02 October 2014

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

514 | posts 1,313,803 | views 59 | comments

Ransomware demands Dollars for Data

21 March 2014  |  933 views  |  0

“Ransomware” is what holds data hostage by invading one’s computer when the user clicks on a malicious link in an e-mail or downloads an infected attachment. Visiting a fraudulent web site can also trigger an attack.

 

Ransomware then goes to work at putting your files on lockdown so you can’t access them—but the hacker sure can. The crook will then have full access to your computer and all of your private information stored in it.

Ransomware in some cases masquerades as “Anti-Adware” or “Browser Security” claiming that the security product license has expired. Ransomware on Windows shows as a full-screen “error alert” like message. Though ransomware is uncommon, it’s a rising star in the world of malware.

How can you protect your computer from an infection?

  • Ensure your computer is running the most up-to-date version of your chosen operating system.
  • Use updated antivirus software.
  • Never click links in e-mails. Always go to the source or use your password manager.
  • Never go to unfamiliar web sites, as they can initiate the virus cascade.

Keep in mind that although malware and ransomware usually affect PCs running on Windows, malware can be created for any operating system and for mobiles. In fact, Android malware has been picking up steam. But Mac users should not breathe easy; they too, should be on the alert, says the McAfee Threat Report.

The best way to implement protection of your computer and devices is to install a comprehensive measure of security—in addition to sticking to that never-repeated-too-often rule of never click a link in an e-mail.

TagsSecurity

Comments: (0)

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

Identity thieves bombarding Call Centers

25 September 2014  |  788 views  |  0  |  Recommends 0 TagsSecurity

What to do in the Aftermath of an Attack

23 September 2014  |  939 views  |  0  |  Recommends 0 TagsSecurity

10 most dangerous Facebook Scams

20 September 2014  |  1729 views  |  1  |  Recommends 0 TagsSecurity

Is private NSA proof E-mail possible?

18 September 2014  |  821 views  |  0  |  Recommends 0 TagsSecurity

Identity proofing proves who You are

16 September 2014  |  1549 views  |  0  |  Recommends 0 TagsSecurity
name

Robert Siciliano

job title

Security Analyst

company name

IDTheftSecurity.com

member since

2010

location

Boston

Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations througho...

Robert's expertise

Who is commenting on Robert's posts

Otmane EL RHAZI
Ketharaman Swaminathan
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Spyindiavimlesh kumar
Paul Love
Mike McCormack