Ransomware

4 Most Dangerous Types of Cyber Attacks

August 1, 2019
Thumbnail image for 4 Most Dangerous Types of Cyber Attacks

Companies of all sizes are, and will continue to be, the targets of cyber attacks. Hackers themselves are becoming more sophisticated, and attacks are getting more difficult to identify and stop. SMBs are particularly vulnerable to these attacks, and a large portion of them end up closing their doors within 6 months of an attack […]

Read the full article →

Ransomware Affiliate Systems Are on the Rise

August 24, 2017
Thumbnail image for Ransomware Affiliate Systems Are on the Rise

Crypto ransomware keeps taking the world by storm. It props a multimillion-dollar underground economy providing cyber-extortionists with abundant resources to fine-tune their modus operandi. Amidst the whole noise surrounding this despicable business model since 2013, the Ransomware-as-a-Service (RaaS) principle is the new black. It renders online extortion increasingly toxic by making ransomware programs readily available […]

Read the full article →

A Lowdown on Modern Online Extortion Tactics

August 24, 2017
Thumbnail image for A Lowdown on Modern Online Extortion Tactics

Although the scourge of ransomware has become synonymous with online extortion over the past several years, things aren’t entirely black and white in this arena of cybercrime. Amidst the noise of ubiquitous ransomware incursions, people started forgetting that Internet-borne blackmail isn’t restricted to file-encrypting malware alone. In fact, perpetrators have plenty of other resources on […]

Read the full article →

How to Protect from Ransomware Cyber Attack

May 24, 2017
Thumbnail image for How to Protect from Ransomware Cyber Attack

A ransomware is a cybercriminal’s best friend. This decade-old malicious software makes hacking computers from different parts of the world a job so easy for these enemies of the law. Usually transmitted through web pop-ups and emails, ransomware can easily access an individual’s private information, and leave a threat that can possibly destroy that person’s […]

Read the full article →

How Ransomware Uses Powershell

February 15, 2017

Fileless Attacks: The Evolution of Ransomware Ransomware continues to produce significant revenue for hackers as consumers and companies move toward complete digital storage — if access to personal documents or key corporate information is suddenly and completely restricted, it’s no surprise victims are willing to pay rather than risk complete data destruction. While hackers typically […]

Read the full article →

2016 is the “Year of Ransomware”… but why? [Infographic]

December 23, 2016
Thumbnail image for 2016 is the “Year of Ransomware”… but why? [Infographic]

Ransomware has rarely been out of the headlines in 2016, as the malicious malware came back with a bang. Ransomware, usually disseminated through email links or attachments, encrypts files on the victim’s computers and demands a ransom for their safe return – hence the name. With a 3,500% increase in attacks in 2016 alone, Ransomware […]

Read the full article →

A Look at the Current Malware Preying on Surfers and How to Prepare

July 5, 2016
Thumbnail image for A Look at the Current Malware Preying on Surfers and How to Prepare

There was a time when average computer users were mostly concerned with sociopathic cyber threats that would erase data and cripple the operating system. Early computer viruses were mostly intended for cyber vandalism; however, the world of malicious software (malware) would eventually evolve into invasion of privacy, data theft, fraud, blackmail, and even extortion. According […]

Read the full article →

New Trojan Horse Could Take Your Internet Connection Hostage

December 3, 2009
Thumbnail image for New Trojan Horse Could Take Your Internet Connection Hostage

The antivirus experts at CA have stumbled upon a new trojan horse in the “ransomware” category. That’s the category for software that will demand a ransom, as the name implies. This Russian trojan horse appears to be a download manager called “uFast Download Manager”. Once you launch it, a message will inform you that you’ve […]

Read the full article →