#CyberWhisper #CyberSecurity #BarrelPhishing : Barrel Phishing - Usually involves two emails where the first email is sent to gain the user’s trust that the email is from a reliable source. The follow up email contains a malicious link or attachment, with the goal of tricking the user into clicking the link or downloading the attachment because of trust gained from the initial email.
Cyborg Cyber Forensics and Information Security (CCFIS)
Computer and Network Security
Noida, Uttar Pradesh 31,950 followers
About us
Cyborg Cyber Forensics and Information Security (CCFIS) is founded on the core belief that "Professional Services are provided by Experienced Professionals - not by Expensive Tools". We are a team of Security Professionals from across the globe involved into creating awareness in the field of Cyber Security across the globe and to reduce the increasing Cyber-Crimes. The CCFIS team is working as a research team to help build a proactive and resilient Cyber Defense System and provide solutions to Government & Private Agencies in a guided manner while keeping a watch on malicious attempts for hacking of websites and IT infrastructure belonging to the Central/State Government, Private organization’s and PSUs. The CCFIS team had been constantly trying to solve the social problem by creating awareness in the field of Cyber/ Digital Information Security to protect kids, students, youths, individuals, and organizations etc. from the unseen criminals of the wired and wireless world. The goal is to make India a Cyber-Secure country in respect of cyber security. CCFIS is a pure-play Research InfoSec organization specializing in delivering high quality services through expert with a core focus on Professional Penetration Testing, Vulnerability Assessment, Web Application Security, Cyber Crime Investigation and Computer Forensics Investigation and Malware analysis.
- Website
-
http://ccfis.net
External link for Cyborg Cyber Forensics and Information Security (CCFIS)
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Noida, Uttar Pradesh
- Type
- Public Company
- Founded
- 2013
- Specialties
- Vulnerability Assessment, Malware Analysis, Training on Ethical Hacking & Cyber Forensic, OWASP Top 10 Web Application Security, Cyber Forensics Analysis, Cyber-Crime Investigation, Penetration Testing, Intelligence Gathering, and ATP CCFIS Sensor
Locations
-
Primary
Amity Innovation Incubator,Block E-3,1st Floor,Amity University, Sector-125
Noida, Uttar Pradesh 201301, IN
-
3rd Floor, Block-AB6, Amity University, Malhaur
Lucknow, Uttar Pradesh 226028, IN
Employees at Cyborg Cyber Forensics and Information Security (CCFIS)
Updates
-
#CyberWhisper #CyberSecurity #Badware : Badware is a type of malware that can steal user data, often displaying ads or other unwanted content on the victim’s browser. Badware is usually the result of an accidental download which installs a keylogger or other tool for sending user data to third party. The effects of badware on the victim's system vary, depending on the type of badware and how it was installed, however the most common effects are slow performance, pop-ups, and ads.
-
#CyberWhisper #CyberSecurity #Grayware : Grayware operates in a way similar to malware, but it is not spread to harm the users directly. It does not affect the system functionality as such. Mostly, information on the patterns of use is collected in order to either sell these data or to place advertisements systematically.
-
#CyberWhisper #CyberSecurity #Keylogging : Keylogging - Cyber criminals can use malicious software to record the keystrokes on a user’s keyboard, without the victim realizing it. This way, cyber criminals can collect information such as passwords, usernames, PIN codes and other confidential data.
-
#CyberWhisper #CyberSecurity #CryptoMalware : Crypto malware typically uses public-key cryptography to encrypt files on a victim's system with an asymmetric cryptographic key pair; one key is used for encryption, while another is used for decryption. The private key cannot be derived from the public key and vice versa; so, to decrypt files on your system you need access to the private key.
-
#CyberWhisper #CyberSecurity #DataTheft - Data theft describes illegal operations in which private information is retrieved from a company or an individual. Usually, the stolen data includes credentials for online accounts and banking sites, credit card details or valuable corporate information.
-
#CyberWhisper #CyberSecurity #IdentityCloning : Identity cloning - A form of identity theft in which the attacker takes on the identity of a victim and then attempts to live and act as the stolen identity. Identity cloning is often performed in order to hide the birth country or a criminal record of the attacker in order to obtain a job, credit or other secured financial instrument.
-
#CyberWhisper #CyberSecurity #Clickjacking : Clickjacking is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous Web pages. A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.
-
#CyberWhisper #CyberSecurity #Scareware : Scareware - This is a type of malware that employs social engineering to intimidate and confuse the victims through shock, anxiety, fear and time restrictions. The objective is to maliciously persuade the victims into buying unwanted software. The software could be rogue security software, ransomware or other type of malware.
-
#CyberWhisper #CyberSecurity #Brandjacking : Brandjacking - Also known as brand hijacking, brandjacking is when a cybercriminal assumes the unauthorised use of a company, brand, or person's identity for malicious purposes. It's often used in phishing attacks, where cybercriminals pose as well-known organisations in order to convince victims to hand over sensitive information.