Encriptación o cifrado de datos

Let’s talk about encryption

Encryption is one of the main tools for keeping us safe when surfing the Internet or using different applications. Encryption helps us protect and keep our activity, the information we share, and our personal and session data secure.

 

What is encryption?

Encryption can be included within cryptography. It is a technique for encrypting or encoding texts or information so that they are only accessible by the sender and receiver. This technique uses complex mathematical algorithms to encrypt information in computer science and cybersecurity. To consider that information or text has been encrypted, it must meet a series of requirements or characteristics:

  • Privacy: Information is only accessible to authorized persons.
  • Integrity: The information has not been modified by any external agent. It must be kept intact from when it is received until it is delivered.
  • Authentication: Verifying the other party's identity within this information exchange must be possible.
  • Non-repudiation: Either party can deny that it has transferred such information.

This is why encryption is one of the most popular and effective data security methods companies use.

 

Data encryption

 

Types of encryption

Within the world of cryptography, we can differentiate between two types of encryption: symmetric and asymmetric.

Symmetric encryption

Symmetric encryption, also called secret key cryptography, is a cryptographic method that uses the same key to encrypt and decrypt messages at the sender and receiver. Once both parties have access to this key, the sender encrypts a message using the key, sends it to the recipient, and the recipient decrypts it with the same key. It is the oldest form of encryption and is still relevant because of its data transmission speed. The encryption algorithms used for this type are Blowfish, RC4, DES, AES-128, AES-256, etc.

Asymmetric encryption

Asymmetric encryption, also known as public key cryptography (PKI), is a cryptographic method that uses two public and private keys to transfer data and information. In asymmetric encryption, the sender uses the public key to encode information in an unreadable form, which can only be decrypted or read with a secret key. When sending encrypted data from the public key scheme, the receiver needs a hidden key to access the encrypted data. Some of the most used algorithms for this type of encryption are DSA, RSA, PKCS, and EIGamal.

 

Differences between symmetric encryption and asymmetric encryption

Some of the differences between these two types of encryption have already been explained in their definition. Let us comment on them:

Security

Symmetric encryption is older and uses only one key, which must be communicated with the risk that this entails. However, asymmetric encryption uses two keys and securely communicates the public key to third parties. Although asymmetric encryption is more secure, a priori, each case will have to be looked at individually, and the combination of both ciphers is very interesting.

Speed

Asymmetric encryption, which is more complex, requires more time in its encryption and decryption processes than symmetric encryption. However, some organizations opt for symmetric encryption because it is faster.

Number of keys

Key management is also a benefit of using asymmetric encryption. You only need one key pair per user to encrypt messages for all other users. As we saw with symmetric encryption, as the number of users increases, the number of keys increases. Asymmetric encryption is better when encrypting communications with a large volume of data in transit. On the other hand, symmetric encryption is usually used to transmit small volumes of data in authentication systems.


Diferentes tipos de malware

Types of Malware and keys to prevent these attacks from affecting the security of your company

Protecting against malware involves deploying a corporate strategy based on in-depth knowledge of the threat.
From Enthec, we tell you what malware consists of and its different types.

What is malware

A malware attack is a malicious attempt to gain access to computer systems, networks, or computers to steal sensitive information, infect systems, encrypt data, or cause damage. The goals of malware include gaining unauthorized access, stealing data, encrypting information, or damaging the affected system.
Organizations must be aware of and protect against these attacks because of the serious consequences they can entail if successful, such as financial losses, operational disruptions, data recovery costs, and reputational damage.
If you're wondering how many types of malware there are, read on; we'll tell you below.

 

Types of malware

 

The Different Types of Malware You Need to Know About

Malware can be classified into different categories depending on its purpose:

Virus

One of the most well-known types of malware is viruses. These viruses aim to disrupt the normal functioning of the computer device, regularly replacing executable files with others that contain the device's code.
Its infection can be through removable devices, emails, or network connections.

Adware

It is software designed to display unwanted advertising on screen. One of the methods that infects the system is after downloading a program and inadvertently allowing permissions.
The other method of infection can be browsing a website, taking advantage of the vulnerability in the user's browser to perform an unintentional download.

