tag:blogger.com,1999:blog-3119105822589181967.post5779123527739775643..comments2024-03-29T08:48:03.820-04:00Comments on SleuthSayers: RansomWare 3,RecoveryLeigh Lundinhttp://www.blogger.com/profile/07921276795499571578noreply@blogger.comBlogger11125tag:blogger.com,1999:blog-3119105822589181967.post-20500291385110743022017-02-27T10:14:30.902-05:002017-02-27T10:14:30.902-05:00This Mac ransomware has no intention of restoring ...<a href="http://appleinsider.com/articles/17/02/22/swift-based-ransomware-targets-macos-pirates-with-false-decryption-promise" rel="nofollow">This Mac ransomware has no intention of restoring files after payment.</a>Leigh Lundinhttps://www.blogger.com/profile/07921276795499571578noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-59586407686150249912016-06-29T11:26:51.411-04:002016-06-29T11:26:51.411-04:00Crypto Ransomware Attacks Have Jumped 500% In The ...<a href="http://catless.ncl.ac.uk/Risks/29.59.html#subj16.1" rel="nofollow">Crypto Ransomware Attacks Have Jumped 500% In The Last Year</a><br />vRDhttp://catless.ncl.ac.uk/Risks/29.59.html#subj16.1noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-21604177279314584342016-05-15T21:45:57.564-04:002016-05-15T21:45:57.564-04:00Another article underscores the advice.
http://fi...Another article underscores the advice.<br><br /><a href="http://finance.yahoo.com/news/what-to-do-ransomware-hackers-011857871.html" rel="nofollow">http://finance.yahoo.com/news/what-to-do-ransomware-hackers-011857871.html</a><br>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-74179303739068947472016-04-17T20:01:37.581-04:002016-04-17T20:01:37.581-04:00Herschel, you’re right about getting phony emails ...Herschel, you’re right about getting phony emails from friends and family. Emails can contain two potential pitfalls, misleading embedded links and reactive ‘payloads’, as attachments are sometimes called. Last week, I mentioned how easy it is to be fooled by malware disguised as perhaps a photo, say MomAndDad.jpg, which is really MomAndDad.jpg.exe in disguise. A the visible text of a link in an email (or a web page) might read MyBank.com, but the hidden HTML might contain nasty JavaScript or a link to PhonyBank.com, simulating your bank’s web page, hoping you type in your ID and password.<br /><br />You’re welcome, ABA, and thanks for letting me know. I’m also glad you took your backup! Keep doing that!<br /><br />Vicki, you’re correct. If you see an email from a friend with an unexpected link and nothing else, there’s a good chance it’s up to no good. Sad to say, some cretins on the internet love to fool others. It’s possible to look at email headers and trace back where the email really came from, but most email browsers hide the headers by default.<br />Leigh Lundinhttps://www.blogger.com/profile/07921276795499571578noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-42803538237391279832016-04-17T19:04:50.090-04:002016-04-17T19:04:50.090-04:00Thanks for all the info, Leigh. I get emails all ...Thanks for all the info, Leigh. I get emails all the time saying they are from friends, but if there's only a link in the email and no note or indication it's really from that friend I hit delete. It's a scary world out there. Greed abounds and greed has always been the driving force of true evil in the world.Anonymoushttps://www.blogger.com/profile/18211113589300842194noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-83615352819003395872016-04-17T16:04:29.123-04:002016-04-17T16:04:29.123-04:00I'm with Thrush – keep quite and don’t respond...I'm with Thrush – keep quite and don’t respond in any form or fashion. It would be as dangerous as unsubscribing from junk mail.<br /><br />Thanks for the articles – we can't say we haven't been warned!<br />A Broad Abroadnoreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-24065010537589034472016-04-17T14:11:55.991-04:002016-04-17T14:11:55.991-04:00I have gotten to the point where I hesitate to ope...I have gotten to the point where I hesitate to open attachments on e-mails from folks I know. Their names can and have been hijacked. I have been bitten by one, (fortunately not too difficult to correct). Very helpful if scary piece, Leigh. Thanks. Herschel Cozinehttps://www.blogger.com/profile/06097703750150309319noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-51821929801937477572016-04-17T09:01:57.581-04:002016-04-17T09:01:57.581-04:00Interesting point, Janice. The more 'intellige...Interesting point, Janice. The more 'intelligence' we give a machine, the more vulnerable it becomes.Leigh Lundinhttps://www.blogger.com/profile/07921276795499571578noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-72131197526339033602016-04-17T07:58:01.118-04:002016-04-17T07:58:01.118-04:00Really interesting.
To think I used to complain a...Really interesting. <br />To think I used to complain about the manual typewriter!janice lawnoreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-36295638782505617982016-04-17T01:37:08.974-04:002016-04-17T01:37:08.974-04:00Thanks, Paul. It's threats like these that mak...Thanks, Paul. It's threats like these that make me wish I was still doing software forensics and design. The challenge is clear: so much intelligence wasted on evil intent. This is the true material for spy thrillers.Leigh Lundinhttps://www.blogger.com/profile/07921276795499571578noreply@blogger.comtag:blogger.com,1999:blog-3119105822589181967.post-85318571138236881962016-04-17T00:12:09.793-04:002016-04-17T00:12:09.793-04:00Thanks, Leigh. Your 3 part series is really helpfu...Thanks, Leigh. Your 3 part series is really helpful...but very scary.Paul D. Markshttps://www.blogger.com/profile/15466234708772287399noreply@blogger.com