| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Ransomware

Page history last edited by UNC 6 years, 11 months ago

Over time, cyber extortion's evolution has been from vaporware (programs pretending to do something they did not do), to Rogue anti-virus (pretend antivirus software), to Rogue Fake Alert parasites (pretend antimalware, which was the actual infection), simple ransomware (pretended to undo something it did not do), to Fake authority ransomware (locked the computer for faked legal infractions) and now: Crypto-ransom, which announces with a possible lock screen that the victim's personal files have been encrypted (true), requires the victim to buy the private key to decrypt the files. Without the key, the files are lost since the encryption is unbreakable.   

 

It is essential to keep Windows, Office, Anti-Malware programs, Drivers (hardware programs) and third-party programs (Java, Adobe Reader, Acrobat, Flash Player, WinAmp, etc.) up to date with the latest versions or upgrades. Never click on a link in an unsolicited email. Never open an email attachment without scanning it for malware, offline. Backup the system on a weekly basis or more often on storage media that DOES NOT REMAIN CONNECTED to the system. All of these efforts and exercising common sense of knowing systems are essentially under constant attack while using the Internet will keep the scourge of ransomware at bay.  (More from Microsoft)

 

ID Ransomware is a new website that allows ransomware victims to identify the ransomware variant infecting their computers. It also provides a determination if there is a means of recovery of the encrypted files without having to pay. "Knowing is half the battle!"     RANSOMWARE2016     RANSOMWARE2015-1     RANSOMWARE2015-2 

 

Ransomware Protection/Prevention - dealing with miscreants, criminals, and psychotics ensures an unreasonable outcome. Especially with ransomware, an gram of prevention is worth kilograms of cure.

 

Computer viruses make their way onto systems due to lack of simple security practices:

• Always Install Security Updates - any version of Windows, except Windows 10, with SMB protocol enabled, ensure the computer always receives updates automatically and it is always up-to-date.

• Use an Antivirus Program - an evergreen solution to prevent most threats is the Windows Defender Security System that came with Windows 10 Creator's edition. Besides being updated several times a day, special protection service is included from the cloud, which add special protections against the latest malware and variants within minutes after they appear on the threat horizon.

• Be Suspicious of Emails, Websites, and Apps - most ransomware spread through phishing emails, malvertising on websites, and third-party apps/programs:
-never open unsolicited, attached documents - save it to Desktop >> right-click the file >> scan with Windows Defender >> also scan with Malwarebytes >> when both agree that the file is safe, one may safely open it.
-never click links inside any unsolicited email without checking with the originator first to determine if they actually sent the email
-never download any app from third-party sources
-read reviews before installing apps from official stores

• Regular Backup of all Files - keep a tight grip on all important documents and files
-maintain a backup routine to an external storage device
-after backing up the system, disconnect the storage device from the computer so the ransomware cannot infect the backup

• Be aware of the threat stratum - There is seldom a day that goes without a report of attacks or vulnerabilities in software and services, including Android, iOS, Windows, Linux and Mac Computers. Users of any domain should know about the day-to-day happenings with technology to avoid being attacked.

Comments (0)

You don't have permission to comment on this page.