<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>וירוס כופר - genie שירותי מחשוב לעסקים</title>
	<atom:link href="https://www.genie.co.il/en/tag/%D7%95%D7%99%D7%A8%D7%95%D7%A1-%D7%9B%D7%95%D7%A4%D7%A8/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.genie.co.il/en/tag/וירוס-כופר/</link>
	<description></description>
	<lastbuilddate>Mon, 24 Apr 2023 13:19:51 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.genie.co.il/wp-content/uploads/2021/05/fav-200x200.png</url>
	<title>וירוס כופר - genie שירותי מחשוב לעסקים</title>
	<link>https://www.genie.co.il/en/tag/וירוס-כופר/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>שאלות ותשובות בנושא וירוס כופר</title>
		<link>https://www.genie.co.il/en/ransomware-qa/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Tue, 12 Feb 2019 11:57:09 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<category><![CDATA[מתקפות סייבר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=9642</guid>

					<description><![CDATA[<p>הדואר האלקטרוני הוא אחד האמצעים העיקריים באמצעותם חודר וירוס הכופר למחשבים. כיצד ניתן לזהות הודעת דואר אלקטרוני חשודה? הודעת דואר אלקטרוני נושאת וירוס, תכיל חשבונית או קבלה על רכישה שנראית לגיטימית למראה. הדרך היחידה להבחין שלא מדובר באימייל לגיטימי היא על ידי בחינה דקדקנית של כתובת האימייל ממנה נשלחה ההודעה. הכתובת לא תהיה זהה לכתובת [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/ransomware-qa/">שאלות ותשובות בנושא וירוס כופר</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>E-mail is one of the main means by which the ransomware virus penetrates computers.<br />
How can I identify a suspicious email?</strong></h3>
<p>A virus-carrying email will contain a legitimate-looking invoice or purchase receipt. The only way to distinguish that this is not a legitimate email is by carefully examining the email address from which the message was sent.<br />
The address will not be the same as the original address it copies, whether it is the address of a private person, company or corporation, but will closely resemble it. Only a small change will differentiate an original address from a fake one. In the case of the same e-mail address, the reliability of the content of the message can be examined. It is important to verify the reliability of the sender&#039;s address, the content and the nature of the request for action, along with technological backup of the information security controls.</p>
<h3><strong>What is the degree of responsibility of the human factor - the employees, in introducing a ransomware virus into the organization?</strong></h3>
<p>80% The cyber attacks that take place are caused by human error on the part of system users. That is, an active action such as clicking on a link, downloading a file or entering a website that contains a virus.<br />
However, the ransomware also knows how to enter through open loopholes in the computer systems, without the direct intervention of system users.</p>
<p>Although today there is not a large amount of such loopholes, it is important to take this into account. In general, since the level of sophistication with which the viruses attack is so high today, one must be careful not to make accusations against the employees.</p>
<h3><strong>Is it possible to learn to avoid being infected with viruses?</strong></h3>
<p>Definitely possible and desirable. There are various methods of instilling habits of maintaining information security in the business, among other things through awareness training that is highly recommended. We know that most employees in businesses are not aware of the nature of the online world today, do not adhere to information security procedures and are not aware of the critical role they have in protecting the business .</p>
<p>Therefore, it is very important to convey the message of strictness and caution to their consciousness. Of course, the systems must be protected using information security solutions with several layers and hardnesses. Through prevention, identification, eradication, monitoring and control, it will be possible to catch the attackers. It can be done, but you should remember that you are never resilient.</p>
<h3><strong>Is it possible to decrypt the ransomware once an organization has already been infected?</strong></h3>
<p>In most cases no. There are types of ransom that can be used to open their encryption, but they are very few.</p>
<p>The encryption of the ransom virus is very complex, and in the vast majority of cases, the window of time in which the ransom has to be paid is short, what&#039;s more, the need of the business owners to return and function as quickly as possible - does not allow the opening of the encryption in that time window.</p>
<h3><strong>Shouldn&#039;t you just pay the ransom?</strong></h3>
<p>First of all, we will explain that the cyber attackers&#039; demand comes in the form of a message that is left on the victim&#039;s computer. The notice details the amount he must pay, the details of the account he must transfer the funds to, and the time window he has to do so. As it were, the cybercriminals promise that once the stated amount is transferred, the encryption on the information will be released and the business or person can return to normal.</p>
<p>The problem is that in reality this is not something that should be trusted, and this is for several reasons: first, all the amounts requested may be very high and sometimes even reach tens of thousands of dollars. The problem is that in the end these are criminals, so their credibility is questionable. Today it is possible to get confused and think that this is a legitimate company - with a customer service center, graphic design for the ransom notices and all.</p>
