Ransomware: Even Worse Than the Name Implies

30 Aug

The term “ransom” has been around for hundreds of years and is best described as a way to redeem someone from captivity, bondage, detention, etc., by paying a demanded price.

Today, we have another destructive variation of the word ransom — that is “ransomware.” What is it and what can we do about it?

TechRepublic recently produced Ransomware: The Smart Person’s Guide, written by James Sanders. This is an executive summary quoted from the guide:

  • What is it? Ransomware is malware. The hackers demand payment, often via Bitcoin or prepaid credit card, from victims in order to regain access to an infected device and the data stored on it.
  • Why does it matter? Because of the ease of deploying ransomware, criminal organizations are increasingly relying on such attacks to generate profits.
  • Who does this affect? While home users have traditionally been the targets, healthcare and the public sector have been targeted with increasing frequency. Enterprises are more likely to have deep pockets from which to extract a ransom.
  • When is this happening? Ransomware has been an active and ongoing threat since September 2013.
  • How do I protect myself from a ransomware attack? A variety of tools developed in collaboration with law enforcement and security firms are available to decrypt your computer.

Sanders adds: “For those who have been infected, the No More Ransom project — a collaboration between Europol, the Dutch National Police, Kaspersky Lab, and Intel Security — provides decryption tools for many widespread ransomware types.


 
Here are a couple of informative infographics by LogRhythm:



 

6 Responses to “Ransomware: Even Worse Than the Name Implies”

  1. Ely Levy September 7, 2016 at 10:56 pm #

    The phenomenon of video games becoming more lifelike has fascinated me for over a decade. Now, with the emergence of virtual reality it seems that this trend will only continue until there is little distinction between virtual reality and base reality. It’s rather creepy that hackers have found a way to mimic a crime that has been used in the absence of anything electronic for hundreds of years. In the age that gives criminals an entirely new platform upon which to commit crimes, society should anticipate and prepare counter measures to never before seen crimes.

Trackbacks/Pingbacks

  1. Ransomware: Even Worse Than the Name Implies | ... - August 30, 2016

    […] Today, we have another destructive variation of the word ransom — that is “ransomware.” What is it and what can we do about it?  […]

  2. Not Trying to Keep Scaring You About Online Security, But … | Evans on Marketing - November 30, 2016

    […] to protect yourself better online. That’s why we we’ve posted several tips, such as: 1, 2, 3 (a short video quiz),  and 4 (video […]

  3. Ransomware: A NOT So Humorous Look | Evans on Marketing - February 15, 2017

    […] As we’ve reported before, the ransomware threat has many negative effects. Ransomware “is malware. The hackers demand payment, often via Bitcoin or prepaid credit card, from victims in order to regain access to an infected device and the data stored on it.” [Ransomware: The Smart Person’s Guide, by James Sanders] […]

  4. Ransomware Now a BIGGER Problem — What Can YOU Do? | Evans on Marketing - May 15, 2017

    […] times before about the devastating results caused by ransomware hacking (see, for example, 1, 2, 3). “Ransomware is malware. The hackers demand payment, often via Bitcoin or prepaid credit […]

  5. Beware of Ranswomware — and Be Better Prepared | Retailing: From A to Z by Joel Evans - May 16, 2017

    […] times before about the devastating results caused by ransomware hacking (see, for example, 1, 2, 3). “Ransomware is malware. The hackers demand payment, often via Bitcoin or prepaid credit […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: