27 July 2016
Robert Siciliano

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

730Posts 1,805,996Views 62Comments

Ransomware demands Dollars for Data

21 March 2014  |  1150 views  |  0

“Ransomware” is what holds data hostage by invading one’s computer when the user clicks on a malicious link in an e-mail or downloads an infected attachment. Visiting a fraudulent web site can also trigger an attack.

 

Ransomware then goes to work at putting your files on lockdown so you can’t access them—but the hacker sure can. The crook will then have full access to your computer and all of your private information stored in it.

Ransomware in some cases masquerades as “Anti-Adware” or “Browser Security” claiming that the security product license has expired. Ransomware on Windows shows as a full-screen “error alert” like message. Though ransomware is uncommon, it’s a rising star in the world of malware.

How can you protect your computer from an infection?

  • Ensure your computer is running the most up-to-date version of your chosen operating system.
  • Use updated antivirus software.
  • Never click links in e-mails. Always go to the source or use your password manager.
  • Never go to unfamiliar web sites, as they can initiate the virus cascade.

Keep in mind that although malware and ransomware usually affect PCs running on Windows, malware can be created for any operating system and for mobiles. In fact, Android malware has been picking up steam. But Mac users should not breathe easy; they too, should be on the alert, says the McAfee Threat Report.

The best way to implement protection of your computer and devices is to install a comprehensive measure of security—in addition to sticking to that never-repeated-too-often rule of never click a link in an e-mail.

a member-uploaded image TagsSecurity

Comments: (0)

Comment on this story (membership required)

Latest posts from Robert

32 Million Twitter Pass for sale Add two-factor NOW

21 July 2016  |  2520 views  |  0 comments | recomends Recommends 0 TagsSecurity

Phone Account of FTC Chief Technologist hijacked

14 July 2016  |  2297 views  |  0 comments | recomends Recommends 0 TagsSecurity

Viruses as Cyberweapons for sale

12 July 2016  |  3143 views  |  0 comments | recomends Recommends 0 TagsSecurity

TeamViewer Clients Victims of other Hack Attacks

08 July 2016  |  4299 views  |  0 comments | recomends Recommends 0 TagsSecurity

Can Two-Factor Authentication actually fail?

06 July 2016  |  2638 views  |  0 comments | recomends Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who's commenting on Robert's posts

Raul Thomas
Ketharaman Swaminathan
Lee Mughal
Balasubramaniam Gd
Dirk Kinvig