<p>The bottom line is that these are criminals, if they don&#039;t want to release the files, they can&#039;t be forced to do so. Indeed, studies show that one out of five &quot;customers&quot; who pay the ransom - do not receive the code to open the encryption on their information.</p>
<h3><strong>There are quite a few free programs on the market today that promise to protect against a ransomware virus. Can they be trusted?</strong></h3>
<p>We test almost every new software that comes to the market and simulate its attack using all the viruses known on the market, from simple and average viruses to the most sophisticated and advanced ones. In our experience, the free protection software does not hold up, even against the simpler viruses.</p>
<p>In addition, it is worth remembering that viruses are constantly changing and improving, so there is no point in compromising and relying on software that can only withstand today&#039;s average attack, because even if it can protect against a specific virus, tomorrow it will no longer provide proper protection against a more advanced variation of that virus.</p>
<p>Not only are the programs themselves ineffective in most cases, they may also cause damage themselves. Sometimes the protection software itself can suddenly stop an important system of the organization, and it will be impossible to contact the companies that produce the software, since it is free software without support. In addition, the free programs also do not offer a convenient central management interface. If the business has more than ten computers, it already needs a quality management interface.</p>
<p>So the bottom line is, it&#039;s ineffective to rely on free protection software. This wastes time and may cause direct or indirect damage to the organization. Therefore, the preference is to choose software that you invest in - both in terms of the product and in terms of service and warranty. Anything free can sometimes be very expensive, all the more so when it comes to the heart of the organization - its information systems.</p>
<h3><strong>If it is a small business or a home user, is there any point in using free software?</strong></h3>
<p>When it comes to home use it is better than nothing. But if it is a business, it is strongly recommended not to choose free software, which can do more harm than good. In the vast majority of cases, paid software is preferable.</p>
<h3><strong>What is recommended for very small companies to do in terms of protection and preparation for cyber attacks? Isn&#039;t it enough to just back up all the organization&#039;s data and information on the hard disk at the end of each day?</strong></h3>
<p>In general, in order to be prepared for any scenario and not only in the cyber world, backup is the first thing to take care of. In extreme cases of various types of disasters, a business whose data is not backed up in a safe place may lose it completely.</p>
<p>Regarding the ransomware virus - there is no doubt that quality backups are the first thing to take care of. At the same time, it is a mistake to rely only on backups and not provide additional protections for the business&#039;s information system. First, due to the fact that the business was hit by a ransomware virus, the recovery time can be very long.</p>
<p>For example, a business of 30 computers that have all been encrypted, needs to restore a very large amount of data to the servers, and this can take days of work, at best. Add to that the need to format each of the computers and reinstall everything on it; It can take days and weeks. Also, there are cases where the type of damage that the viruses cause is not the encryption of the business&#039;s information, but the use of the business&#039;s secrets for extortion purposes.</p>
<p>Therefore, although a proper backup is necessary for any business, it is not the only thing that needs to be done. Just as a business located in a problematic neighborhood knows that it must install bars, alarms and additional protection systems, so we need to understand that today&#039;s cyber world is a particularly problematic neighborhood, and we must prepare accordingly.</p>
<h4><strong><span dir="RTL">The information was brought by Alon Zucker, CEO</span> SOPHTIX </strong></h4><p>The post <a href="https://www.genie.co.il/en/ransomware-qa/">שאלות ותשובות בנושא וירוס כופר</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>טיפים להגנה על המחשב מפני האקרים</title>
		<link>https://www.genie.co.il/en/security-tips/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 06 Jan 2019 08:11:28 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[אנטי וירוס]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8398</guid>

					<description><![CDATA[<p>כך תקטינו משמעותית את הסיכוי למתקפת האקרים על המחשב שלכם אף אחד מאיתנו אינו רוצה ליפול קורבן למתקפת האקרים על מחשבו האישי. להתקפה שכזו יכולות להיות השלכות רבות, החל מנטרול תפקוד המחשב, דרך חיטוט בתמונות ובמסמכים האישיים ועד לגניבת סיסמאות המובילות למידע רגיש באמת, כגון: כניסה למייל הפרטי, לחשבון האישי ברשתות חברתיות ופרטי חשבון הבנק [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/security-tips/">טיפים להגנה על המחשב מפני האקרים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>This way you will significantly reduce the chance of a hacker attack on your computer</strong></p>
<p>None of us wants to fall victim to a hacker attack on our personal computer. Such an attack can have many consequences, from disabling the computer&#039;s function, through rummaging through personal photos and documents, to stealing passwords that lead to information<br />
