Connect with us

Cyber Security

How To Survive A Zombie Apocalypse On Your Computer

Avatar

Published

on

Reading Time: 4 minutes

In The Walking Dead, zombies suck brain matter in a frenzied hunger, completely unaware of what they’re doing – driven only by the need to feed on your brain (and other body parts). In the computer world, a Trojan can be used to turn your PC into its own oblivious slave –a zombie machine without you even knowing.

Your computer could be operating as part of a botnet, taking part in a Distributed Denial of Service (DDoS) attack, sending out email spam, or spreading malware at this very moment.There are many ways in which your computer can become a zombie, but the most common is through a Trojan installed via a malicious email attachment.

After you open and download a seemingly innocent email attachment, the Trojan runs quietly in the background and allows the attacker full access to everything on your computer.In the spirit of Halloween and the recent Season 4 premiere of The Walking Dead, I thought of some ways we can all survive a zombie apocalypse both online and offline.

Secure all Openings
Finding secure shelter is vital to surviving a zombie apocalypse, but even the most secure structure can be over-run with thousands of zombies in no time if just one door or window is left open. One zombie gets in, bites 10 people, and before you know it, there are 50 zombies taking over your shelter. I can see it now – blood and guts everywhere.

In a similar fashion, all it takes is one compromised zombie computer to spread mayhem all over the internet. Bad guys can get into your system by exploiting openings or vulnerabilities in your software – especially if you don’t keep it up-to-date. Scary cyber criminals are always on the hunt for these holes so they can get inside and terrorize your computer. The good news is security software providers offer protection in the form of releasing new versions that are less vulnerable to attack. In zombie apocalypse terms, it’s like boarding up the broken door or window to keep it securely closed and keep the zombies out.

Don’t trust anyone
In a world where zombies thirst for your brain and people are after your food and supplies, you can’t trust anyone that you do not know. Truthfully, you can’t even trust some of the ones you do know. The online world may be even more dangerous than a real-life zombie apocalypse because you can’t physically see the person you’re communicating with online. There’s no way to tell if they’re a cyber criminal intent on installing malware to zombify your computer from behind the screen. In fact, many bots or zombies are unwittingly installed because cybercriminals pose as someone the owner knows. For that reason, it’s important to know the signs to look out for in a social engineering attack, also referred to as a phishing scheme.

1) Don’t download email attachments from unknown senders.
a. If you know the source, double check with them and make sure they intended to send it.
2) Don’t install pop-ups without first reading the guidelines.
3) Don’t blindly click links from untrusted sources.
4) If you see a link from your friend (in email, text message, or Facebook post) and it looks strange, don’t click it without first asking your friend if they actually posted/sent the link.

Being a bit paranoid or untrusting can significantly improve your odds in avoiding Zombies both online and offline.

Prevention is Key
Zombies are hard to get rid of once they breach your shelter. They seem to multiply faster than you can kill them. Similarly, the rate at which new viruses and malware are reproducing is astounding and traditional security solutions are losing the battle. Detection is no longer enough. Instead, the key to surviving both a zombie apocalypse and a cyber attack is prevention.  Don’t wait for zombies to invade before boarding up your windows and securing your doors. Likewise, don’t wait to get a virus on your computer before you install a Windows 10 Antivirus.

With Comodo Internet Security (CIS), you get the best prevention there is – a complete prevention, detection and cure system for your computer. That’s because Comodo Internet Security 6.3 offers 360° protection against internal and external threats by combining a powerful antivirus, an enterprise class packet filtering firewall and an advanced host intrusion prevention system called Defense+.

Once you have CIS installed, all unrecognized applications will be automatically sandboxed and run under a set of restrictions so they cannot harm your computer. This prevents untrusted and potentially malicious applications from damaging your PC or data.

CIS Quick Scan
With CIS, NOTHING is getting into your system without your permission.

Follow these simple rules and you’re sure to avoid becoming a victim of a zombie computer attack or getting your brain eaten by real-life zombies. Although, if a zombie apocalypse does actually happen, you’re screwed anyway. In fact, you may want to invest in some zombie apocalypse insurance.

Until then, don’t let your computer become zombified!

Related Resources

Wikipedia DDOS Attack

TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE Source: https://blog.comodo.com/it-security/how-to-survive-a-zombie-apocalypse-on-your-computer/

Cyber Security

Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Source: https://threatpost.com/digitally-signed-bandook-trojan-spy-campaign/161676/

Continue Reading

Cyber Security

MacOS Users Targeted By OceanLotus Backdoor

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Source: https://threatpost.com/macos-users-targeted-oceanlotus-backdoor/161655/

Continue Reading

Cyber Security

Pandemic, A Driving Force in 2021 Financial Crime

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Source: https://threatpost.com/2021-financial-crime-covid-19/161665/

Continue Reading

Big Data

Contactless payments market to reach US$ 26.3 billion by 2027

Avatar

Published

on

Contactless Payments Market To Reach US$ 26.3 Billion By 2027

The global contactless payments market is expected to surpass US$ 26.3 Billion by 2027 end, registering a CAGR of 12.9% during the forecast period of 2019 to 2027), as highlighted in a report published by Coherent Market Insights.

Increasing demand for contactless payments from the retail sector is expected to drive market growth during the forecast period. Retailers are modernizing their brick-and-mortar stores to offer secure services to customers and establishing online stores to increase revenue.

They are adopting advanced technologies such as big data analytics and cloud computing to increase their presence in the market. Retail manufacturers are using contactless payments methods that provide many benefits, such as reduced transaction time, increased operational efficiency, increased revenue, minimized cost, and others. Contactless payment methods at retail stores reduce transaction process and queue in counter.

