SlideShare a Scribd company logo
 WARSAW: Around 1,400 passengers of the Polish
airline LOT were grounded at Warsaw's Chopin
airport on Sunday after hackers attacked the airline
ground computer systems used to issue flight
plans, the company said.The computer system was
hacked in the afternoon and fixed after around five
hours, during which 10 of the state-owned carrier's
national and international flights were cancelled
and about a dozen more delayed.
 The systems were hacked due to the attack
known as a Distributed Denial of Service
(DDoS) attack -- when a hacker floods an
organization's system with so many
communication requests that it overloads
the server, and it can no longer carry out its
normal functions.
 "This was a capacity attack, which
overloaded our network," said the
spokesman, Adrian Kubicki.
 Blocking the Attack with Packet Filters on the Router(s)
 Blocking the attack by configuring Windows Firewall.
In this a script is created to configure firewall so
it automatically blocks IP addresses when a hacker
attack is detected
netsh advfirewall firewall delete rule name="disallow Hacker IP"
# ignore wrapping, this should all be on one line netsh
advfirewall firewall add rule name="disallow Hacker IP"
action=block enable=yes profile=any localip=any protocol=any
dir=in
remoteip=67.219.58.161,69.163.239.247,174.122.60.235,216.
36.57.157
 Hackers hacked Canadian government websites for
several hours on Wednesday. The hacker
collective Anonymous took responsibility in an
online video, saying it was done in protest of a
controversial anti-terror law that dramatically
expands the powers and reach of Canada's spy
agency.
 The government's public website for applying for
social services and downloading official forms was
briefly shut down in this cyber-attack
 The government website was hacked due to
the attack known as a Distributed Denial of
Service (DDoS) attack
 The Computer Emergency Response Team of India
(CERT-In) has detected that the malware identified as
'Bioazih' which can acquire as many as five aliases to
hide its evil designs and "can execute commands
remotely, upload data, download and execute files" in
an unauthorsied manner.
 "It has been reported that a new malware having
backdoor functionalities dubbed as 'Bioazih' is
spreading. The malware propagates by means of
spear phishing emails containing attached malicious
document exploiting Microsoft Office vulnerability or
the Remote Access Trojan (RAT) may infect the
targeted users system by means of malware dropper
also," CERT-In said in its latest advisory to Internet
users.
 This malware family can give a malicious hacker access and
control of your PC.
These threats can be installed when you open a spam email
attachment.
The following can indicate that you have this threat on your PC:
You have these files:
1-%ProgramFiles% common filesConfig.exe
2-%ProgramFiles% Startupcsrss.exe
3- dmdskngr.dll
4- dmserver.dll
5- dssemh.dll
6-%SystemRoot% tasksconime.exe
7-%SystemRoot% tasksctfmon.exe
8- tdmserver.dll
 TO protect from this Windows Defender for Windows 8.1or
Microsoft Security Essentials for Windows 7 and Windows
Vista is used
 Internet users were denied access to Google
Inc's Malaysia website, and were redirected to
a hacked page saying "Google Malaysia
Hacked by Tiger-Mate #Bangladeshi Hacker".
 Google Malaysia itself noted that there has
been no hack of its systems, though, and
this, rather, is a DNS redirect attack
THANK YOU

More Related Content

What's hot

Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
Secure Code Warrior
 
Top 10 web server security flaws
Top 10 web server security flawsTop 10 web server security flaws
Top 10 web server security flaws
tobybear30
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
Ashwin Patil, GCIH, GCIA, GCFE
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
Tharindu Edirisinghe
 
Secure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scripting
Secure Code Warrior
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
Janagi Kannan
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
East West University
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
Terrance Medina
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
RapidSSLOnline.com
 
Secure Code Warrior - Authentication
Secure Code Warrior - AuthenticationSecure Code Warrior - Authentication
Secure Code Warrior - Authentication
Secure Code Warrior
 
Information security
Information securityInformation security
Information security
Sathyanarayana Panduranga
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
Symantec
 
