Ransomware is one of the fastest growing classes of malicious software. Attackers don’t even have to bother stealing and selling the data you or your business relies on – they just encrypt it and demand a ransom. Ransomware has evolved from simple screenblockers demanding payment to a huge wave of far more dangerous software: you can’t afford to leave any stone unturned in the fight against crypto-locker attacks. This white paper examines the most effective methods of mitigating the risks posed by crypto-malware, including the effectiveness of host-based and server-based approaches, alone and in combination . Learn how you can avoid helping to fund cybercrime through ransom payments which feed the industry and prompt the creation of even more malicious software.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond