GDPR And All You Need To Know About It

What Is GDPR?

GDPR stands for General Data Protection Regulation; it is going to regulate personal data of EU citizens, which means collecting or processing any information that we can use to identify a person.
GDPR will enable:
– strengthening the rights of individuals over their own data
– making organizations accountable
– ensuring equal protection of EU human rights

Who Does GDPR Applies To?

It applies to all data controllers or data processors that are offering goods or services to the people in the European Union. This includes the monitoring of their behavior if their behavior takes place within the Union.
The companies, not located in EU, that do business with clients or companies from EU must comply with GDPR.
Data Controller is a company or an organization that collects and controls the data, makes decisions about what happens with it and how to use it.
Data Processor is a company or an organization that works for and processes data on behalf of a data controller. A data controller decides the purpose and the manner in which to process the data. Data processors hold and process data; they do not have any responsibility or control over that data.

How Does GDPR Affect Individuals?

Under GDPR Data subjects have the right to:
– Know what is going to be done with their data
– Have copies of all the data about them
– Get incorrect data corrected
– Have their data erased or forgotten
– Restrict processing
– Data portability
– Object to data being processed
– Not be subject to automated processing

What If You Don’t Comply?

Companies that choose to ignore GDPR by not complying with it are going to pay high fines.
The companies who don’t comply with core principles or data subject rights are going to pay administrative fines (20 million Euros or 4% of their annual turnover).
The companies who fail to comply data controller responsibilities are going to pay administrative fines (10 million Euros or 2% of annual turnover).
Apart from material damage, these companies can risk losing their partners’ and customers’ trust.

What is Cryptography?

Definition of Cryptography

Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa.

It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography protects data from theft or alteration.

History of Cryptography

Earlier cryptography was effectively synonymous with encryption but nowadays cryptography is mainly based on mathematical theory and computer science practice.

Before the modern era, cryptography focused on message confidentiality — conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without the key needed for decryption of that message.

Encryption attempted to ensure secrecy in communications, such as those of spies, military leaders, and diplomats. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, etc.

Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science started around one hundred years ago.

At the end of World War I, Arthur Scherbius, a German engineer invented The Enigma machine, which was a piece of spook hardware heavily used by the German forces during the World War II. Later, it was used by Britain’s code-breakers as a way of deciphering German signals traffic.

Modern Cryptography 

Modern cryptography is the cornerstone of computer and communications security. It is based on various concepts of mathematics such as number theory, computational-complexity theory, and probability theory.

There are three major characteristics that separate modern cryptography from the classical approach. It operates on binary bit sequences and it relies on publicly known mathematical algorithms for coding the information.

Secrecy is obtained through a secret key which is used as the seed for the algorithms. The computational difficulty of algorithms, the absence of a secret key, etc. make it impossible for an attacker to obtain the original information even if he knows the algorithm used for coding.

Symmetric Encryption

In symmetric encryption, you use the same key for both encryption and decryption of your data or message. Both of you need to have the same key in order to encrypt and decrypt the messages that you may exchange with each other.

Symmetrical encryption is an old and best-known technique. It uses a secret key that can either be a number, a word or a string of random letters.

The main disadvantage of the symmetric key encryption is that all parties involved have to exchange the key used to encrypt the data before they can decrypt it.

Image source: Cheapsslshop.com

Image source: Cheapsslshop.com

Asymmetric Encryption

Asymmetric encryption is quite opposite of the symmetric encryption because it doesn’t use a single key but a pair of keys: a private one and a public one.

You use one to encrypt your data, which is called public key, and the other to decrypt the encrypted message, which is called the private key.

Your private key is yours and it must be kept private, because it is the only key that can decrypt any message that was encrypted with your public key.

Public keys are public and thus no security is required – it needs to be publicly available and can be passed over the Internet.

The public key is used to encrypt a message that can only be decrypted using its private counterpart.

Designed by Cheapsslshop.com, can be found on ''https://www.cheapsslshop.com/blog/symmetric-vs-asymmetric-encryption-whats-the-difference/''

Image source: Cheapsslshop.com

Conclusion 

Cryptography has played an enormous role in the shaping and development of many societies and cultures.

Today, cryptography takes a new shift, new algorithms are being developed to catch up with the eavesdroppers and secure information to enhance confidentiality.

 

Man-in-the-middle Attack

Often, we have conversations where there’s confidential information flow between two parties. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late.

In other words, man-in-the-middle attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on the communication between two targets.

A MITM attack exploits the real-time processing of transactions, conversations or transfer of other data.

In a man-in-the-middle-attack, the attacker becomes an intermediary between all communications happening between victim systems and the gateway. He can easily sniff and modify information at will. A man in the middle attack happens in both wired and wireless networks.

How Does It Work?

Here is an example of how it goes:

Jane and Peter are having a conversation; Eve wants to eavesdrop on the conversation but also remain transparent. Eve could tell Jane that she was Peter and tell Peter that she was Jane. This would lead Jane to believe she’s speaking to Peter, while revealing her part of the conversation to Jane. Jane could then gather information from this, alter the response, and pass the message along to Peter (who thinks he’s talking to Alice). As a result, Eve can transparently hijack their conversation.

Different Types of Man-in-the-middle Attack

There is not just simply one type of man-in-the-middle-attack. Rather, there are several types of MITM attacks:

  •          ARP poisoning
  •          WiFi WEP/ WPA/2 Hacking
  •          DNS spoofing
  •          STP mangling
  •          Port stealing

ARP Poisoning

A successful ARP spoofing (poisoning) attack allows an attacker to alter routing on a network, effectively enabling a man-in-the-middle attack.

In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.

Generally, the aim is to associate the attacker’s MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.

WiFi WEP/ WPA/2 Hacking

Once the WEP or WPA encryption process starts, the attacker can commence his own operation by using a sniffer program to find wireless gadgets running in peer mode. This should enable him to gain root access to a system in the long run – he has already bypassed the main defenses of your mobile or wireless connection).

After that, he can deploy a key logger or a precisely placed Trojan horse that will allow him to gain complete control over your network system, exploiting every weakness that’s been outlined thus far.

The WiFi client hacking attack described above can be done even if the victim is traveling and only using his laptop at an airport or hotel lobby. It will have to expose itself to hackers as well; that’s the true price of using a complimentary WiFi service. 

DNS Spoofing

DNS Spoofing is a type of computer attack wherein a user is forced to visit a fake website disguised to look like a real one, with the intention of diverting traffic or stealing credentials of the users. Spoofing attacks can go on for an extended period without being detected and can cause serious security issues.

DNS spoofing is done by replacing the IP addresses stored in the DNS server with the ones under control of the attacker.

Therefore, every time users try to go to a certain website, they get directed to the false websites placed by the attacker in the spoofed DNS server. This way your computer is convinced that the attacker’s site is to be trusted and that it is the site you requested.

STP Mangling

STP (Spanning-Tree Protocol) mangling refers to the technique used by the attacker host to be elected as the new root bridge of the spanning tree.

The attacker may start either by creating BPDUs (Bridge Protocol Data Units) with high priority assuming to be the new root, or by broadcasting STP Configuration/Topology Change Acknowledgement BPDUs to get his host elected as the new root bridge.

By taking over the root bridge, the attacker will be able to intercept most of the traffic.

Port stealing

Port stealing is a kind of attack where someone “steals” traffic that is directed to another port of an Ethernet switch. This attack allows someone to receive packets that were originally directed to another computer.

It does so by making the switch believe that the attacker’s port is the correct destination for the packet.

This is how the port stealing technique works:

  1. Steal the port,
  2. Receive some data,
  3. Give the port back,
  4. Forward the data to the real destination,
  5. Go back in step 1 by stealing the port again.

Man-in-the-middle Attack Prevention 

Your best defense against man-in-the-middle attack is to be very cautious when connecting to free or unsecured Wi-Fi networks. When visiting a website, make sure “HTTPS” is always in the URL bar of the websites you visit.

Be aware of the potential phishing emails from attackers asking you to update your password or any other log in credentials. Instead of clicking in the link provided in the email, you can manually type the website in questions address into the URL bar of your browser and proceed from there.

The best way to protect your PC from any type of malware on time is installing an antivirus solution, as a basic protection tool and an anti-malware solution as a necessary additional layer of protection. Be sure to keep the programs up to date.

To protect against man-in-the-middle attacks, you can consider using an anti-keylogger or rootkit detection software as well.

You can try our Zemana AntiLogger, a pioneer in anti-keylogging software or our Zemana AntiMalware, which proved to be the best anti-ransomware tool and the best rootkit and bootkit remediator according to MRG Effitas.

The Most Famous Man-in-the-middle Attack

It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom.

The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. The malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers.

Documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, code-named Operation Socialist.

The Biggest Cyber Crimes in Our Recent History

What Is a Cyber-Attack?