Operations security (OPSEC)
Operations security (OPSEC)Operations security (OPSEC)
Operations security (OPSEC)
Mikko Ohtamaa
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015
Mikko Ohtamaa
 
Web Security
Web SecurityWeb Security
Web Security
Randy Connolly
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011
Atlantic Security Conference
 
Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)
Mikko Ohtamaa
 

What's hot (20)

Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
 
Top 10 web server security flaws
Top 10 web server security flawsTop 10 web server security flaws
Top 10 web server security flaws
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Secure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scripting
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Secure Code Warrior - Authentication
Secure Code Warrior - AuthenticationSecure Code Warrior - Authentication
Secure Code Warrior - Authentication
 
Information security
Information securityInformation security
Information security
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
Operations security (OPSEC)
Operations security (OPSEC)Operations security (OPSEC)
Operations security (OPSEC)
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
 
Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015Operations Security - SF Bitcoin Hackday March 2015
Operations Security - SF Bitcoin Hackday March 2015
 
Web Security
Web SecurityWeb Security
Web Security
 
Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011Jean pier talbot - web is the battlefield - atlseccon2011
Jean pier talbot - web is the battlefield - atlseccon2011
 
Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)Operations security - SyPy Dec 2014 (Sydney Python users)
Operations security - SyPy Dec 2014 (Sydney Python users)
 

Viewers also liked

Drift examen
Drift examenDrift examen
MEM Capabilities_20160822_Lres
MEM Capabilities_20160822_LresMEM Capabilities_20160822_Lres
MEM Capabilities_20160822_Lres
Aaron Daniels, PMP
 
Q5) how did you attract your audience
Q5) how did you attract your audienceQ5) how did you attract your audience
Q5) how did you attract your audience
bilal-m
 
Libro 2
Libro 2Libro 2
Libro 2
betzhabeth2
 
Nueva loj1 (2)
Nueva loj1 (2)Nueva loj1 (2)
Nueva loj1 (2)
Romulo Carchi
 
The Integrated Approach
The Integrated ApproachThe Integrated Approach
The Integrated Approach
Chaka Grant
 
20071129-IniciativaColombianaDeObjetosDeAprendizaje
20071129-IniciativaColombianaDeObjetosDeAprendizaje20071129-IniciativaColombianaDeObjetosDeAprendizaje
20071129-IniciativaColombianaDeObjetosDeAprendizaje
Diego Leal
 
Courses
CoursesCourses
Courses
wilmerc15
 
1 c
1 c1 c

Viewers also liked (9)

Drift examen
Drift examenDrift examen
Drift examen
 
MEM Capabilities_20160822_Lres
MEM Capabilities_20160822_LresMEM Capabilities_20160822_Lres
MEM Capabilities_20160822_Lres
 
Q5) how did you attract your audience
Q5) how did you attract your audienceQ5) how did you attract your audience
Q5) how did you attract your audience
 
Libro 2
Libro 2Libro 2
Libro 2
 
Nueva loj1 (2)
Nueva loj1 (2)Nueva loj1 (2)
Nueva loj1 (2)
 
The Integrated Approach
The Integrated ApproachThe Integrated Approach
The Integrated Approach
 
20071129-IniciativaColombianaDeObjetosDeAprendizaje
20071129-IniciativaColombianaDeObjetosDeAprendizaje20071129-IniciativaColombianaDeObjetosDeAprendizaje
20071129-IniciativaColombianaDeObjetosDeAprendizaje
 
Courses
CoursesCourses
Courses
 
1 c
1 c1 c
1 c
 

Similar to Cyber attacks 2015

Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
Umair Javed
 
Comparative Study of Fileless Ransomware
Comparative Study of Fileless RansomwareComparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
ijtsrd
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
brittanyjespersen
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
John Steensen, MBA/TM, CISA, CRISC
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
Greater Noida Institute Of Technology
 
