Tech Talk #46 – March 4, 2017 Ransomware sneaks onto your computer by either tricking you into opening an attachment or by subverting ads on websites you visit. Once on your computer, ransomware modifies your files by creating an encrypted copy of a file and then deleting the original file. It does this to all of your files, and holds them for ransom; you have to pay to get your pictures and documents back.
Tech Talk #40 – December 3, 2016 It’s that time of year again. The internet lets us shop in stores that can be anywhere in the world and the myriad delivery choices can bring our purchases right to our door. It’s convenient, and the transactions themselves are safe and secure. But there are a few things to watch out for while you’re shopping. Ransomware Criminals spread ransomware by adding an infected attachment to an
Tech Talk #30 – July 23, 2016 Ransomware is malicious software that attackers use to encrypt your pictures, documents, and other files for ransom; demanding payment from you to get them back. The ransomware code encrypts files stored on local and network drives using RSA public-key cryptography, with the private key stored on the attacker’s command and control servers. The ransomware then displays a message which offers to decrypt your files after you pay up.