A cyber-attack is an attempt by hackers to damage or destroy a computer network or system. It is a deliberate exploitation of computer systems, technology-dependent enterprises and networks.
Cyber-attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes, such as information and identity theft.
There are many forms of a cyber-attack and ransomware is just one of them. Cyber-attacks usually occur when hackers create a malicious code known as malware and distribute it through spam email campaigns or phishing campaigns.
Cyber-attacks might be divided into two broad types:
  • Attacks where the goal is to disable the target computer or knock it offline, or
  • Attacks where the goal is to get access to the target computer’s data and perhaps gain admin privileges on it
Victims of cyber -attacks can be random or targeted, depending on cyber criminals’ intentions.

Biggest Cyber-Crimes In History

Cyber-crime is on the up and today it’s more prevalent than ever. As cyber-crime becomes more of an issue many organizations seek to protect themselves using courses to train employees in the very real risks of the online world.
Check out some of the biggest cyber attacks in the last 5 years.

Target Breach in 2013

In 2013 personal data from 70 million Target customers got stolen before Christmas. Personal data included customers’ names and their credit cards and debit cards information. After this, Target experienced a decrease in their sales.

Yahoo Breach in 2013

One of the largest data thefts occurred in 2013 when personal information such as names, phone numbers, passwords and email addresses from one billion users got stolen.
Then in 2014, another 500 million accounts were compromised. The Yahoo hacking scandal is without a doubt one of the largest security breaches of the modern day.
Sony Pictures Virus Attack In 2014
Sony Pictures Entertainment got hit with a virus in 2014 by hackers allegedly connected with North Korea. They stole employee e-mails, information on executive salaries and copies of unreleased movies.
There was a widespread speculation that the group was trying to disrupt release of the film, The Interview, a comedy depicting a plot to assassinate North Korean leader Kim Jong-un.
JP Morgan Breach In 2014
Hackers hijacked one of ­JPMorgan Chase’s servers and stole data about millions of the bank’s accounts and thought to have made hundred million dollars in illegal profits.
Along with personal data, the hacking group also stole information related to company performance and news, which allowed them to manipulate stock prices and make enormous financial gain.
NHS Virus Attack In 2017
Ransomware named “WannaCry” was delivered via email in the form of an attachment and caused chaos among the UK’s medical system.
Once a user clicked on the attachment, the virus was spread through their computer, locking up all their files and demanding money before they could be accessed again.
This became one of the most widespread cyber attacks ever leaving the NHS system disabled for weeks.

 

Results Show Horrific Lack of Malware Knowledge!

Many of us have probably heard the word malware many times. And many of us believe we are educated enough not to fall victim to malware.
However, recent studies showed that not only non-professionals but professionals as well are often not able to recognize the malicious tricks of latest threats.

Disturbing Results

Recent surveys showed that even though 93% of respondents correctly identified Trojan and its behaviour, 77% were unable to correctly state the behaviour of a virus. Many confused worms with viruses and rootkits with bootkits.
These are disturbing results because in order to protect our PCs and mobile devices correctly, it is very important to know how each malware behaves. If malware is recognized as a worm, it is important to know how this worm behaves and what it really does.
Many malicious programs today behave as benign even when they go through a scan, which is why it is necessary to be extra cautious.
However, some experts say that the depressing results were to be expected.
The pace at which malware evolves today and the innovative techniques of hackers that improve every day make it difficult for both everyday people and professionals to make clear distinctions between different types of threats.

Many Respondents Unaware That Some Types of Malware Can Be Undetected by Traditional Antivirus. 

60% knew what phishing is in theory but when they received a phishing email, they were unable to recognize the threat. Most of professionals are ashamed to admit they experienced a data breach.

Educate Yourself!

Superficial knowledge about malware is not enough today. To protect yourself and not to be manipulated, you need to learn and educate yourself as much as you can. Antivirus and antimalware protection are a must for both your PC and phone.
However, you need to be aware of what kinds of threats exist in the online world. You can find online courses that will teach you how to recognize even the sneakiest threats. Also, you can read many articles and books online that will keep you posted about the latest attacks.
Once you install your antivirus and antimalware protection, try to explore it a little bit and learn more about its features, what they really mean and how they really work.
Try to find examples of different threat attacks in the world and learn from it. Also, follow necessary steps that we wrote about in one of our previous blog posts that can help you avoid malware coming back to your PC. Check it out here.
The best thing about using Zemana AntiMalware or Zemana AntiLogger as your protection is that it is very easy to use, with simple user interface.
This way, no matter how old you are, you will be able to understand all instructions and stay safe without any complications or misunderstandings.
Download Zemana AntiMalware here.

Download Zemana AntiLogger here.

Stay safe with Zemana!

Antivirüs ve Anti-malware arasındaki fark (Hangisini kurmalıyım?)

Uzun lafın kısası: İkisine de ihtiyacınız var! Ne, Nasıl yani? Sakin olun, açıklıyoruz.

