March 13, 2012

Data-napping - Will it Be Your Data Or Your Money?

Two years ago, an infamous script found its way to millions of computers in Russia and Europe. This definite script was known as the Gpcode. Said agenda was created to serve a distinct mission: embed itself into the computer theory of its host computer, find 130 varied file types within the hard disk, have these files encrypted and after doing so, delete the customary files on the drive.

If we would try to look at it closely, the agenda was basically kidnapping the user's data-the victim. And as with any other kidnappers in the real world, the "data-napper" left behind a note.

The note will tell you that your files have been encrypted with some sort of Rsa-1023 algorithm and if you want to have them recovered, you need to buy a decryptor.




This types of agenda or script, known to many as the Gpcoder, is forms part another group of threats that may be found online called ransomware. In this single program, cybercriminals passage money from their unsuspicious victims that flock the entire World Wide Web. This type of attack is not as popular as other schemes as adwares or malwares but year after year, ransomware puts in a handful of its menace online that plagues unwary internet users.

Last year, with the arrival of the popular iPhone, another hacker produced a ransomware that targets the definite users of iPhones. It enters the phone's theory straight through viruses that are spread straight through the phone's wireless capabilities. While it focused on a very small ration of audience, the fact is that people are certainly using this type of attack for their own financial gain.

Being a victim of ransomware is just like being a victim of identity theft. Your data is compromised and you are left at the mercy of the criminal. The two may differ on how you, as a victim is treated, because with identity theft, you never know that your account has already been compromised but with ransomware, you know immediately that you've been victimized.

However, evading identity theft and ransomware follows the same protection measures:

1. Use only customary software. Avoid using cloned or fake software especially for your operating theory because these phony applications often have glitches in them that make them vulnerable to intruder attacks and viruses.

2. Update your protection software regularly. Updated software can decrease the likelihood of you being infected by viruses and other malicious programs because you have your antivirus, anti-spywre and firewall programs in place.

3. If your data gets kidnapped, do not pay the ransom. There are a lot of cases when varied protection clubs are able to crack the encryption that is scrambling your data which can then growth the likelihood of you being able to recover from the attack. The best thing about it is that, oftentimes, the tool is offered for free.

Again, it all boils down to one thing: you have to be very vigilant in protecting your data.

Data-napping - Will it Be Your Data Or Your Money?

Variable Frequency Drive Basics