Really sensitive, such as: entering the private email, the personal account in social networks and our bank account and credit card information. Unpleasant to say the least. However, in the days when, apart from the home computer, we walk around the house and outside with the smartphone and sometimes even with one tablet or another, we are exposed every moment to such an attack, and it seems that the appetite of hackers from Israel and abroad is growing over time.</p>
<p>So what can still be done to minimize the possibility that someone somewhere could break into our computer and steal valuable information from it? It turns out that there are quite a few actions and measures, most of them very simple by the way, that each of us can take, in order to defend against these risks.</p>
<p><strong>First and foremost - the operating system</strong>. Whether it is the operating system from Microsoft or Mac OS, it must be updated. Most of the updates for the operating systems are security updates designed to close discovered &quot;loopholes&quot; and therefore their installation is critical. It must be remembered that the operating systems are the platform for all the information on the computer and hence their great importance in its security. In addition to an up-to-date operating system, it is highly recommended to activate the &quot;firewall&quot; application built into the system in order to block unwanted communications with questionable parties on the network.</p>
<p>A wireless internet network at home, at work or in the shopping mall, definitely improves the surfing experience but can be a real danger if it is not properly protected. The home network must be secured with a strong password (we will expand on it later). This way you will not only prevent others from &quot;surfing&quot; on your account, but you will also prevent access to all the shared information on your home network. When you are out of the house, prefer surfing through secure networks, or alternatively, always remember that surfing on public networks that are open to everyone, increases the potential for stealing information from you many times over, be careful.</p>
<p>The importance of the strength of the login passwords for your email and social networks is critical. A password that is considered too easy to decipher, such as a sequence of ascending numbers, the word password, date of birth, etc., is like handing over all your personal information on a platter of money to anyone of any kind. Don&#039;t bother choosing the password. Try to make it as difficult as possible to identify it. It is desirable to have both letters and numbers in it, and it is highly recommended to change the password at least two to three times a year, and of course in any case where there is a suspicion of any attempt to break into your account.</p>
<p>Browsing social networking sites is similar in many ways to wandering in a large public place. Thus, when you are approached by a foreign party whom you do not know, it is advisable to behave with suspicion and not rush to give personal information about you, at least until you are completely sure of the purity of his intentions. This way you will also maintain your personal security, never confirm receipt and opening of a file sent from someone you do not know for sure. Any message sent to you by email or on social media from an unknown party requires your vigilance. Suspicion is not a bad word here, it is recommended to be careful.</p><p>The post <a href="https://www.genie.co.il/en/security-tips/">טיפים להגנה על המחשב מפני האקרים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>האם המחשב שלך באמת מאובטח?</title>
		<link>https://www.genie.co.il/en/my-computer-safe/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 06 Jan 2019 08:09:19 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8395</guid>

					<description><![CDATA[<p>האם המחשב שלכם באמת מאובטח ? גניבת זהות אישית, הינה בעיה שגדלה באופן משמעותי בשנים האחרונות. כולנו יכולים כיום לקחת דוגמאות אפילו מחברות כרטיסי האשראי ומהבנקים למיניהם, שצריכים להתמודד עם זייפני זהות באופן יומיומי על מנת למנוע גניבות של כספים. מה שאנחנו באמת צריכים לזכור, זה שאם חברות גדולות חשופות לפריצות האקרים שונים, אז איך [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/my-computer-safe/">האם המחשב שלך באמת מאובטח?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Is your computer really secure?</strong><br />
Identity theft is a problem that has grown significantly in recent years. Today we can all take examples even from the credit card companies and various banks, which have to deal with identity forgers on a daily basis in order to prevent theft of funds. What we really need to remember, is that if large companies are exposed to various hacks, then how does that make us invulnerable? Are our computers more powerful? More secure? I do not believe. After all, the best hackers have also managed to break into the most powerful systems. But one thing we don&#039;t think about is the magnitude of theft that such hackers can do just from our personal computer by hacking and stealing personal accounts and numbers, and unfortunately it happens every day to people just like you and me.</p>
<p>Aren&#039;t you worried about your identity being stolen? What about the time and money you invested in your computer? Another thing that your computer can get from such hacks is a virus, which can cause the memory on your hard disk to be erased and all the information on it to be lost. Your computer will be an easy target if you don&#039;t have any protection system, for example <a title="firewall" href="https://www.genie.co.il/en/firewall/">firewall</a>. Your unprotected computer will eventually become a computer infected with a virus, and a computer infected with a virus is its discipline - destruction.</p>
