Previous Page  10 / 44 Next Page
Information
Show Menu
Previous Page 10 / 44 Next Page
Page Background

What is Ransomware?

Computer viruses have been around since before

the Internet, even before personal computers

were available. In 1990 the term

malware

(or

malicious software) was coined, to describe “

any

software used to disrupt computer operations,

gather sensitive information, gain access to

private computer systems, or display unwanted

advertising.

As hardware and software have evolved, so has

malware.

Viruses and other forms of malware had primarily

been disruptive, annoying and sometimes

destructive. Roughly 10 years ago, we saw the rise

of another form of malware surface, ransomware.

Luring people to activate this type of malware on a

computer has become a revenue generator.

The most common method is to encrypt a

computer’s files, rendering them unusable. In

order to decrypt the files, the victim must use a

decryption key, and unfortunately, only the malware

operator has this pricey solution.

Ransomware typically targets a user’s documents,

spreadsheets, photographs, videos, and music

without affecting the operation of the computer.

Generally the user is given a deadline, to heighten

the urgency, after which their files will be

unrecoverable.

How did I get attacked?

Ransomware is commonly delivered through email

messages that include a link to a website or a file

Ransomware is a type of malware (malicious

software) that infects a user’s computer in a

way that essentially holds the victim’s files

hostage until a ransom is paid.

attachment. When the user clicks on either the

link or attachment, malware is inadvertently

downloaded. A less common delivery method for

ransomware is referred to as a “drive-by infection.”

This method can infect your computer by simply

visiting a website that contains malicious code or

nefarious advertisement.

Once installed, the malware goes to work

encrypting every file on the user’s computer, every

attached device, and potentially on other network

connected devices.

Prepare For

RANSOMWARE

10