01 April 2015

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

573Posts 1,428,913Views 60Comments

Ransomware demands Dollars for Data

21 March 2014  |  1007 views  |  0

“Ransomware” is what holds data hostage by invading one’s computer when the user clicks on a malicious link in an e-mail or downloads an infected attachment. Visiting a fraudulent web site can also trigger an attack.

 

Ransomware then goes to work at putting your files on lockdown so you can’t access them—but the hacker sure can. The crook will then have full access to your computer and all of your private information stored in it.

Ransomware in some cases masquerades as “Anti-Adware” or “Browser Security” claiming that the security product license has expired. Ransomware on Windows shows as a full-screen “error alert” like message. Though ransomware is uncommon, it’s a rising star in the world of malware.

How can you protect your computer from an infection?

  • Ensure your computer is running the most up-to-date version of your chosen operating system.
  • Use updated antivirus software.
  • Never click links in e-mails. Always go to the source or use your password manager.
  • Never go to unfamiliar web sites, as they can initiate the virus cascade.

Keep in mind that although malware and ransomware usually affect PCs running on Windows, malware can be created for any operating system and for mobiles. In fact, Android malware has been picking up steam. But Mac users should not breathe easy; they too, should be on the alert, says the McAfee Threat Report.

The best way to implement protection of your computer and devices is to install a comprehensive measure of security—in addition to sticking to that never-repeated-too-often rule of never click a link in an e-mail.

TagsSecurity

Comments: (0)

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

What is a Potentially Unwanted Program

6 minutes ago  |  19 views  |  0  |  Recommends 0 TagsSecurity

Sheriff’s office offers Home Security Tips

28 March 2015  |  479 views  |  0  |  Recommends 0 TagsSecurity

Hackers for Hire both Good and Bad

26 March 2015  |  1827 views  |  0  |  Recommends 0 TagsSecurity

Everyone is vulnerable to Attack

25 March 2015  |  1198 views  |  1  |  Recommends 0 TagsSecurity

Password Security vulnerable to Trickery

24 March 2015  |  454 views  |  0  |  Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who's commenting on Robert's posts

Bjorn Soland
Prasenjit Das
John Serocold
Ketharaman Swaminathan
Charmaine Oak
Iain Montgomery
Otmane EL RHAZI
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott
Paul Love