<p>In order to avoid the terrible and destructive effects of a virus on your computer, you must install a protection system. First of all, make sure it exists <a title="fire wall" href="https://www.genie.co.il/en/firewall/">fire wall</a> (FireWall) on your computer and that it is indeed installed. The firewall can examine the material entering the computer from the Internet and make sure that the incoming input is not destructive or may provide unwanted files on your computer. If the firewall detects that the incoming material is harmful, it will immediately block it. The firewall should be the first component of your computer protection plan.</p>
<p>The next step will be to invest in a good anti-virus software that can filter a second time all incoming input to your computer in case the firewall failed to block it. In many cases, hackers break into the computer of people you know, and use the computer as a clone, which means they falsify their image, and at that moment they become the owner of the computer so that as soon as they talk to someone on the network through your computer, the user on the other end will think they are talking to the owner of the computer. Think for a moment about this type of invasion. This is a tool for the hacker. The hacker will be able to make this computer do whatever he wants, including hacking email, various bank accounts and even other computer systems.</p>
<p>You can provide protection against this issue by synchronizing your antivirus with each message in your email inbox. Do not open files sent to you, unless you know the name of the sender and you expect these files. Hackers usually send deadly viruses via email that can cause destruction to your computer and in many cases also help the hacker take control of your computer. Stop them immediately, by not opening the sent file and deleting the entire message immediately. The antivirus software is significant in protecting your computer and should be updated with the network frequently.</p>
<p>Spyware and other spyware are a very common thing lately among hackers, and this is what they use to steal identities and spy to know everything about their victims. These spyware programs, their job is to wander around your hard disk and collect information that the sender wants to know. This malicious software may cause your system to run slowly and even give away all personal information from your private computer.</p>
<p>Anti-spyware programs are usually provided by various antivirus manufacturers and are highly recommended for installation as an additional step in your computer&#039;s protection program. It absolutely requires that you have an organized and strong protection system on your computer, especially today in the evolving computer age that unfortunately many people abuse it. The Internet is a home for dishonest people who will be interested in ridding you of all the information that is important to you in order to satisfy their personal profits. Protect yourself from these people, and start the process of protecting your computer now!</p>
<p>Successfully.</p>
<p>Interested in more information? <a title="Cloud computing video" href="https://www.genie.co.il/en/cloud-computing/">Business firewall - information security - cloud services - computing solutions - watch our video</a></p><p>The post <a href="https://www.genie.co.il/en/my-computer-safe/">האם המחשב שלך באמת מאובטח?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>להבין את וירוס הכופר</title>
		<link>https://www.genie.co.il/en/understandingransomware/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 30 Dec 2018 09:10:46 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8229</guid>

					<description><![CDATA[<p>וירוס הכופר הוא איום אבטחת המידע הגדול ביותר כיום, הסוחט מיליארדי דולרים מאנשים פרטיים ועסקים בכל הגדלים. בראיון זה אלון צוקר, מומחה אבטחת מידע ומנכ&#34;ל חברת SOPHTIX ייתן כלים להבין טוב יותר את האיום וכיצד ניתן להתמודד מולו. ראיון ראשון בסדרה. אלון צוקר הוא מומחה אבטחת מידע ומנכ&#34;ל חברת סופטיקס (SOPHTIX) המתמקדת בהגנת סייבר &#8211; [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/understandingransomware/">להבין את וירוס הכופר</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Ransomware is the biggest information security threat today, extorting billions of dollars from individuals and businesses of all sizes. In this interview, Alon Zucker, information security expert and CEO of SOPHTIX will provide tools to better understand the threat and how to deal with it. First interview in the series.<br />
<strong><br />
<img decoding="async" class="size-full wp-image-8230 alignright" src="https://www.genie.co.il/wp-content/uploads/2018/12/alonzuker.jpg" alt="" width="120" height="180" />Alon Zucker is an information security expert and the CEO of SOPHTIX, which focuses on cyber protection - one of the leading and most innovative companies in Israel in the field of information security. We took Alon for an interview in which we tried to understand how to deal with the biggest cyber threat to the business world today - the ransomware virus, which marks the threatening direction that the cyber world is moving towards - viruses that are more sophisticated and cruel than ever before, with an ever-increasing volume of attacks.</strong></p>
<p style="text-align: justify;"><strong>So first of all - what is the ransomware virus?</strong><br />
