Ransomware

Tech Talk #155–June 5, 2021 Ransomware is one of the biggest and fastest-growing threats online. 2020 saw a massive spike in ransomware attacks and the amount of money paid out to criminals. Quick refresher: Ransomware is malware or malicious software. Malware can damage your computer or your files. Computer viruses, worms, trojan horses, and spyware are all considered malware. I think any program that advertises itself as free and then makes you pay for it

Ransomware – what is it and how do you protect yourself against it?

Tech Talk #55 – July 8, 2017   Ransomware – what is it and how do you protect yourself against it?   We’ve heard and read the word ransomware a lot lately, but what is it and how can you protect yourself against it?   Ransomware is a form of malware or malicious software.   Malware is software designed to damage or do not-so-nice things to your computer. Computer viruses, worms, trojan horses, and spyware

Protect your computer against Ransomware

Tech Talk #46 – March 4, 2017 Ransomware sneaks onto your computer by either tricking you into opening an attachment or by subverting ads on websites you visit.   Once on your computer, ransomware modifies your files by creating an encrypted copy of a file and then deleting the original file. It does this to all of your files, and holds them for ransom; you have to pay to get your pictures and documents back.

Holiday shopping security

Tech Talk #40 – December 3, 2016 It’s that time of year again. The internet lets us shop in stores that can be anywhere in the world and the myriad delivery choices can bring our purchases right to our door. It’s convenient, and the transactions themselves are safe and secure. But there are a few things to watch out for while you’re shopping.   Ransomware Criminals spread ransomware by adding an infected attachment to an

Ransomware – what it is and how to protect yourself from it

Tech Talk #30 – July 23, 2016 Ransomware is malicious software that attackers use to encrypt your pictures, documents, and other files for ransom; demanding payment from you to get them back.   The ransomware code encrypts files stored on local and network drives using RSA public-key cryptography, with the private key stored on the attacker’s command and control servers. The ransomware then displays a message which offers to decrypt your files after you pay up.