Fri, May 26 2017, 6:43 pm

F-Secure comes out with 5 tips to beat Ransomware attacks

By Digital Edge Bureau, 26.03.2017, 15:19
 
Ransomware_1

F-Secure comes out with golden tips for thwaring Ramsomware attacks

Imagine losing all the photos, videos, messages, and documents you’ve stored on your computer. How much money would you be willing to pay to get it all back? Ransomware is malware that infects your computer, locks it, and demands payment for unlocking it. And the number of new ransomware has been at least doubling each year since 2013.
So, here’s F-Secure’s quick guide to ransomware – what it’s all about, and five top tips on how you can prevent becoming a victim of ransomware.

What does ransomware do?
Crypto-ransomware encrypts the files on a computer, essentially scrambling the contents of the file so that you can’t access it without a decryption key that can correctly unscramble it. A ransom is demanded in exchange for the decryption key. Once the malware has infected one computer, it can spread to others in the network, making it impossible to carry out normal operations. The ransom fee is usually around $300 to $500 for a computer, and payment is often demanded in Bitcoins, a virtual currency that is difficult to trace.

How can ransomware infect your computer?
You may encounter ransomware in a number of ways: as email attachments, malicious links, or via exploit kits. You can be exposed to exploit kits when you visit a compromised website, click a compromised AD on an otherwise good website or you are redirected onto a malicious site. The exploit kit tests your computer for any exploitable flaws or vulnerabilities, which are common in outdated software. If it finds an opening, the exploit kit downloads and installs the ransomware onto your machine. This can happen completely without your knowledge.

How can you get your files back?
F-Secure advises against paying the ransom. While doing so is one way to regain control of your computer and data, the real remediation begins before you ever get hit – by taking regular backups. That way, if you do get attacked, you can relax – and restore everything from the backups. Furthermore, even though most ransomware has returned control, this may not always be the case. You may end up paying and still being left without control.
If your files have been hijacked and you don’t have backups, it’s worth going online and seeing if there is a decryption tool for the ransomware that you’ve been hit with. This list is a good start, although decryption tools are typically only available for early versions. And keep in mind that attackers update their approach and use ransomware that doesn’t have a decryption tool available.The only way to truly beat ransomware is to never be infected by it.

F-SECURE’S TOP FIVE TIPS
I
-Make sure you’re running a robust security solution that covers all your devices (PCs, Macs, smartphones, and tablets) and provides protection. F-Secure SAFE protects against all the known ransomware threats that are out there, and it can block brand new zero-day threats as well. As new ransomware variants keep popping up lately, this is important.

II-Take regular backups of your data. Store the backups offline, so that they can’t get infected. And test restoring them from time to time to make sure that they really work. With good backups, if you do get hit, you can get back on your feet faster without having to fork over cash to the criminals.

III-Keep the software on all your devices up to date to prevent exploits. If you are uncertain how to keep everything up-to-date, you may consider utilizing a tool that identifies old software versions and suggests updates.

IV-Be extra careful with email attachments, especially with ZIP files and Office documents (Word, Excel, and PowerPoint). Don’t open email attachments that are sent by someone you don’t know. Also disable macro scripts from any Office files you receive via email.

V-Limit the use of browser plugins. Disable commonly exploited ones such as Flash Player and Silverlight when you’re not using them. You can do this through your web browser under the plugin settings.

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:


× 4 = twelve

Other articlesgo to homepage

Brand McAfee makes come-back, brings threats report

Brand McAfee makes come-back, brings threats report(0)

Intel Security, which disowned the brand McAfee sometimes ago, has shown amazing altruism towards it. In a latest development, Intel Security has resurrected the brand McAfee. Now, Intel Security is known as McAfee. This rechristening of the brand is marked by a ‘near simultaneous’ release of the ‘McAfee Labs Threats Report’ for the Q4 2016.

74% CISOs in US don’t know how their firms got hacked

74% CISOs in US don’t know how their firms got hacked(0)

BD Software Distribution (BD Software), the Country Partner for Bitdefender in India, has announced intriguing results of Bitdefender Survey of 250 IT decision makers in the United States. The study on large US companies with more than 1,000 workstations reaffirms the rising pressure of rising cyber breaches on CIOs. The survey reveals that some 34

Ebullient Skybox vows to help firms meet NCIIPC guidelines

Ebullient Skybox vows to help firms meet NCIIPC guidelines(0)

In the field of security vulnerability and threat management, US-based Skybox has seen a meteoric rise in the Indian market which gets manifested in a whopping 154 percent revenue growth the company has accrued in this digitally transforming country. The company also comes forward to help firms and organizations in meeting the security guidelines put

Kaspersky’s solutions secure SCADA and PLC systems

Kaspersky’s solutions secure SCADA and PLC systems(0)

They say, anything which is programmable, is hackable. And this is not only true for the world of information technology (IT), even operational technology (OT), which runs, controls and supervises new-age industrial processes, faces  cyber-attacks with potential for disrupting normal functioning of plants and manufacturing units. In some cases cyber-attacks can physically sabotage the targeted

F-Secure India vows to protect entities post demonetization

F-Secure India vows to protect entities post demonetization(0)

F-Secure, the Finnish software security company, which has got rapid movement and high visibility in the Indian market in recent times—ever since Amit Nath, the former Head of Trend Micro India, took over the helm of it in this part of the world—comes forward and vows to protect both consumers as well as firms and

read more
banner

Contacts and information

New Delhi (India)

Social networks

Most popular categories