The ransomware virus is actually a malware that encrypts the organization&#039;s files, as soon as it encrypts them - the organization or the computer owner has no ability to access its files. Starting with emails, office files, databases and including CRM, ERP or other financial systems. In other words the ransomware can encrypt the entire business. As soon as the customer has no access to his files - the business is disabled. There are cases when the virus is a hit in the wing, for example if only one folder was encrypted, it can be restored in half a day and nothing happened. But there are cases where all the business information is encrypted and then even if it has a backup, everything still needs to be restored. For the purpose of the example, if the business has 50 computers, you need to format each computer and reinstall everything on it. Businesses get to a point where they can&#039;t work for weeks and the result can be fatal, even if they had a backup.</p>
<p style="text-align: justify;"><strong>Ransomware Attacks Focus More on Business?</strong><br />
There are cyber attacks against users of all types and sizes. Starting from a private person who mainly keeps photos of his children and ending with huge organizations with information systems worth hundreds of millions of dollars. It can be said in general that the cybercriminals use the ransomware mainly against small and medium-sized businesses, since they are usually the weak link, when it is likely that they will be more vulnerable in terms of information security than large businesses, which invest huge budgets in protecting their information systems.</p>
<p style="text-align: justify;">In general, it can be said that just as any business, of any size, is exposed to physical hacking or embezzlement, so is the cyber issue. The crime scene just moved there. If we were once afraid of hacks in which money, equipment or information would be stolen - today it happens at the cyber level. The difference is that today the threat is much more serious, for two reasons. First - today there are ways of camouflage to achieve anonymity, and it is difficult for all bodies to find out who you are and where you come from, so that if in the past criminals would avoid certain crimes for fear of being caught, today anonymity on the Internet gives criminals a mask and the possibility of remaining &quot;in the shadows&quot;, secondly - today a cyber criminal does not You have to be a skilled hacker to be an attacker, there are professional hackers who create malware and sell it as products on the darknet. Thus, people without an extensive technical background can participate in crime, and a large mass of attackers regularly enters the field.</p>
<p style="text-align: justify;"><strong>Where do most cyber attacks come from?</strong><br />
Most of the operations are carried out in Russia, but also in Africa and China. An interesting issue to think about in this context is why the local government officials do not perform more actions in order to locate and block malicious activity in their territory.</p>
<p style="text-align: justify;">Why is it so difficult to track down the source of the hacks and catch the criminals?<br />
Because many times the hacking happens by hacking into a chain of &quot;host&quot; computers in different countries. The attack can come originally from Africa, and from there hack into China, from China hack into Iran and from there hack into the victim&#039;s computer and implant the ransomware virus in it. To trace back the entire chain and find out who is at the end is an almost impossible task.<br />
Beyond that, there are also tools that enable anonymity that help them, such as the Darknet. The Darknet is a general term for networks that are &quot;dressed&quot; on existing networks and access to them is with certain software, and Tor is one of the popular Darknet networks, among its capabilities is its masking capability, which does not allow the discovery of the IP address of the surfer. Using the column is legitimate, but the criminals exploit it for illegitimate activities.</p>
<p style="text-align: justify;"><strong>How do you get infected with a ransomware virus?</strong><br />
The most common method is via e-mail. This is an e-mail message, which tries to be legitimate in appearance, and is attached to it, for example, a fake invoice or a link. The email is addressed directly to a specific person and will often come disguised as an email from large companies, such as Amazon or DHL. In more sophisticated cases, which I will expand on later, they may also come from recipients that the &quot;victim&quot; knows directly - company colleagues and the like.</p>
<p>The recipient, in his innocence, opens the link or the attached file and gets infected with the virus. Viruses can also penetrate a computer by browsing a website that looks completely normal, but it actually carries a virus that as soon as a surfer enters it - the virus penetrates his computer. Other methods that a virus can penetrate are through a flash drive that someone inserted into one of the computers, or through a smartphone that has been infected with a virus, and the virus can pass from it to the computer. Could be through someone who connected remotely to help, could be a supplier of the CRM or ERP or other software. Every connection interface, network or local, is an attack vector.</p>
