20 cities in Texas were hit by a coordinated ransomware attack

20 cities in Texas were hit by a coordinated ransomware attack

Twenty Texas local governments have been hit by a coordinated ransomware attack, the Information Resources Department announced Friday ...
Read More

Binance compensates the hacker who hacked it!

Binance, the cryptocurrency exchange company, intends to compensate the white hat hacker who breached his domain name and ...
Read More

The hacker who invaded Capital One has hacked other 30 companies

Further investigation into Paige A. Thompson, the hacker accused of causing data breach on Capital One, showed ...
Read More

Instantly update Windows 10 users. Critical vulnerabilities identified!

Microsoft warns Windows 10 users to update their operating system immediately because of two critical vulnerabilities. OR...
Read More

European Central Bank hacked!

The European Central Bank (ECB) closed one of its websites on Thursday after being hacked and infected by a hacker ...
Read More
Latest Posts

Ransomware Attacks: 7 Tips on How to Avoid Them!


In recent years one of the most common hacking attacks are ransomware. In these attacks, hackers use malware, which encrypts them data of victims, so that the latter cannot access them. Then ask ransom, in order to restore the encrypted archives.

As with other malware, ransomware infiltrates victim systems in various ways. They can use vulnerabilities, which have been identified in systems or yes cheat users and get them to install ransomware without them knowing.

Most of the time, ransomware attacks target large companies, hospitals, schools, police departments and other "high profile" goals. However, there has been a recent increase in attacks targeting home computers.

Ransomware attacks have been proven very profitable for them Criminals. We hear about a new attack almost every day. This also results in increased police operations and investigations to identify and restrain criminals.

In most cases companies and companies organizations fall victim to ransomware attacks due to bad employee protection practices.

What to do and not do if you fall victim to ransomware attack?

Let's first see what you shouldn't do:

  1. Do not pay ransom. When you pay for ransom, you substantially increase ransomware attacks. As they are hackers they see you bowing and making a profit themselves, they continue to attack other people and companies. Moreover, even if you give the money, you are not sure that you will recover your files.
  2. Don't give it personal information when you reply to emails, on phones and text messages. Criminals are trying to deceive officials into installing malware or stealing information. Make sure you communicate with your IT department if you or your partners receive suspicious calls or messages.

What to do:

  1. Keep backups of all your filesso that in case something happens you can access it.
  2. Use a reliable antivirus software and one firewall. Use them as well as update them if you want to stay safe from ransomware and other attacks.
  3. You use scanning and filtering content on your mail servers. Your inbound emails will have to be scanned to identify any known ones threatening and block any email that is considered dangerous.
  4. Make sure all your systems and software are installed latest versions of updates. Regular updates are necessary to prevent a virus infection.
  5. When traveling, update your IT department, especially if you are going to use public Wi-Fi. Use a trusted VPN when accessing the public Wi-Fi.

As we said above, hackers are no longer targeting only large organizations, but also small and medium-sized ones businesses and home systems. However, the above steps and a good education of officials and ordinary users can help to prevent such attacks.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *