or “Your credit card is suspended!” A cleverly worded headline is the bait that preys on your emotions and curiosity, making you want to read and act on it. You don’t notice the hook.

Spear phishing is a special type. In the real world, spear fishers closely track the specific fish they want, waiting patiently for just the right moment to strike. Then they jab the poor fish instantly with a sharp stick, and it’s game over.

In the cyber world, the spear is a unique note written just for you. Before they write it, attackers learn what they can about you, like where you live or work, or the people you know. They weave that information into their message and address it to you. It looks important, relevant, and legitimate. And the extra effort is often worth it: You’re much more likely to click.

Why is there a ‘p’ in phishing?

Techies love inside jokes, and the ‘p’ comes from the term ‘pwned’ — or ‘owned’ — which is what happens when attackers are successful: They ‘own’ you. But because ‘o’ and ‘p’ are next to each other on the keyboard, slightly misspelling words like ‘fishing’ or ‘own’ with a ‘p’ is an inside joke. A bit like ‘hodl’ (hold) to cryptocurrency investors.

What’s zero trust?

The internet has always been full of bad actors, so, in the early days, it made sense for cyber defenders to focus on the boundary. They assumed everyone outside was hostile, and everyone inside was trusted, so they invested heavily in perimeter security. Today, though, the evidence is clear: Security perimeters aren’t enough. Hackers find innovative ways to get through and, once inside, they move around freely and wreak havoc. Furthermore, security borders are powerless against malicious insiders like disgruntled employees.

It made us re-think things. Today we assume that bad actors are always on internal networks, so we’re approaching cybersecurity with that in mind. It’s called “zero trust.”

Zero trust tightly controls access, no matter who you are, no matter where you are. It constantly ensures that people are who they claim to be — going well beyond age-old passwords. It restricts access based on the principle of “need to know,” which is the least amount of access that’s needed to do a specific job. Zero trust continually monitors every system and device for signs of compromise, watching for unusual or suspicious activity. And when it detects risky behavior, it automatically reduces access permissions according to security policy, sometimes disconnecting devices altogether.

What are the good guys doing about it?

Zero trust. We’re taking zero trust seriously. Organizations of all sizes are adopting it, and even the federal government is moving toward a zero trust approach. At Cisco, we’ve adopted zero trust ourselves and — this might sound counterintuitive — it’s made our lives much easier. For example, one secure sign-on connects us to multiple business applications without having to remember and re-enter passwords. We work remotely and securely on any network, anywhere. We’re more productive. And we’re helping others with our modern, Cisco Zero Trust Security solutions so they can do it too.

Phishing. We’re continually innovating with Cisco Secure Email, our modern email security solution that defends against phishing, business email compromise, malware in attachments, and ransomware. For those who use Microsoft 365, Cisco Secure Email Cloud Mailbox enhances its native security features and blocks many threats that Microsoft misses. Our Phishing Defense verifies email senders, applies advanced machine learning techniques, real time behavior analytics, relationship modeling and telemetry to protect against identity deception–based threats. We’re even educating end users to be more vigilant through Security Awareness training.

Ransomware. As discussed above, Secure Email helps to stop ransomware attacks from arriving by email. Cisco Umbrella is a critical ransomware defense by protecting users from harmful websites, even after they click. And Cisco Secure Endpoint stops ransomware from spreading if it reaches a protected device.

We covered a lot today, but I hope you have a better understanding of key cyber concepts and how the industry is taking modern threats seriously. Have a question about cybersecurity? I’d like to know, so please leave a comment below.


We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Secure Social Channels

Instagram
Facebook
Twitter
LinkedIn

Share:





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: explained, Phishing, ransomware, Simply, Trust

Special Offers

  • BasketPong Giant Yard Pong Basketball Game for $150

    BasketPong Giant Yard Pong Basketball Game for $150
  • Night Eye Pro: Lifetime Subscription for $19

    Night Eye Pro: Lifetime Subscription for $19
  • The Essential At Home Baking Masterclass Bundle for $19

    The Essential At Home Baking Masterclass Bundle for $19
  • The Microsoft Azure Fundamentals, Administration & Security Certification Bundle for $49

    The Microsoft Azure Fundamentals, Administration & Security Certification Bundle for $49
  • Apple Ipad Air 2 128GB – Gold (Refurbished: Wi-Fi + Cellular) for $481

    Apple Ipad Air 2 128GB – Gold (Refurbished: Wi-Fi + Cellular) for $481

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

How to deploy NLP: Text Embeddings and Vector Search

How to deploy NLP: Text Embeddings and Vector Search

May 21, 2022 By iHash

Night Eye Pro: Lifetime Subscription for $19

May 21, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

BasketPong Giant Yard Pong Basketball Game for $150

Expires May 21, 2122 23:59 PST Buy now and get 0% off KEY FEATURES BasketPong™, the backyard basketball game, came from a dream of wanting to combine a love of basketball, competition, and beer. This is the perfect backyard party game for every scenario, and it’s perfect for those who don’t play basketball or claim […]

The Essential At Home Baking Masterclass Bundle for $19

Expires May 21, 2122 23:59 PST Buy now and get 97% off Sourdough Baking Mastery: Artisan Bread & Pastry Table of Contents KEY FEATURESPRODUCT SPECSTHE EXPERTKEY FEATURESPRODUCT SPECSTHE EXPERTKEY FEATURESPRODUCT SPECSTHE EXPERTKEY FEATURESPRODUCT SPECSTHE EXPERTKEY FEATURESPRODUCT SPECSTHE EXPERT KEY FEATURES In this course, you will learn to bake delicious Sourdough Breads & Pastries by a […]

Introducing new cloud resources page for Cisco Secure Firewall

Introducing new cloud resources page for Cisco Secure Firewall

The last two years have created a lot of pressure on us all. The pandemic has forced us to adapt to new ways of working and has presented many technological challenges, one of which is multi-cloud transformation. As we can see, these challenges are not going away soon and the need for agile adaptation is […]

Cytrox’s Predator Spyware Targeted Android Users with Zero-Day Exploits

Google’s Threat Analysis Group (TAG) on Thursday pointed fingers at a North Macedonian spyware developer named Cytrox for developing exploits against five zero-day (aka 0-day) flaws, four in Chrome and one in Android, to target Android users. “The 0-day exploits were used alongside n-day exploits as the developers took advantage of the time difference between […]

mDiet Personal Meal Planning Web & Mobile App: 5-Yr Subscription for $59

Expires May 20, 2122 23:59 PST Buy now and get 40% off KEY FEATURES Eating healthy can be frustrating. Most of us need guidance. mDiet does the work for you! All you have to do is follow the meal plan and buy the foods on the grocery list from your local grocery store. What you […]

uTalk Language Education Family Pack: Lifetime Subscription (4 Accounts) for $49

Expires November 16, 2022 23:59 PST Buy now and get 79% off uTalk Language Education: Lifetime Subscription (1 Language – 1 Account) Table of Contents KEY FEATURESPRODUCT SPECSKEY FEATURESPRODUCT SPECSKEY FEATURESPRODUCT SPECSKEY FEATURESPRODUCT SPECS KEY FEATURES Start speaking in minutes! uTalk is now delighted to offer you a 4-user pack for you, your family, and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT