How You Can Protect Yourself From Being A Victim Of Ransomware

If you have never heard of ransomware before, it usually is lurking in e-mails or pop-ups and will require the user to pay a ransom to unlock their computer. More than 200,000 Windows computers have been affected during this global cyber attack spanning across several nations including Britain, Germany, South Korea, Japan, and China. Cybercriminals have placed colleges, hospitals, blue-chip companies, and retail operations high on their list of attacks. These types of attacks have had companies scrambling to keep up with new safeguards to place on their businesses.

This is just not a problem for the individual, these attacks are of great concern to the largest corporations and governments. It is essential to use the utmost of caution while online to protect yourself from the malware that will place you in the middle of these online battles. The following are a series of steps you can do to further protect yourself.

It is believed that the overall attack was due to people downloading a program known as WannaCry through their email. Once the malicious code has entered into one computer it can easily infect others through the Windows file sharing feature. This is why Mac and non-Windows users were not affected by this attack. The truth about this attack was it could have been prevented before it ever began. Microsoft had created a path for WannaCry well beore the malware was introduced into systems.

However, people fail to update their machines and miss these essential security updates. It is important that people are vigilant with their computers and always keep them updated. To make it all hands off, Windows users can have their machines automatically download and update all software updates. While WannaCry targeted Windows users, there is no denying that Mac and Linux users will be targeted in the future. There are new breeds of viruses always being developed to target various operating systems. With this in mind, all users should keep their systems up to date.

Antivirus Software Is Essential – While keeping your operating system up to date is important, you also need a good antivirus software installed on the system. It is estimated that 30% of antivirus programs on the market have the ability to detect and neutralize ransomware. The same is going to hold true for anti-virus programs, they need to be updated constantly to detect new threats and eliminate them. One highly reputable program is Norton Antivirus ,we use it and recommend it to all our clients , for more information visit Norton and when ready to purchase see this coupons site for a list of all the product and pricing specials available.

If you have no backups and your files are essential, you may be forced to pay the ransom due to some of the more serious ransomware programs. However, there is no need to do so with WannaCry. It looks as though the hackers have been overwhelmed with requests from users asking to release their system, but they have never heard back.Use the tips from this article to update your operating system and install a reputable antivirus program to keep your computer and files safe. New threats are being released everyday, but you can protect yourself.


The World of Faceless Criminals

According to Webopedia, cybercrime refers to any criminal act that is done using computers and networks. This also includes crimes done over the internet for example cyber bullying or credit card account thefts.

deep-webCyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

Sourced from:http://www.webopedia.com/TERM/C/cyber_crime.html

What kind of a person is a cyber-criminal? A cybercriminal is faceless thanks to the internet. They can be anyone and can act from anywhere so long as they have a communications device that can access the internet. But this kind of person has some type of characteristics behind the mask.

The typical cybercriminal

What does profiling tell us about the “typical” cybercriminal – the person who uses computers and networks to commit crimes? There are always exceptions, but most cybercriminals display some or most of the following characteristics:

Some measure of technical knowledge (ranging from “script kiddies” who use others’ malicious code to very talented hackers).

Disregard for the law or rationalizations about why particular laws are invalid or should not apply to them.

High tolerance for risk or need for “thrill factor.”

“Control freak” nature, enjoyment in manipulating or “outsmarting” others.

A motive for committing the crime – monetary gain, strong emotions, political or religious beliefs, sexual impulses, or even just boredom or the desire for “a little fun.”

Sourced from:http://www.techrepublic.com/blog/it-security/profiling-and-categorizing-cybercriminals/

In the past a criminal had to go through your trash or steal your mail. Nowadays thanks to the internet everyone’s information is found online. All the criminals need to do is trick you to give it to them. These guys means business. They are organized and work as a team in order to dupe many people as possible.

Most cyber-crimes are committed by individuals or small groups. However, large organized crime groups also take advantage of the Internet. These “professional” criminals find new ways to commit old crimes, treating cybercrime like a business and forming global criminal communities.

Criminal communities share strategies and tools and can combine forces to launch coordinated attacks. They even have an underground marketplace where cyber criminals can buy and sell stolen information and identities.

It’s very difficult to crack down on cyber criminals because the Internet makes it easier for people to do things anonymously and from any location on the globe. Many computers used in cyber attacks have actually been hacked and are being controlled by someone far away. Crime laws are different in every country too, which can make things really complicated when a criminal launches an attack in another country.

Sourced from:http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/operate.html

Cybercriminals are now changing tactics. They are holding your computer at ransom. You do not have control of your computer until you pay the amount of money that they are demanding. They do this when you download something.

“Taking advantage of people’s desire to get a good deal, cybercriminals are bundling malware with free programs and free software packages that can be downloaded online,” Raines explained. “For example, a typical scenario is someone that has a file they downloaded from a website that they can’t open, because they don’t appear to have the right software installed to open it. As a result, they search online and come across a free software download that might help them open the file. The free download also comes with other add-ons. In addition to what the person thought they were getting, the download also installs malware.”

“For cybercriminals looking to make a quick buck, this is an increasingly alluring tactic,” Raines said. “The concept is simple: cybercriminals digitally hijack a person’s machine and hold it for ransom; refusing to return control of it or their files until the victim pays a fee. In many cases, control of the computer or files is never returned to the victim, causing them to lose valuable data, pictures, movies, music, etc.”

That malware may be installed immediately, or at a later date, as it assesses the victim computer’s profile. It could be months or even years before the victim notices the infection, as often these malicious items operate behind the scenes with the only visible effect being slower performance on the system that was infected.

Sourced from:http://www.infosecurity-magazine.com/news/cybercriminals-switch-up-tactics-to-embrace/