The frequency of ransomware attacks exploded between 2016 and 2017, and there’s no sign that they’re just going to disappear any time soon. Quite the opposite, actually: hackers are designing even more complex attacks that are harder to identify and remove. Use this information to understand how they work and avoid them.
The outbreak of the ransomware, known as WannaCry, has quickly become one of the worst cyberattacks in recent memory. On Friday, May 12, 2017, it began infecting thousands upon thousands of computers around the globe, destroying countless files in the process. Here’s everything we know about the WannaCry ransomware attack so far.
A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware and ransomware were created. This time, we’re going to strictly discuss the world’s most horrifying computer bugs.
Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.
Recently, we wrote a blog defining ransomware and detailing the threat it poses to the cybersecurity of businesses. After learning about it, most people seek out ransomware prevention methods to avoid falling victim to the dreaded form of malware. With these simple tips, you can foil cybercriminals’ plans to hold your data hostage.
Viruses like Locky and CryptoWall are plaguing the Internet. These malicious cyber-infections are known as ransomware. But, what is ransomware, exactly? And, perhaps more importantly, why should you be concerned? In this blog post, TCI explains.
While its name sounds kind of silly, the Locky Virus has been one of the most active and dangerous malwares of 2016. One of the latest examples of ransomware, Locky essentially holds your files hostage by encrypting them. It then prompts you to pay Bitcoins to recover your files, similarly to CryptoWall.