Ransomware is on the rise – there are now more than 50 families of this malware in circulation — and it’s evolving quickly. With each new variant comes better encryption and new features. This is not something you can ignore!
One of the reasons why it is so difficult to find a single solution is because […]
Cybercriminals use a variety of attack methods to deliver ransomware to their victims’ machines. Some of the most frequent include drive-by downloads, malicious URLs embedded in email messages that download ransomware, or attachments to email messages that infect the victims’ systems with ransomware. Often, these infections are the results of phishing attacks.
Intel Security believes that […]
Back-up! Back-up! Back-up! Have a recovery system in place so a ransomware infection can’t destroy your personal data forever. It’s best to create two back-up copies: one to be stored in the cloud (remember to use a service that makes an automatic backup of your files) and one to store physically (portable hard drive, thumb […]