Hackers dictionary
Hackers dictionaryHackers dictionary
Hackers dictionary
Tabraiz Bukhari
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
praveena06
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
ijdmtaiir
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
n|u - The Open Security Community
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
 
virus
  virus  virus
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 

Similar to Cyber attacks 2015 (20)

Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
 
Comparative Study of Fileless Ransomware
Comparative Study of Fileless RansomwareComparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Hackers dictionary
Hackers dictionaryHackers dictionary
Hackers dictionary
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
V1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.docV1_I2_2012_Paper4.doc
V1_I2_2012_Paper4.doc
 
Detection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service AttacksDetection of Distributed Denial of Service Attacks
Detection of Distributed Denial of Service Attacks
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
null Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytesnull Bangalore meet Feb 2010 - news Bytes
null Bangalore meet Feb 2010 - news Bytes
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
virus
  virus  virus
virus
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Cyber attacks 2015

  • 1.
  • 2.  WARSAW: Around 1,400 passengers of the Polish airline LOT were grounded at Warsaw's Chopin airport on Sunday after hackers attacked the airline ground computer systems used to issue flight plans, the company said.The computer system was hacked in the afternoon and fixed after around five hours, during which 10 of the state-owned carrier's national and international flights were cancelled and about a dozen more delayed.
  • 3.  The systems were hacked due to the attack known as a Distributed Denial of Service (DDoS) attack -- when a hacker floods an organization's system with so many communication requests that it overloads the server, and it can no longer carry out its normal functions.  "This was a capacity attack, which overloaded our network," said the spokesman, Adrian Kubicki.
  • 4.  Blocking the Attack with Packet Filters on the Router(s)  Blocking the attack by configuring Windows Firewall. In this a script is created to configure firewall so it automatically blocks IP addresses when a hacker attack is detected netsh advfirewall firewall delete rule name="disallow Hacker IP" # ignore wrapping, this should all be on one line netsh advfirewall firewall add rule name="disallow Hacker IP" action=block enable=yes profile=any localip=any protocol=any dir=in remoteip=67.219.58.161,69.163.239.247,174.122.60.235,216. 36.57.157
  • 5.  Hackers hacked Canadian government websites for several hours on Wednesday. The hacker collective Anonymous took responsibility in an online video, saying it was done in protest of a controversial anti-terror law that dramatically expands the powers and reach of Canada's spy agency.  The government's public website for applying for social services and downloading official forms was briefly shut down in this cyber-attack
  • 6.  The government website was hacked due to the attack known as a Distributed Denial of Service (DDoS) attack
  • 7.  The Computer Emergency Response Team of India (CERT-In) has detected that the malware identified as 'Bioazih' which can acquire as many as five aliases to hide its evil designs and "can execute commands remotely, upload data, download and execute files" in an unauthorsied manner.  "It has been reported that a new malware having backdoor functionalities dubbed as 'Bioazih' is spreading. The malware propagates by means of spear phishing emails containing attached malicious document exploiting Microsoft Office vulnerability or the Remote Access Trojan (RAT) may infect the targeted users system by means of malware dropper also," CERT-In said in its latest advisory to Internet users.
  • 8.  This malware family can give a malicious hacker access and control of your PC. These threats can be installed when you open a spam email attachment. The following can indicate that you have this threat on your PC: You have these files: 1-%ProgramFiles% common filesConfig.exe 2-%ProgramFiles% Startupcsrss.exe 3- dmdskngr.dll 4- dmserver.dll 5- dssemh.dll 6-%SystemRoot% tasksconime.exe 7-%SystemRoot% tasksctfmon.exe 8- tdmserver.dll  TO protect from this Windows Defender for Windows 8.1or Microsoft Security Essentials for Windows 7 and Windows Vista is used
  • 9.  Internet users were denied access to Google Inc's Malaysia website, and were redirected to a hacked page saying "Google Malaysia Hacked by Tiger-Mate #Bangladeshi Hacker".
  • 10.  Google Malaysia itself noted that there has been no hack of its systems, though, and this, rather, is a DNS redirect attack