Menu Close

Articles on Ransomware

Displaying 41 - 60 of 73 articles

Ransomware attacks are becoming increasingly complex, as hackers find creative ways to beat ordinary systems of defence. christiaancolen/flickr

Hackers are now targeting councils and governments, threatening to leak citizen data

A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Many of Baltimore’s city services are crippled by a cyberattack. The Conversation from City of Baltimore and Love Silhouette/Shutterstock.com

Hackers seek ransoms from Baltimore and communities across the US

Ransomware has crippled governments and companies around the world, encrypting data and demanding payment for the decryption key – though that’s no guarantee of recovering the information.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
More cryptocurrencies appear all the time. Wit Olszewski/Shutterstock.com

Are cryptocurrencies a dream come true for cyber-extortionists?

Cybercriminals increasingly depend on e-currencies to profit from their misdeeds. They, and their potential victims, could be driving some of the growth in cryptocurrency markets.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help. Shutterstock/napocska

An ethical hacker can help you beat a malicious one

Simply updating and patching an organisation’s computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
When is it okay for the government to keep a secret? sharpshutter via shutterstock.com

Should spies use secret software vulnerabilities?

What’s the best way for spy agencies to protect the public: secretly exploit software flaws to gather intelligence, or warn the world and avert malicious cyberattacks?

Top contributors

More