Antivirüs ve anti-malware arasındaki fark nedir?

Çoğunuz antivirüs ve anti-malware kelimelerini sıkça duymuşsunuzdur. Hele ki son günlerde yayılan WannaCry fidyeci zararlısıyla daha sık duyar oldunuz (Fidyeci zararlılarından kurtulmanın yoluna buradan ulaşabilirsiniz). Muhtemelen bu kavram kargaşasında kaybolmuş, anti virüs ve anti-malware arasında fark olmadığını düşünmüş olabilirsiniz. Anti-malware ile antivirüsün aynı anlama geldiğini düşünüp bilgisayarınıza anti-malware kurmamanız gerektiğini düşünüyorsanız yanılıyorsunuz. Yazının devamında antivirüs ve anti-malware arasındaki temel farkın ne olduğundan bahsedeceğiz.

Bilmeyenler için, malware İngilizce’de “malicious software”, yani şüpheli yazılım kelimelerinin kısaltmasıdır. Burada şüpheden kasıt, yazılımın kullanıcıdan habersiz istenmeyen işlemler yapma ihtimalidir. Zararlı yazılımlar verilerinize ve programlarınıza hasar verebilir, diğer bilgisayarlara yayılabilir ve gizli bilgilerinizi çalabilirler. Farklı zararlı yazılım çeşitleri vardır:

– Virüsler
– Solucanlar
– Trojanlar
– Casus yazılımlar
– Reklam zararlıları
– Fidyeci zararlıları vs.

Buna göre virüsün, programlarınıza ve verilerinize bulaşarak yayılan bir zararlı yazılım türü olduğunu söyleyebiliriz. Virüslü bir uygulamayı çalıştırdığınızda önce virüs çalışır, sonrasında programın kendisi çalışır. Böylece virüs uygulamanın çalışmasını etkilemeden kendini gizlemiş olur.

Halihazırda kurulu antivirüs yazılımım var. Neden yanına anti-malware kurayım?

Şimdi asıl meseleye gelelim.

Antivirüsler bilgisayarınız (ve tabi ki cep telefonunuz) için başlıca yazılımlardan birisidir. Bilgisayarınızda tehditlere karşı koyan ilk duvar antivirüsler olacaktır. Bununla birlikte geleneksel antivirüs teknolojisi günümüzde sizi korumak için yeterli olmamaktadır, çünkü antivirüsler yalnızca bilinen virüs türlerine karşı etkilidir.

Her antivirüs yazılımı, içinde virüs veri tabanı bulundurur. Bilgisayarınızda virüslü uygulama çalıştırmaya kalktığınızda öncelikle bu veri tabanından kontrol edilir. Eğer varsa engellenir. Bunun anlamı, önceden tanınmamış bir virüs bulaştığında antivirüs yazılımınızın yapabileceği hiçbir şey olmayacaktır, ta ki o virüs incelenip veri tabanına eklenene kadar.

Bir diğer önemli nokta ise virüslerin tek tehdit olmaması gerçeği. Her geçen gün daha akıllı ve yaratıcı yüzlerce zararlı yazılım (virüslerin dışında) ortaya çıkmaktadır.

Peki daha önce hiç ortaya çıkmamış zararlı yazılımlardan nasıl korunabilirsiniz?

Geleneksel antivirüsler, kendi veri tabanlarında bulunmayan tehditleri tespit edemeyeceklerdir. Bu problemin cevabı anti-malware yazılımlarıdır. Anti-malware korumasına ihtiyacınız var, çünkü bu sizi bilinen ve bilinmeyen tüm tehditlerden koruyacaktır. İşte antivirüs ve anti-malware yazılımları arasındaki temel fark budur.

Zemana AntiMalware virüs tanımlarını sizin bilgisayarınızda tutmayan bir yazılımdır! Zemana AntiMalware bir şüpheli yazılım bulduğunda bunun parmak izini Tarama Bulutuna gönderir. Milisaniyeler sonra buluttaki tarama ajanları şüpheli uygulamanın zararlı olup olmadığını söyler. Eğer tespit edemezse uygulamanın tamamını buluta göndererek daha detaylı inceleme yapar.

Sonrasında Pandora teknolojisi ile yeni nesil tarama gerçekleştirerek bilinmeyen zararlılara karşı sizi güvende tutar. Zemana AntiMalware virüslere karşı veri tabanını kullanarak koruma sağlamasına ek olarak bilgisayarınızdaki her türlü şüpheli davranışı da tespit edip engeller. Sizi;

– Virüslerden
– Trojanlardan
– Rootkitlerden
– Solucanlardan
– Casus yazılımlardan
– Reklam zararlılarından
– Henüz keşfedilmemiş zararlılardan koruyacaktır.

