Skip to main content

What is virus ransom and How do you reduce your risk of him?


What is virus ransom?
What is virus ransom?

What is virus ransom?

Is a malicious program that affects smartphones and computers, encrypts and locks their data so that it can not be accessed until after payment is made.

How can a ransom virus penetrate you?

1. A message or link from an anonymous person arrives, and the content of the link is a file containing malicious software.

2. The sender is tempted by the victim to download the file through his or her deceit as an important or personal file.

3. The user uploads the file to his or her smartphone.

4. The virus encrypts important data in the device or encrypts the entire device, so that the user can not access his data.

5. The offender asks the victim for a "ransom" money in exchange for the decoding of the data and returning it to its nature.

How do you reduce your risk of the virus?

- Make sure to backup your device data constantly, to recover it if you are infected with the virus.

- Avoid opening links from unknown sources, and do not upload files sent by anonymous people via e-mail.

- Use anti-virus software and be original and non-mimic, and update it constantly

- Update the operating system of your phone and PC continuously, and be sure to update the software in it.

- Avoid access to suspicious sites

Be sure to download software and applications from their official sources and avoid pirated programs

What to do if your computer gets infected with the virus

- Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

What do you do if your computer gets infected with the virus?

• Avoid obeying them. If you pay the required amount, they will continue to extort and ask for more money.

• If the affected device is affiliated to your organization, inform the IT department directly.

• If the affected device is your personal computer, take it to the authorized dealer for repair

• If the affected device is affiliated to your organization, inform the IT department directly.

• Stop operations in the device or network directly and restore the backup.

Comments

Popular posts from this blog

Nokia reportedly plans a return to smartphones in 2016

Nokia is planning to make a comeback and return to making phones in 2016. That's according to personnel familiar with company plans, who reveal that releasing Android tablets under the brand simply isn't enough. Nokia reportedly plans a return to smartphones in 2016  Nokia reportedly plans a return to smartphones in 2016  With the introduction of the Nokia 2016 has become a company with freedom, where officially ended item that was part of Microsoft's takeover deal, which prevents the company from the competition in the mobile phone market and the issuance of phones under the brand Nokia the day before 12.31.2015. Nokia reportedly plans a return to smartphones in 2016  On the ground for the return of Nokia phones market was waiting and leaks that began to appear in the days abound and the days to come naturally to one of the most prestigious companies in the mobile industry. Nokia reportedly plans a return to smartphones in 2016  Today featur...

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria.

Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. Microsoft decided 4.7 million device at least from personal computers infected with malware developers prepared and published in Kuwait and Algeria. These victims do not realize they are infected currently  Char that "the editing process" is the most successful of the last century between the operations carried out by the Digital Crimes Unit at Microsoft so far depending on the number of infected machines that could be identified.  Microsoft has identified personal devices infected by intercepting communication with hardware servers in the company, "Vitaloerks" Web Solutions, based in Reno, Nevada.  Vitaloerks criticized the way in which Microsoft has d...

The confessions economic killer "John Perkins" US intelligence agent CIA

Part of the confessions economic killer "John Perkins" US intelligence agent CIA  the confessions economic killer "John Perkins" US intelligence agent CIA Speaking about the history of economic killer project within the corridors of the CIA .. and the steps involved to control the states .. He says: Stages of that plan: start sending men from US intelligence agents as businessmen to the States to be economically occupation Vtkhadda governments then supported on huge projects that State resources, but these projects aims mainly to download a huge state debt and the country's economy collapse and default on those debt .. And then suppose we Americans are our conditions .. First that allow us to build military bases on their territory or send their army to serve us in our battles such as Iraq, Afghanistan or vote for us in the United Nations or sell for our companies American resources such as electricity companies, water and possible also sell us their sch...