As its name suggests, ransomware is a class of malicious software that infects and restricts access to your computer until a payment is made. The method of infection is similar to that of phishing attacks and spreads through compromised websites and email containing malicious attachments or links. The key difference is ransomware is more overt and confronts you shortly after you've been compromised.

Over time, the attacks have evolved to become more sophisticated, incorporating techniques such as software encryption, electronic currencies and anonymized routing to help the criminals who operate ransomware campaigns evade detection. Here are a few notable examples:

» Reveton creates a fake notification posing as the FBI, your local police department or other law enforcement agency, claiming that pirated software or child pornography was detected on your system. The warning persists, even after restarting, until the fine is collected via an online payment. Enough complaints were generated for the FBI to issue a formal warning about the ransomware. Discovered in 2011, Reveton first attacked PCs but now targets Macs and Android devices as well.

» CryptoLocker would search for files on local and network drives, encrypting any documents, spreadsheets and pictures it could find. Victims were typically given 72 hours to pay several hundred dollars or the ransom price would increase by five times. First appearing in 2013, CryptoLocker peaked in dominance in 2014 before an international effort named Operation Tovar succeeded in shutting down its distribution later that year. Subsequently, security firms Fox-IT and FireEye jointly set up a site to allow some victims to decrypt their files. Several clones arose, with CryptoWall becoming the most dominant successor.

» CTB-Locker behaves similarly to CryptoLocker but adds a little twist by granting you the ability to decrypt a small selection of files to reassure you the rest of your files are only a few hundred dollars away.

» First seen this year is TeslaCrypt. It differentiates itself from other ransomware by heavily targeting gamers. It searches for more than 180 file extensions that focus on files for your games, including maps, mods, profiles and saves.

The general recommendation when you are infected with ransomware is to not pay the ransom. However, without a good backup, many users are left with little recourse. Impact to businesses can be more severe as a single rogue computer can encrypt your entire file server.

Prevention is the key to defending yourself against ransomware. Update your computer software and be wary of opening suspicious files or links. Most important, back up your important data and keep a copy safely stored away from your computer.

Vincent Hoang is an enterprise architect at Hawaiian Telcom, a Certified Information Systems Security Professional (CISSP), GSNA Systems and Network Auditor (GSNA) and Cisco Certified Network Professional (CCNP). Reach him at  This e-mail address is being protected from spambots. You need JavaScript enabled to view it .

Source: StarAdvertiser

poularizing-contentContent promotion is something that a lot of people seem to struggle with but I’m here to tell you today that it doesn’t have to be difficult or challenging, even when you haven’t done it before.

There are a series of steps that you can follow that will give you a huge head start, even over those that have been doing this for longer than you.

Before I dive right into this guide and go through all of the ways that you can make this easy, I need to tell you about the mistakes that you need to avoid:


Facebook_Graph_Search_1"Pictures of my friends in 2009 taken in Lisbon, Portugal". "Friends that live nearby who like sushi and watching How I Met Your Mother". "Single women who live near me".  These are the types of queries that Facebook's just-announced Graph Search will be able to parse.

Cool, creepy, revealing, or useful? Graph Search gives a new, powerful reason for why we put so much data onto Facebook. Why share so much if it's not discoverable by others after all?


7_Developr_B_430x380Considering a new website for your business? If you’re relying on just a website developer, it could be anything but smooth sailing ahead.

Before you start down the wrong (or least expensive) path, it might be reasonable to consider a few essential objectives for your website. 

For example, if you want prospects to really understand what you do, the value you provide and how you do it, your website’s going to have to do a lot more than just be pretty with functioning links.


Timeline: A Shocking Turn Of Events

January 13, 2012 - In an incredible turn of events, six Republican Senators have asked Majority Leader Harry Reid not to hold a vote on PIPA (The Protect IP Act), and the Senate version of SOPA. The Protect IP Act (Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011 or PIPA), also known as Senate Bill 968 or SB968, is a re-write of the Combating Online Infringement and Counterfeits Act (COICA), which failed to pass in 2010.


More Articles...

Who's Online

We have 13 guests online

Specialty Hosting

  • Joomla Web Hosting Joomla Web Hosting
    Joomla is a free and open-source content management system (CMS) that powers ~2.7% of web sites on the ‘net.
  • Wiki Web Hosting Wiki Web Hosting
    Wiki's are perfect for user generated content, and knowledge bases.
  • WordPress Web Hosting WordPress Web Hosting
    WordPress is an award-winning blog platform that we recommend for blogging.
We understand you do not want to pay an extortionate data recovery charge, so we are here to provide you with a cheaper alternative! If you can't find the board you need here, email us at info@onepcbsolution.com. We'll try our best to find one for you.