How to respond to ransomware threats

Image by ThinkStock
Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.
To read this article in full or to leave a comment, please click here
Read more: How to respond to ransomware threats
Story added 15. March 2016, content source with full text you can find at link above.
More antivirus and malware news?
- Demystifying Blockchain: Sifting Through Benefits, Examples and Choices
- Malvertising Campaign Hits Top Global Websites
- Researchers Release Patch for NSA-linked "EsteemAudit" Exploit
- Resolved: AIS currently experiencing problems with all COM\’s (acom,bcom,ccom, tcom,pcom)
- New York Times Suffers Redaction Failure, Exposes Name Of NSA Agent And Targeted Network In Uploaded PDF
- ‘Routine’ demands for encrypted data go far beyond Apple, raising questions
- Singapore must mind the cracks in 2016
- CVE-2016-6662 Advisory: Recent MySQL Code Execution/Privilege Escalation Zero-Day Vulnerability
- How to Protect Yourself From Identity Theft After a Data Breach
- New anti-terrorism unit will tackle extremist content on the web