One of the growing cyber threats that got a lot of attention last year was ransomware with a variety of high profile victims.
What is it?
Ransomware is a computer malware that installs itself covertly on a computer, carries out an attack that encrypts the files on that computer and then demands a ransom payment to decrypt the files for the user to regain access to them.
Typically, the ransomware could be bundled with legitimate software much like a Trojan horse. Often times the Trojan installs some form of scareware that claims the victim’s machine is at risk or has been found hosting illegal content.
The end result is eventually to coerce the victim into paying for the decryption key in order to gain access to his files.
How would I get infected?
There are 2 main ways ransomware spreads itself. A compromised website that contains the payload or a simple email with a malicious attachment.
What should I do to avoid it?
- Website URLs to ensure they actually point to the site you are looking for i.e. g00gle.com instead of google.com or te1egraph.com instead of telegraph.com.
- Emails that are faking or forcing urgency.
- Offer prizes or some sort of reward for clicking or downloading something.
- Ask you to provide passwords or login to sites in order to give you access to something.
- Emails that have poor grammar or spelling.
- Emails that originate from a certain address but tell you to reply to another one.
Other general security tips include:
- Backup backup backup! Take regular backups and keep recent copies off-line at the very least if not offsite. A backup on another partition on the same drive would not help much.
- Don’t enable macros in office documents received by email. A lot of times the malware is embedded into a document that you unknowingly opened and ran!
- Be careful with attachments from dubious sources. If you don’t know it, don’t open it!
- Apply software patches. Regularly applying patches means your software is up-to-date and has lower chances of containing bugs or loopholes that could be exploited.
The are to to make sure that BAD click will NOT become a catastrophe! the dangers of Social Media. YES, YOU have read it correctly, I mentioned “Network”. WHY!? Because just letting everybody owning ONLY his (her) own device at home wouldn’t make sense, BETTER is to connect ALL the devices (Smart…
Link: How To Teach Kids Up From The Early Age About Cyber Security And Digital CitizenShip via gustmees.wordpress.com
Why Is Cyber Security Important? [Infographic] 17th March 2016 Cybersecurity has become a major concern over the last few years as hackers have penetrated the IT infrastructure of government and enterprises with increasing frequency and sophistication….
Link: Why Is Cyber Security Important? [Infographic] via http://www.vineresources.com
Here are the 15 best Android hacking apps and tools of 2016 Hacking, which was once considered the exclusive domain of the “experts” has become very common phenomenon with the rise of technology and advancements in the mobile field. With most people relying on their smartphones and other portable…
Link: Top 15 Android Hacking Apps and Tools of 2016 via http://www.techworm.net
Ransomware is a multi-million-dollar crime operation that strikes everyone from hospitals to police departments to online casinos. It’s such a profitable scheme that experts say traditional cyberthieves are abandoning their old ways of making money—stealing credit card numbers and bank account…
Link: 4 Ways to Protect Against the Very Real Threat of Ransomware via http://www.wired.com
Join us live with Marcus Lemonis at Thought Leaders Arizona on May 24. Seats are limited–secure yours now >> As a digitally active business in 2016, you can’t afford to lose your data. Whether at the hands of a natural disaster, human error, or cyber attack, data loss is…
Link: Why Every Small Business Needs a Backup and Disaster Recovery Plan via http://www.entrepreneur.com
The decision to move to the cloud for businesses looks like a relatively simple one, the promise of increased agility, time to value and cost savings all form part of a well rehearsed sales pitch. While there are numerous benefits, cloud has always suffered with a label of being less secure than …
Link: 5 cloud cyber security tools that will protect your business via http://www.cbronline.com
Many people scoffed in January 2014 when Cisco CEO John Chambers pegged the “Internet of Everything” as a potential $17 trillion market, five to 10 times more impactful on society than the Internet itself. it seems that Chambers’ prediction for the phenomenon more commonly known as the Internet o…
Link: Rethinking security for the Internet of Things via techcrunch.com
Whenever news breaks of a cyber-attack or a data breach, the victim is nearly always a well-known global or multi-national organisation worth billions. This gives the rest of us some pause and to some extent, a false sense of security (if you will excuse the pun), but rarely makes us seriously…
Link: Why small business should prioritise cyber security: Six top tips via http://www.itproportal.com
We’re in the midst of a malware epidemic and social media is prime breeding ground. According to Kaspersky Lab, 310,000 new malicious files are created every day, compared to 200,000 in 2010. These include everything from cyber annoyances for consumers to sophisticated and targeted attacks on cor…
Link: 5 Social Media Security Risks for Businesses (and How to Avoid Them) via blog.hootsuite.com
More than 250 million email usernames and passwords have been breached and are being used by “Russia’s criminal underworld,” according to a Reuters report. . SEE ALSO: Biggest-ever U.data breach hits 100 million people with bank accounts. Hold Security’s Alex Holden, who reported the data breach,…
Link: Millions of email names, passwords hacked in giant data breach, report says via mashable.com