Research reveals that the Malware attack from Winos 4.0 seems to target Chinese-speaking people and possibly educational systems. Winos 4.0 is a command-and-control (C&C) framework that is supposed to assist in boosting game performance and speed performance of installation of other programs. The program downloads a select three files within its download and proceeds to infect your device; gathering info such as clipboard content and cryptocurrency. Protecting yourself and your systems from Malware can sometimes be difficult. Still, the proper steps such as keeping your system updated and only downloading sources and programs you trust can aid in your protection.
Who published the content: Ravie Lakshmanan
Where was it published: The Hacker News
When was it published: November 6, 2024
The truthfulness and integrity of the facts: Seems to be accurate, with low spelling mistakes, and is a popular topic with similar answers.
How is it written and presented: The page has several diagrams intended for entertainment and to "pull" the reader in and the text goes in depth about what exactly happened.
The attack on Microchip Technology was a ransomware attack on the company's cybersecurity; costing them 21.4 million dollars and gigabytes of data. Surprisingly enough "The Play" (The group who attacked Microchip) came out about a week later and published all of the stolen data; meaning that Microchip Technology didn't pay the ransom. The material that was published contained data on personal data, payrolls, budgets, taxes, finances, and passwords. The best way to protect yourself from ransomware is to separately back up your data to another source and install firewalls and virus protection.
Who published the content: Eduard Kovacs
Where was it published: Security Week
When was it published: November 6, 2024
The truthfulness and integrity of the facts: The page has all necessary facts that get straight to the point and are credible.
How is it written and presented: No ads are within the page and only references to other articles. The words are presented accordingly.
The certificate shows that I completed the CSIT Cybersecurity Training.
In this assignment, I learned CSIT security training and a little about malicious sources that can easily infect unwilling users. Along with that, I also learned about the personal problems of 2 companies that were affected by malicious software.