Spyware

It is a type of malware that hides in the computer system, monitors user activity, and steals information.

In this case, it is infected through unsafe web pages, taking advantage of vulnerabilities through ads or pop-ups that, when clicked, download this type of malware.

 

Spyware as a type of malware

 

Trojan

This malware appears legitimate, harmless software but aims to control your computer, introduce more malware, steal data, and spread to other devices.
Rear doors

Back Doors

After installation, it provides access to malicious users to control a computer remotely.
It infects computers from untrustworthy websites or downloads. It can also infect through emails.

Keyloggers

Records keystrokes made on the keyboard to store them in a file and send them over the Internet. They can be hidden on removable devices, in emails or downloads from non-legitimate pages.

Thieves

This type of malware accesses private information stored on the computer to steal and share the most sensitive data, such as passwords.

Ransomware

Ransomware is a type of malware that infects a computer to take control of it and, in exchange, demands a ransom payment.

When ransomware infects your computer, it encrypts all files and folders, preventing access without a key. It is spread through attachments in untrustworthy emails or web pages.

Computer worm

They are programs that make copies of themselves by remaining in different places in the system. They can make system changes without authorization, decreasing system performance or worsening the connection.

Rootkit

This type of malware allows hackers to access your computer without your knowledge to hide the processes and files on your system for a malicious purpose. It can infect other devices with files or downloads from non-legitimate sites.

Botnets

Botnets are any group of devices that are infected and controlled remotely by an attacker to control as many devices as possible and carry out illicit activities.
It spreads through malicious code on websites after exploiting its vulnerability.

Rogueware (rogue software )

This type of malware masquerades as a security tool that launches an alert or a fake message indicating that something is wrong with the computer to click on a link to download software that solves the problem.

Cryptojacking

Cryptojacking is a type of malware that involves cybercriminals using users' devices without their consent and using the machine's resources to "mine" forms of online money known as cryptocurrencies.

Malicious Apps

These types of apps masquerade as legitimate apps or try to emulate other successful apps.
Once installed on the device, they will ask us for a series of abusive permissions or, on the contrary, they will make fraudulent use of those permissions.

 

Ways to get malware into a system

Malware gets into a system in different ways. Some of the most common are:

  • Email: Cybercriminals often use email to distribute malware. This can be through malicious links or attachments in phishing emails.
  • Internet downloads: Some websites may try to install malware on a device when you visit or download something from them. This is especially common on websites that offer freeware or pirated software.
  • External storage devices: Devices such as USB drives can contain malware. If they connect to the system, malware can install itself automatically.
  • Exploiting vulnerabilities: Cybercriminals often exploit software vulnerabilities to introduce malware into a system. This can be through outdated or unpatched software.
  • Social media: Malicious links can also be distributed through social media platforms. Clicking on a malicious link can install malware.
  • Mobile apps: Malware is often spread through malicious apps on mobile devices. These apps may look legitimate, but they contain malicious code.

You may be interested in our post→ Common types of cyberattacks.

 

How to identify a potential malware infection

To identify if a computer is infected with any malware types, it is crucial to pay attention to specific telltale symptoms. Some of the common signs of malware infection include:

  • Slow system performance: If your computer runs slower than usual, freezes, or doesn't respond appropriately, it could indicate infection.
  • Pop-up messages: The constant appearance of pop-up messages on the desktop can signify infection.
  • Internet connection issues: Difficulties connecting to the internet or slow browsing can indicate the presence of malware
  • Unexpected changes in the system: new icons on the desktop, files with unknown extensions, disappearance of the antivirus, or deactivation of the firewall are red flags.
  • Abnormal computer behavior: Automatic actions such as opening unsolicited windows, changes in application languages, or missing files needed to run programs can be signs of infection.