<p style="text-align: justify;">The more sophisticated attacks use the technique of &quot;social engineering&quot;, which is a form of fraud. At this level you can find software that scans social networks, for example LinkedIn of a certain company. These programs can target one of the employees in the organization and send emails to the other employees in the organization supposedly on his behalf, with content and titles that match his role in the organization. In these cases - the chance that no one will open a legitimate looking email coming from one of his colleagues is very low.</p>
<p style="text-align: justify;">In conclusion, the technological world we live in today is full of loopholes, and even though we must try to plug all the holes as best we can, new holes and loopholes will always be found. So <span style="text-decoration: underline;"><strong>The paradigm through which organizations are approached to protect must change. You have to start thinking like the attackers, and stop the attacks at an earlier stage of their development. You need to change your attitude.</strong></span></p><p>The post <a href="https://www.genie.co.il/en/understandingransomware/">להבין את וירוס הכופר</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>משאירים את הסחיטה לפירות</title>
		<link>https://www.genie.co.il/en/the-moroccan-sting/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 10:06:54 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[וירוס כופר]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8195</guid>

					<description><![CDATA[<p>כמו רבים אחרים, גם אני צפיתי השבוע במהדורות החדשות שסיקרה בהרחבה את &#34;העוקץ המרוקני&#34; – כפי שכינתה זאת משטרת ישראל; גל התקפות כופר באינסטגרם, אשר פגע עד כה במספר רב של ישראלים שנפלו קורבן לסחיטה של אלפי שקלים, תחת האיום שסרטונים מיניים בהם השתתפו – יפורסמו במקומות שונים. השיטה פשוטה, אבל עדיין לא נעשה די [&#8230;]</p>
<p>The post <a href="https://www.genie.co.il/en/the-moroccan-sting/">משאירים את הסחיטה לפירות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Like many others, I also watched the news this week that extensively covered the &quot;Moroccan sting&quot; - as the Israeli police called it; The wave of extortion attacks on Instagram, which has so far affected a large number of Israelis who have fallen victim to extortion of thousands of shekels, under the threat that sexual videos in which they participated - will be published in various places.<br />
The method is simple, but still not enough has been done to prevent it in terms of awareness and important precautions that were not taken. The numbers of Israelis who fell into the trap are the proof that the threat is far from internalized: a supposedly young and attractive girl, holds conversations with the victim, acquires his trust after a certain period of time and the conversation turns romantic. From here it&#039;s a short way to an intimate video call during which the &quot;girl&quot; reveals herself to the victim, which gives him the freedom to expose himself to her in an explicit sexual way.</p>
<p style="text-align: justify;">In most cases, in such a situation, an additional video will no longer be necessary; The scam is revealed, followed by the financial demand and the threat to publish the video, if the victim refuses to pay the extortion fee.<br />
Along with the statement that the blackmail method is simple, I must say that it has also been refined and become more &quot;invested&quot;. Until recently, more than half of the ransom calls were quite identical calls, threatening to publish sexual content of the victim, when in some cases, the victim heard intimate general details about him from the attacker, and assumed that one or another video of his past was indeed in the possession of the attacker, but in reality, they did not exist at all Such videos! The attacker&#039;s working assumption was that some of the victims would disregard and reject the threat, while another part would panic, surrender and pay...</p>
<p>The police instructions not to address these messages, encouraged the attackers to switch to threats of sexual content with &quot;meat&quot;, literally. Now the pressure on the victim is great, and hence his tendency to lose his temper and make more mistakes, apart from the series of mistakes he made when he was tempted from the beginning to believe that the attacker is indeed who he claims to be.</p>
<p style="text-align: justify;">What to do? The best solution was not to do it in the first place, not to be tempted, and then no problems would arise either. And the step is taken, and despite the pressure, I say from my experience that still, and in any case, it is not recommended to give in to the extortionists&#039; demands; Not because they are unable to carry out their threat, but for the simple reason that there is no guarantee that they will keep their word and not ask for additional funds. This has happened countless times and will happen again in the future. Attackers know how to detect pressure from a victim and may well take advantage of the situation to their advantage for extortion or more extortions. It is important to contact and complain to the police, report this to the content platforms where the sensitive content was published and ask for it to be removed.</p>
<p>And again, the best solution is prevention and taking precautions. It&#039;s worth remembering: as long as you haven&#039;t met the party with whom you talked, and as long as you don&#039;t have real and certain details and means of identification about him, he is a potential suspect for extorting information from you.<br />
You should be careful now not to pay the price later, literally...</p><p>The post <a href="https://www.genie.co.il/en/the-moroccan-sting/">משאירים את הסחיטה לפירות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>