Moreover, governments are also focusing on introducing new payment methods in order to increase productivity and remain competitive in the market. For instance, in December 2016, the government of India launched BHIM app for Unified Payment Interface (UPI). The common UPIbased BHIM app allows the user to send and receive money through their mobile phones by linking their bank accounts. For instance, according to Coherent Market Insights’ analysis, the number of transactions done through the Bharat Interface for Money (BHIM) app reached 18.8 million in February 2020.

Contactless Payments Market – Impact of Coronavirus (Covid-19) Pandemic

According to Coherent Market Insight‘s study, globally, most of the countries are affected by COVID-19 and most of the countries have announced lockdown.Contactless payment have become more preferred payment method, as it requires less physical interactions.

Smartphone based payment interface and digital wallets are the potential solutions to contain the spread of coronavirus pandemic. Moreover, recent developments in digital payments have encouraged the use of contactless payment methods during this pandemic. For instance, in April 2020, Upgrade Inc., a U.S.-based loan company, launched new contactless credit card. The new credit card provides high transaction limit than other payment methods.

Moreover, bank authorities and card network in Germany, U.K., Austria, and other countries have set higher transaction limit, as people are staying at home and prefer shopping through payment cards only. For instance, U.K Finance Limited increased the transaction limit for contactless payment cards starting from 30 Euros to 45 Euros. This, in turn, increases demand for contactless payment solutions.

Key Trends and Analysis of the Global Contactless Payments Market:

  • Europe held dominant position in the global contactless payments market in 2019 and is expected to retain its dominance throughout the forecast period. This is owing to increasing payment through smart cards. For instance, according to the Electronic Transactions Association (ETA), contactless payments through Mastercard and Maestro increased by 145% in Europe in 2018. Furthermore, in 2019, according to Coherent Market Insights’ analysis, the transactions through contactless payment methods reached 651 million in the U.K.
  • Asia Pacific is expected to show significant growth over the forecast period. The increasing adoption of contactless payment methods from retail industry is fueling the market growth. Retailers are modernizing their conventional payment methods with contactless payment methods, in order to improve productivity and efficiency in the business.
  • Among device type, the smartphone segment held dominant position in the market in 2019 and is expected to retain its dominance during the forecast period. This is owing to increasing demand for live streaming from consumers. For instance, the online video streaming market is expected to exceed US$ 70,000 million in 2021 from US$ 30,000 million in 2016.
  • Major players operating in the global contactless payments market include Thales Group, Infineon Technologies AG, Ingenico Group, Wirecard, VeriFone, Inc., Giesecke+Devrient GmbH, IDEMIA, Track Innovations LTD., Identiv, Inc., CPI Card Group Inc., Setomatic Systems, Valitor, PAX, PINPAD, Mobeewave, alcineo, and Paycor, Inc.

Source: https://www.fintechnews.org/contactless-payments-market-to-reach-us-26-3-billion-by-2027/

Continue Reading
Cleantech4 hours ago

Volkswagen Orders KUKA Robots For ID. Buzz, And Other Volkswagen Group News

Cleantech4 hours ago

The Corporate Carbon Accounting Market

Cleantech4 hours ago

You Should Care About Transportation Emissions. Here’s Why

Cyber Security7 hours ago

Digitally Signed Bandook Trojan Reemerges in Global Spy Campaign

Amb Crypto7 hours ago

Ethereum long-term Price Analysis: 30 November

Amb Crypto7 hours ago

Bitcoin’s price could one day be $500,000: Gemini’s Winklevoss brothers

Aerospace8 hours ago

2020 SpaceNews Awards Virtual Event

Cleantech8 hours ago

The Renewable Energy Cows Come Home, Now With Green Ammonia

Amb Crypto8 hours ago

What does Bitcoin’s Sentiment say about its future?

Globe NewsWire8 hours ago

European Energy completes third quarter of 2020 with significant growth across the board

Amb Crypto8 hours ago

Monero, Polkadot, Compound Price Analysis: 30 November

Amb Crypto8 hours ago

Former Chief Digital Officer of Luxury brand LVMH joins Ledger 

Cleantech8 hours ago

EV Aftermarket Virtual Trade Show (Show & Tell) Is Today — Join Us!

Cyber Security9 hours ago

MacOS Users Targeted By OceanLotus Backdoor

Cleantech9 hours ago

Townie Path Go! E-Bike: A Premium, Sturdy Electric Bike For Commuters & Fun

Cyber Security9 hours ago

Pandemic, A Driving Force in 2021 Financial Crime

Aerospace9 hours ago

FCC Chairman Ajit Pai to leave agency in January

SaaS9 hours ago

Generative Media: The Future of Visual Marketing

Amb Crypto9 hours ago

Bitcoin SV long-term Price Analysis: 30 November

Automotive9 hours ago

Tesla gains permission to begin second phase of deforestation at Giga Berlin

Aerospace9 hours ago

SES to provide satellite connectivity for U.S. military ‘internet of things’

Aerospace9 hours ago

Launchspace Technologies proposes debris mitigation and collection constellations

SaaS10 hours ago

How Long It Roughly Takes to Close a Deal in SaaS. And Why.

Cleantech10 hours ago

Renewables = 70% of New US Power Capacity in 2020, Solar = 43%

Big Data10 hours ago

Capital on Tap apuesta por el software Modellica Originations de GDS Modellica para evaluar los procesos de solicitudes de tarjetas de crédito

Cleantech10 hours ago

Ford To Convert Cologne Factory For MEB Based EV Production

Aerospace11 hours ago

China pushes ahead with super-heavy-lift Long March 9

Automotive11 hours ago

GM cuts back terms of partnership with Nikola, shares drop over 24%

Cleantech12 hours ago

Top Tesla Goodies for Cyber Monday

Cleantech12 hours ago

Conference programme announced for Plastics Recycling Show Europe virtual event

Trending