Ransomware: Conclusion and useful links

in #hacking7 years ago

We are slowly coming to the end of our file on ransomwares.

As a reminder, we have seen what is the history as well as the different types and vectors of infection of this type of malware.
We also discussed which were the most common ransomwares with their effect on your machine.
Finally, we discussed the methods of pre- and post-infection protection.

However, if this issue is nearing its end, make sure that it is not the end of the ransomwares.
So, as we have mentioned, they are a very profitable business model for cyber criminals.

Let's wait until we see them again with new infection methods or innovative viral loads.
One could, for example, imagine ransomwares uploading your sensitive data on pirate servers before encrypting them on your machine.

Obviously, Infosec experts and antivirus vendors will also find parades, but in any case, the best way to stay safe will be to stay informed.

Coin Marketplace

STEEM 0.19
TRX 0.15
JST 0.029
BTC 63635.72
ETH 2597.20
USDT 1.00
SBD 2.91