Daha önce belirttiğimiz gibi, antivirüs yazılımları bilgisayarınızda basit ve temel koruma sağlar. Fakat bu yeterli değildir ve sizin daha iyi çözümlere ihtiyacınız var.

Zemana AntiMalware sahip olduğunuz tüm antivirüslerle uyumlu çalışacak şekilde geliştirildi. Hafiftir ve hızlı çalışır, asla bilgisayarınızı hantallaştırmaz. Zemana AntiMalware, bilgisayarınızda kesinlikle bulunması gereken bir ek koruma yazılımıdır.

Özetle, antivirüs yazılımınızı bilgisayarınızda ve telefonunuzda kullanırken (telefonunuzu da güvende tutmayı unutmayın) anti-malware ile ek koruma sağlamayı ihmal etmeyin. Aşağıda ihtiyacınız olan linkleri bulabilirsiniz.

Bilgisayarınızı korumak için şimdi Zemana Antimalware indirin.
Android telefonunuzu korumak için şimdi Antivirüs uygulamasını indirin.

Difference Between Antivirus and Antimalware (Here Is What To Install)

Do I need an antimalware or an antivirus?

Straightforward answer: You need them all! Wait, what?! Ok, let’s elaborate it.

What Is The Difference Between Antivirus and Antimalware?

Many of you have probably heard words Anti-malware and Antivirus thousands of times, especially in recent period due to unfortunate WannaCry ransomware attacks (check here how to stay safe from ransomware attacks).

And some of you have probably been confused by the terms, believing that these two are the same thing and you couldn’t figure out what’s is the real difference between antivirus and anti-malware.

You might ask yourself: Why should you need to install antimalware, when it is just a synonym for the word antivirus, right? Well, you were wrong. Continue reading and learn the main difference between antivirus and anti-malware.

For those of you who do not know, malware is a malicious software that run on users’ PCs without their consent. Malware damages your programs and data and they can also spread to other computers and steal private information. There are different types of malware:

– viruses
– worms
– Trojans
– spyware
– adware
– ransomware etc.

Therefore, a virus is a type of malware that spreads by infecting you programs and data. It modifies your data by adding its own copies (viruses can replicate), which can also be infected. When you run an infected program, first the virus runs and then the program itself. This way the virus remains hidden.

I Have an Antivirus Installed. Why Do I Need an Antimalware Protection As Well?

Antivirus software is an essential protection for your PC (and your phone as well). It is the first wall of defense against threats. However, traditional antivirus technology is not enough today because it protects only from the known viruses.

Every antivirus software has its own virus database and once you get infected, the infections goes through the database and if the software recognizes the threat it blocks it. This means, that when new viruses come out somebody needs to get infected in order for the virus to get discovered.

Another very important thing is that viruses are not the only threat today. Hundreds of different malware (apart from viruses) are being created every day because hackers are becoming more and more intelligent and creative.

So, How Will You Stay Safe From These Unknown Threats (Zero-Day Malware) That Have Never Been Seen Before? 

Your traditional antivirus protection will not recognize them because they are not in its database. The answer to this question is antimalware technology. You need an antimalware protection, because it will keep you safe from all types of known and unknown malware and this is what makes the difference between antivirus and anti-malware software.

Zemana AntiMalware is a software that does not store virus definitions on your PC! Instead, when our software finds a suspicious file, it passes the fingerprint to the Scan Cloud. Milliseconds later, the Scan Cloud marks the file as safe or malicious, or else asks AntiMalware to upload it for further examination.

After that, with its Pandora Sandbox Technology it performs another level of scanning which increases your protection from unknown malware. Instead of only waiting for its database to match and confirm the type of virus infection, Zemana AntiMalware blocks any kind of suspicious activity on your PC. It protects you from:

– Viruses
– Trojans
– Rootkits
– Worms
– Spyware
– Adware Infections
– Zero-day malware

As we mentioned above, antivirus software is a basic and essential protection for your PC.  But this is not enough and you need to look for more.

Zemana AntiMalware is designed to be compatible with any antivirus program you have. It is lightweight and will not clutter up your drive. Therefore, Zemana AntiMalware protection is a must-have additional layer of protection.

So, to summarize, keep your chosen antivirus on your PC and phone (never forget to keep your phone safe as well) but don’t forget to install anti-malware software as well to stay fully protected. Below you can find the needed links:

To protect your PC now, download Zemana AntiMalware here.
To protect your Android phone, download the Antivirus app here.