Awareness to protect against malware

Since malware infection is almost always the result of social engineering techniques, malware awareness is essential in any work environment.
Knowledge is the best protection against significant damage to computer systems, including data loss, information theft, and disruption of business operations.
It's critical for everyone in any organization to understand malware, how it spreads, and how they can prevent it. This can include training on identifying suspicious emails, the importance of not downloading files from unknown websites, and the need not to click on unsolicited links.
This training and awareness must be regularly updated to prevent routine and trust from becoming vectors facilitating the attack.
In addition, workers should also be aware of the warning signs of a malware infection, such as slow system performance, frequent crashes, unwanted pop-up ads, and unexpected changes in system settings.
The time that elapses between the attack, detection, and communication is essential to protect against the malware deployed and avoid or minimize damage.

 

Protection against different types of malware

 

Protect mobile devices from malware

Mobile devices are now incorporated into any organization's work. Many of them are privately owned by workers, who use them outside of working hours and the work environment.
Therefore, to protect against malware, the organization must expand the scope of training and awareness to include this type of device, as long as it can access the corporate system from it.
Some recommended actions to protect mobile devices against different types of malware are:

  • Regular updates: keep the operating system and all applications current. Updates often include security patches that protect against new threats.
  • Security software: Install a reliable security application with antivirus and anti-malware protection. Some of these apps also include additional features such as remotely locking and wiping the device if it is lost or stolen.
  • Safe downloads: Only download apps from official app stores like Google Play Store or Apple App Store. These stores typically have strict security policies and review apps for malware.
  • App permissions: Review the permissions that an app requests before installing it. If an app requests unnecessary permissions for its operation, it could be a sign that it is malicious.
  • Safe browsing: Avoid visiting unsafe websites or clicking on suspicious links that could install malware on your device.
  • Public Wi-Fi: Be careful when using public Wi-Fi networks, as cybercriminals frequently use these networks to spread malware. It's wise to consider using a VPN when you're on public Wi-Fi.
  • Screen lock: Use a screen lock to protect your device in case it is lost or stolen. This can help prevent unauthorized access to your information.

 

In-depth threat knowledge allows organizations to effectively protect against malware types and leverage the capabilities of new cybersecurity solutions, such as our Kartos Corporate Threat Watchbots cyber surveillance platform to prevent attacks before they materialize. Contact us to learn about our solutions!


formas comunes de ciberataques

Common Types of Cyberattacks - Part II.

If in the first part of this article on the common types of cyberattacks we explained the means that cybercriminals use to carry out the attack, in this article we will see the various ways they have to execute it. As we already said in the previous post, a cyberattack is any type of offensive maneuver used by individuals or entire organizations, which targets computer information systems, infrastructures, computer networks and/or personal computing devices. These attacks attempt through various means of malicious acts, usually originating from an anonymous source, to hack a system to steal, alter or destroy a specific target. Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing confidential company information or personal data, and generating profits.

 

Common Types of Cyberattack

Common types of cyberattacks by their form:

Botnet:

Botnets are networks of hijacked computer devices that carry out various scams and cyberattacks. Their name combines two words: “robot” and “network.” Botnets are tools to automate mass attacks, such as data theft, server crashes, and malware distribution.
Botnets are built to grow, automate, and speed up a hacker’s ability to carry out larger attacks.

Spyware:

Spyware is any malicious software that secretly gathers information about a person or organization and sends it to another entity in a way that harms the user. It is designed to take partial or full control of a computer’s operation without the knowledge of its user. For example, by violating their privacy or endangering their device’s security. Websites may engage in spyware behaviors like web tracking. Spyware is frequently associated with advertising and involves many of the same issues.

Phising:

Phishing is a cybercrime in which someone posing as a legitimate institution contacts a target or targets by email, telephone, or text message to lure individuals into providing sensitive data such as personally identifiable information, banking, credit card details, and passwords. Phishing attacks have become increasingly sophisticated and often transparently mirror the targeted site, allowing the attacker to observe everything while the victim navigates the site and transverse any additional security.

 

Our Kartos Corporate Threat Watchbots by Enthec platform helps you prevent different types of cyberattacks by locating in real time the leaked corporate information as well as the exposed vulnerabilities of your organization in order to prevent them from being used to execute a cyberattack. Contact us to learn more about how Kartos can help you protect your business.