As devious as this method may seem, there is a simple way that you can protect yourself from this attack: enabling Google’s “two-factor authentication system”.
Usually, it is not the ransom itself, but business downtime and other consequences that will really disturb your business. Paying the possible ransom will of course hurt. But what will probably hurt more are the other repercussions to your business from a successful ransomware attack.
DNSChanger Malware that targets computers are rather common but malware that targets routers are a completely different thing. Researchers from the security firm Proofpoint have discovered that the way it operates is similar to the recently discovered Stegano malware.
Yahoo has admitted that it was hit with the world’s largest ever cyber attack involving a breach of customer data. The historic hack, which occurred in 2013, could have resulted in the company losing the personal details and passwords of one billion accounts, it admitted.
Microsoft has announced that the next major update to Windows 10 will run its Edge browser in a lightweight virtual machine. Running the update in a virtual machine will make exploiting the browser and attacking the operating system or compromising user data more challenging.