Syndicated

There’s almost nothing worse for tech support staff than a call from a staffer wailing ‘I’ve been hit by a virus.’

Especially if it’s ransomware known by the name Cryptolocker, which demands users pay a fee or their files will be destroyed in days.

What can be done? In this thorough article, consultant Jonathan Hassell goes through ways organizations can prevent a Cryptolocker infection through software restriction policies that limit executable files running to only those that are signed.

It targets files with a number of common extensions including .doc, .docx, .psd. .ppt.

Earlier this year security vendor Fortinet Inc. released a mid-year report that noted ransomware –also called FakeDefender – is now appearing on mobile devices. FakeDefender targets Android devices, pretending to provide malware and virus protection to a smart phone.

About six hours after FakeDefender is installed (usually after the user clicks on an attachment) it will lock the handset with an image of pornography, Fortinet said. There will be a link to purchase software that purports to do the user a favour and clean up the phone.

More mobile ransomware will appear this year, Fortinet said.

 

 

 

Read the full article here

 

Share on LinkedIn Share with Google+ Comment on this article
More Articles