{"id":25937,"date":"2016-05-22T07:48:40","date_gmt":"2016-05-22T14:48:40","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/05\/ransomware-the-digital-plague-infecting-the-world"},"modified":"2017-04-24T20:47:29","modified_gmt":"2017-04-25T03:47:29","slug":"ransomware-the-digital-plague-infecting-the-world","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/05\/ransomware-the-digital-plague-infecting-the-world","title":{"rendered":"Ransomware: the digital plague infecting the world"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/ransomware-the-digital-plague-infecting-the-world.jpg\"><\/a><\/p>\n<p>\u201cThe individuals who do these types of attacks are well aware of the pressure points and pain points, economic-wise,\u201d says Dr. John Hale, a cybersecurity expert at the University of Tulsa. \u201cThey know what they can extract, how much they can extract.<\/p>\n<p>\u201cThey prey upon two things: an organization\u2019s reliance on information systems and two, the common situation, where an organization is a little bit behind on backup procedures and policies to prevent these types of things. It really is easy pickings for the bad guys.\u201d<\/p>\n<p>Crypto ransomware is designed to encrypt data stored on the computer, making the data useless unless the user obtains the key to decrypt it. A message details the ransom, which is typically paid in digital currencies such as bitcoin. Locker ransomware locks the computer or device\u2019s interface \u2014 save for the ability to interact with the hacker \u2014 and demands money to restore it.<\/p>\n<p><!-- Link: <a href=\"http:\/\/m.tulsaworld.com\/business\/technology\/ransomware-the-digital-plague-infecting-the-world\/article_62f30f5c-d31d-55d4-9b4a-fb7ba9d9fa8d.html?mode=jqm\">http:\/\/m.tulsaworld.com\/business\/technology\/ransomware-the-d...l?mode=jqm<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThe individuals who do these types of attacks are well aware of the pressure points and pain points, economic-wise,\u201d says Dr. John Hale, a cybersecurity expert at the University of Tulsa. \u201cThey know what they can extract, how much they can extract. \u201cThey prey upon two things: an organization\u2019s reliance on information systems and two, [\u2026]<\/p>\n","protected":false},"author":402,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1318,34,39,1625],"tags":[],"class_list":["post-25937","post","type-post","status-publish","format-standard","hentry","category-bitcoin","category-cybercrime-malcode","category-economics","category-encryption"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/402"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=25937"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25937\/revisions"}],"predecessor-version":[{"id":50435,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25937\/revisions\/50435"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=25937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=25937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=25937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}